Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How does OpenSearch work?

OpenSearch is an open source search and analytics suite that developers use to build solutions for search, data observability, data ingestion, security information and event management (SIEM), vector database, and more. It is designed for scalability, offering powerful full-text search capabilities and supporting various data types, including structured and unstructured data. OpenSearch has rapidly developed into a standalone platform with unique features and capabilities.

What is RAG?

In a 2020 paper, Patrick Lewis and his research team introduced the term RAG, or retrieval-augmented generation. This technique enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. RAG addresses a gap in traditional Large Language Models (LLMs). While traditional models rely on static knowledge already contained within them, RAG incorporates current information that serves as a reliable source of truth for LLMs.

Lasting Impressions and Technical Tidbits From AWS re:Invent 2024

AWS re:Invent 2024 has officially wrapped up, but not everything that happens in Vegas stays in Vegas. We're still gushing over the reception our booth team received from attendees—and we were excited to see even more organizations going all-in on application delivery and security. Naturally, AWS integration was a constant backdrop throughout the week as we showcased the HAProxy platform.

Introducing Network Containers in Tidal LightMesh IPAM

As networks expand across on-premises and cloud environments, many organizations find themselves struggling with scattered, unstructured networks. Often, networks grow in silos, with subnets being created independently in AWS, Azure, and other environments over time, leading to a messy and hard-to-manage structure. This is especially true for enterprises undergoing mergers and acquisitions, where integrating entirely separate network systems can quickly turn into an administrative headache.

The Incident Maturity Model

I want to walk you through how incident management has evolved, drawing from real data and the experiences of some of the most sophisticated tech organizations out there. I'll also introduce you to a framework we’ve developed at incident.io: the Incident Maturity Model. This framework is the result of thousands of conversations with companies and provides a clear roadmap to help your organization improve its incident management practices—no matter where you're starting from.

The Comprehensive Guide to Understanding IT Incidents

In today’s world, where technology underpins nearly every aspect of business, IT systems play a critical role in ensuring smooth operations. However, what happens when something goes wrong? When systems fail or services are disrupted, businesses face what’s commonly known as an incident. For someone who is not technical, the idea of an IT incident can seem scary. However, it is a simple and organized process when explained clearly.

Feature Friday #40: What would CFEngine do?

CFEngine works by defining a desired state for a given context and converging towards that goal. Given there is no fixed starting point and that the current context might change wildly it can be challenging to succinctly answer the question “What would CFEngine do?”. In Feature Friday: Don’t fix, just warn we saw how an individual promise could be made to warn instead of trying to automatically converge towards the desired state, a granular --dry-run mode.

Managing Long-Running Queries in MySQL: Best Practices and Strategies

Long-running queries in MySQL can significantly impact the performance and availability of your database. They can consume server resources, lock tables, and block other queries, leading to cascading performance issues. In this blog, we will explore why long-running queries occur, how to detect them, and best practices for managing and optimizing them.

Security vulnerability uncovered and patched in the golang.org/x/crypto /ssh package

Platform.sh teams are always striving to ensure a safe space for all developers within our product. And this consistent diligence led to the Platform.sh Engineering team discovering a security vulnerability in the golang.org/x/crypto/ssh package on 5 September 2024. Upon investigating an unexpected Panic: runtime error: invalid memory address or nil pointer dereference message in our edge proxy, the engineers discovered a misimplementation of the PublicKeyCallback function.

How to design apps with Docker containers?

Do you want to streamline your app development process to make it efficient, scalable, and reliable? Building and deploying applications without the right tools quickly becomes complex and resource-intensive. Docker containers address these challenges by providing effective solutions. The 2023 Stack Overflow Developer Survey reveals that 42% of developers rely on Docker, demonstrating its pivotal role in modern workflows. Similarly, Datadog states that over 25% of organizations use Docker in production, which underscores its widespread adoption.