Operations | Monitoring | ITSM | DevOps | Cloud

How to Cohesively Execute Change and Release Management

Strategic changes and new deployments in all growing businesses are expected. So by design, businesses need to be adaptive to new changes. When such transformations are being undertaken, organizations need to continue preserving their infrastructures while complying with pre-defined timelines. To efficiently manage such deployments, organizations make use of ITIL concepts like change and release management.

A Clear Path to Automated Optimization of Application Performance

Rancher has helped thousands of organizations manage their transitions to containerized applications and Kubernetes. With its innovative distribution and suite of services, Rancher has given IT and DevOps teams the roadmap they needed to drive Kubernetes success. Given the complexity of Kubernetes and the shortage of engineers with Kubernetes-specific skills, Rancher’s offerings meet a critical and growing market need.

Configuring Flowmon Using Presets

Nobody wants to spend hours configuring a product. It should just work. Flowmon’s customers, partners, and distributors are fortunate in having a number of presets at their disposal for speedy configuration, whether during initial deployment, adjusting the product to new circumstances, or a quick product demonstration. There is no laborious setup; the user just chooses a use case, follows a few guided steps, and lets the system set everything up.

Why "No-Code" Tools are a Non-Starter for Developers

Many attempts to simplify programming lead to visual interfaces that provide approachable settings for common tasks. These simplifications may appeal to non-developers, but they send experienced coders running for the command line. Yet, no code tools are rapidly expanding. Zapier, Integromat, and Workato are becoming more popular options and some believe developers won’t be needed for most integrations in the future.

A Successful ITSM Implementation Starts With 4 Checkboxes

You’ve been contemplating adopting a new ITSM solution for some time. The current one handles the bare minimum—it helps your team churn through a ticket queue—but you know there are other solutions capable of more. So what’s standing in your way? Implementing that new platform seems time-consuming and stressful. But it doesn’t have to be.

Icinga Web permissions and restrictions (how do they work, examples)

Permissions and restrictions are something used to control how much access is provided to a particular user or user group. Therefore one must first understand what is the role of a user or a group. Here, you will understand permissions and restrictions through configuring users, user groups and roles. They can either be created using configuration files or web interface. When the Icinga Web 2 is installed a default user with admin access is configured.

How to ingest data from Trello into Elastic Workplace Search

In our previous post, we introduced the concept of the Elastic Workplace Search Custom Source API as a means of adding data for which a prebuilt content source integration isn’t available. We used a simple example — a CSV file of contact information — to demonstrate the process along with the use of the associated REST API. In this post, we explore ingesting data from a more complex organizational source: Trello.

Tools to Manage Cyber Risk in a Growing Organization

Within the cyber security industry, it is well known that as a company grows, so does its attack surface. This trend lends itself largely to the fact that as more employees are hired, more company-owned machines (laptops, tablets, etc.) are distributed. The risk is that once a company-owned machine is given to an employee, it is up to the employee whether to follow the security best practices set forth by your company. Your technological asset has now become a security risk.

Crash Course on AWS CDK and Serverless with REST API and Data Lake Analytical Querying

This is a hands-on course on how to deploy a fully Serverless web app using the AWS CDK. You can use the resources declared in this demo application as a starting point to mix and adapt to your own architectures later, which should save you quite some time.