Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

How an Oil & Gas conglomerate automated their IT service delivery

Our client is one of the biggest oil and gas conglomerates in India, contributing to around 75% of Indian domestic production. They have been in business for over 60 years, currently employing around 30,000 people. With decades of growth, they have entered into different ancillary companies and expanded globally. The expansion has led to several offices, branches, desks, and teams spread across geographies.

Twitter's Reliability Journey

Twitter’s SRE team is one of the most advanced in the industry, managing the services that capture the pulse of the world every single day and throughout the moments that connect us all. We had the privilege of interviewing Brian Brophy, Sr. Staff SRE, Carrie Fernandez, Head of Site Reliability Engineering, JP Doherty, Engineering Manager, and Zac Kiehl, Sr. Staff SRE to learn about how SRE is practiced at Twitter.

VMware Management Pack Update Release (20.5.1899.0)

The third update release for 2020 of our VMware Management Pack for Operations Manager is now released. Improvements include better performance, extended discoveries of properties, and vSAN monitoring. We also simplified the configuration and licensing experience and moved everything under the administration pane. This will require you to remove the old Licensing UI Management Packs before upgrading.

DevOps Toolchain Explained: What Is & How to Create One. Choosing Between Buying or Building Your Own Tools

Over the past few years, we’ve seen an almost obsession with developing and adopting CI/CD tools throughout the DevOps community. There are thousands of “how-to’s”, “top x tools”, and “tool x vs tool y” type articles, and it has gotten to the point where it’s quite difficult to figure out how and which one to pick as your own.

File Integrity Monitoring: Detecting suspicious file activity inside a container

In this blog, we will explore suspicious file activity inside a container and see how to effectively implement a file integrity monitoring (FIM) workflow. We’ll also cover how Sysdig Secure can help you implement FIM for both containers and Linux hosts.

Why the 20s will be the "Data Decade" and How to Prepare

In the next decade, the world will produce an unfathomable amount of machine data — metrics, measurements, and telemetry data that is emitted from everything from servers to robots and satellites. And the pace of that data generation is increasing exponentially. I wrote in a paper published last year how this data is a virtually untapped source of extraordinary business insights — data so dense and rich it will dwarf traditional business intelligence in terms of its potential value.

Monitoring Zoom Metrics from Your Machine with Logz.io

Like everyone else, my life for the last few months has become a never-ending stream of video calls. With Zoom calls, and the occasional Skype, Google Meet, or Microsoft Teams, becoming the norm I’ve noticed that the fans on my Macbook have been kicking in and sounding like a tiny jet trying to take off.

Deploy HAProxy Ingress Controller from Rancher's Apps Catalog

In Kubernetes, Ingress objects define rules for how to route a client’s request to a specific service running inside your cluster. These rules can take into account the unique aspects of an incoming HTTP message, including its Host header and the URL path, allowing you to send traffic to one service or another using data discovered in the request itself. That means you can use Ingress objects to define routing for many different applications.