Operations | Monitoring | ITSM | DevOps | Cloud

Managing User Access & Authentication in a Cloud-Hosted Environment

This is the third and final instalment in a series on Here’s What a Network Needs After a Cloud Migration. Part 1 looked at how to redesign the LAN. Part 2 outlined strategies for the Internet connection. One of the things that becomes more important in a cloud-based application environment is managing user access and authentication.

Stop the Insanity! Quit Doing These 7 Manual Network Management Tasks

Active network infrastructure management is a key element of any managed service offering. Traditionally, network management has involved a lot of tedious manual work, making it expensive and very hard to scale. And that’s why many MSPs have shied away from actively managing the network. But not managing network infrastructure at all is a risk to your business. Your clients likely expect you’re looking after the network whether you’ve promised it or not.

Monitor Everything is an Anti-Pattern!

Bullshit and nonsense. But let’s take it from the beginning. The industry’s story goes something like this: Then, in the same breath: You see the contradiction already, right? The same industry that tells you “collect less, simplify, trust the experts” is also the industry where: This isn’t an observability strategy. It’s observability by hindsight. Right. Good. Now we’re having fun.

How to Write a Cover Letter That Actually Helps You Get the Job

Cover letters are supposed to help you shine, but most of them blur together into the same polite, forgettable paragraphs. The intention is good (“I want them to notice me!”), but the execution… not so much. So, here’s a simple, honest guide to writing a cover letter that actually works, especially if you’re applying to Checkly. Spoiler: shorter is better. And authenticity in this AI era is better than perfect polished perfection.

Stop choosing between fast incident response and secure access

Every production system will eventually break. It's not pessimism, it's just reality. That's why engineers go on-call, and why companies invest heavily in incident response tooling. But here's the problem: the moment an engineer goes on call, they typically need elevated access to production systems, databases, and sensitive customer data. And that elevated access? It's often permanent, overly broad, and a security nightmare waiting to happen.

How To Migrate Away From DogStatsD Using Telegraf

Datadog is a popular monitoring platform, and one of its key components is DogStatsD which is a customized extension of the original open-source StatsD protocol. DogStatsD adds powerful features like tagging, histograms, and distributions, but it also introduces vendor lock-in. This is because DogStatsD metrics follow a specific wire format that many other monitoring platforms do not natively support.

Stop tool sprawl - Welcome to Terraform/OpenTofu support

Provisioning cloud resources shouldn’t require a second stack of tools. With Qovery’s new Terraform and OpenTofu support, you can now define and deploy your infrastructure right alongside your applications. Declaratively, securely, and in one place. No external runners. No glue code. No tool sprawl.

Information as a Strategic Weapon: Building the Architecture of Advantage

Information dominance has become key to battlefield success. The evolution from Network-Centric Warfare to Multi-Domain Operations (MDO) and JADC2 is all about connecting drones, sensors, weapon-systems and decision-makers, across land, air, sea, cyber, and space… in real time. Read about the journey, principles and building blocks, and how Ribbon Communications’ solutions are in the middle of it.