Operations | Monitoring | ITSM | DevOps | Cloud

Going from Consulting to SaaS

For many freelancers and small business owners, moving from consulting or freelance development work to operating a SaaS product is the Holy Grail. That makes sense: running a SaaS scales better and makes for a stable income. While there’s no guaranteed path to success, here’s what we learned taking AppSignal from a “20% time side-project” to a business serving thousands of developers around the globe. This article isn’t a blueprint.

From beta tester, to building the next-gen Civo platform

There are times in life that feel like they are detached from reality. Some call it divine intervention, others use more modern, hippie-ish ways to explain these moments. Call it what you will, nearly everyone has experienced some form of this occurrence. Some people have been short on cash and found a $50 note on the ground. Others have lost jobs only to find their dream job on the way to their car after getting walked out by security.

How To 'Translate' Grafana Dashboards from Graphite to Elasticsearch

Grafana is the de facto open source tool for visualizing metrics. Grafana supports many different backends for data sources and handles each one slightly differently. This blog post is geared towards helping convert Grafana dashboards from using the Graphite backend to using Elasticsearch as a metrics datasource. There are many similarities between how to use both as datasources and how to plot graphs around them, but there are also many differences that need to be accounted for.

Become FIPS Compliant with HAProxy Enterprise on Red Hat Enterprise Linux 8

Guarantee strong encryption by enabling ‘FIPS mode’ with RHEL and HAProxy Enterprise. SSL and its successor TLS are protocols that safeguard web traffic as it crosses the Internet, encrypting communication and protecting it from tampering. However, the encryption algorithms within these protocols are subject to change over time as vulnerabilities are discovered or as better encryption methods become available.

Client-side chaos: Making your front end more reliable

Get started with Gremlin’s Chaos Engineering tools to safely, securely, and simply inject failure into your systems to find weaknesses before they cause customer-facing issues. The concept of Chaos Engineering is most often applied to backend systems, but for teams building websites and web applications, this is only half of the story.

Measuring First Input Delay (FID)

First Input Delay (FID) measures how long the browser took to respond to the first user input event. It’s one of several Core Web Vital metrics that measure how real users perceive the performance of modern web applications. New measurements like First Input Delay are increasingly important as JavaScript and SPA’s do more work on the client side.

Integration of PRTG and Flowmon

Get the most out of PRTG and Flowmon by bringing them under one GUI and allowing their complementary functionalities to work together. Until recently, infrastructure and network monitoring were seen as rivals, but today they are rather viewed as complementary technologies. Seek proof with Gartner - they used to be pitted against each other in the Magic Quadrant, but that has now been replaced by the Market Guide, which explains the differences and strong points but does not compare.

Track, Debug, and Fix Errors with Sleuth and Sentry

Developer teams shipping software frequently are in a constant state of change. Understanding the state of their code at a given point of time is sometimes clear as mud. The Sentry | Sleuth integration is focused on helping developers automate the annoyances of deploying software, tracking the health of a release, and providing clarity on how to resolve critical code issues.

Choosing a tool for Asset Discovery & its best practices

Asset Discovery is an important part of IT Asset Management. There are several advantages in having an asset discovery tool. It helps in quickly creating a database of all the assets in your organization while ensuring visibility across the network. This tool also detects software anomalies in the assets and provides for better reporting and analysis. Overall, it is an essential tool in an IT agent’s toolkit.