Operations | Monitoring | ITSM | DevOps | Cloud

Build Organizational Trust With PagerDuty Business Response

Imagine the following scenario: A large retailer experiences a major IT incident that impacts their point-of-sale systems. Their on-call engineers are alerted to the issue and begin their work to resolve it immediately. Behind the scenes, teams are collaborating on a fix, but in the storefront, frustration and tension are growing. Customers are complaining about not being able to check out, and in-store personnel have no good answers as to why the outage happened—or when it will be resolved.

Pandora FMS port monitoring

The ancient Roman Empire used to call what is now the Mediterranean Sea as Mare Nostrum (Nostrum Mare), stating what is now the port city of Barcelona as the entry point to Hispania (today the Iberian Peninsula) from the city of Miseno, located in the south of what is now Italy. For ancient Romans, port monitoring was crucial, and for us now too. “How?” you may wonder. Let’s see! Roman trireme model https://commons.wikimedia.org/wiki/File:Trireme_1.jpg.

Scaling Puppeteer & Playwright on Checkly with Terraform

Managing large numbers of checks by hand quickly becomes cumbersome. Luckily, Checkly's REST API allows us to automate most of the repetitive steps. Building on that API, the Checkly Terraform Provider takes automation one step further, enabling users to specify their active monitoring setup as code. In this article, we will be building on top of John Arundel's great intro from a few months back and showing how to manage multiple checks using groups and shared code snippets.

Infrastructure Monitoring With Amazon CloudWatch and OnPage Integration

Digitalization of business has transformed the world and its industries. Software that upkeep digital initiatives are no longer categorized as a support function. Rather, they are integral to every business process. Modern organizations require infrastructure monitoring tools to detect anomalies and alerting systems to automate remediation processes.

Hiring and Managing IT During a Crisis

Martha Heller is CEO of Heller Search Associates, an IT leadership executive recruiting firm. Martha is a frequent keynote speaker at IT industry events and author of two books: The CIO Paradox: Battling the Contradictions of IT Leadership, and Be the Business: CIOs in the New Era of IT. She spoke about IT career trends on a recent webinar.

Is your infrastructure a transformation enabler or a roadblock?

According to research from McKinsey, only 16% of digital transformation efforts have successfully improved performance and equipped the organizations to sustain changes in the long term. That’s a shockingly low number. Why is this happening? And how can you prevent this from derailing your own digital transformation journey and putting your business models, revenue, and profitability at risk?

Kubeflow operators: lifecycle management for the ML stack

Canonical, the publisher of Ubuntu, releases Charmed Kubeflow, a set of charm operators to deliver the 20+ applications that make up the latest version of Kubeflow, for easy consumption anywhere, from workstations to on-prem, public cloud, and edge. > Visit Charmed-kubeflow.io to learn more. Kubeflow provides the cloud-native interface between Kubernetes, the industry standard for software delivery and operations at scale, and data science tools: libraries, frameworks, pipelines, and notebooks.

Scaling Kubernetes Deployments with InfluxDB & Flux

This article was written by InfluxDB Community member and InfluxAce David McKay. Eighteen hours ago, I was meeting with some colleagues to discuss our Kubernetes initiatives and grand plan for improving the integrations and support for InfluxDB running on Kubernetes. During this meeting, I laid out what I felt was missing for InfluxDB to really shine on Kubernetes.

Phishing Emails - Less Ocean, More Aquarium

Here at Splunk, when we discuss Splunk Phantom with customers we end up talking about phishing pretty frequently because it’s something like Olivia outlined in a recent blog post, "Between Two Alerts: Phishing Emails — Don’t Get Reeled In!", customers both encounter and talk to us about all the time. It makes a lot of sense — phishing is a super common issue that almost everyone deals with ad nauseum and it’s annoying to investigate.