Operations | Monitoring | ITSM | DevOps | Cloud

Taming Legacy Code With Characterization Tests

Developers make fun of legacy systems because we're scared of them. We're afraid that the tiniest change will cause the app to break in unexpected ways. We're afraid we won't realize it until a customer complains. One way to combat this fear is through testing. In this article, José Manuel shows us how to retrofit legacy systems with acceptance test suites so we can maintain them with less fear and more confidence.

Top 4 must-monitor API Gateway metrics

Marc Andreessen famously said, “Software is eating the world.” Dr. Steve Willmott subsequently retorted, “APIs are eating software.” This is because API based architectures are enabling companies to get away from monolithic architectures and move to microservices. Innovative, disruptive companies like Netflix, Airbnb, Uber, Square, and Slack all build their infrastructure and technology using APIs.

CFEngine in a High Performance Computing environment

In High-Performance Computing (HPC) uptime and performance are very important. HPC is an area of computing that often focuses on research and development, supporting teams with extremely complex problems they need to solve, and heavy computation mathematical problems, such as protein folding for vaccine development. To achieve this, HPC systems rely on high performance, the equipment is expensive, and the average customer has very high demands.

New and improved dashboards: PromQL, Teams sharing, and more!

To accompany Sysdig’s announcement of the first cloud-scale Prometheus monitoring offering, we had to re-architect our dashboarding experience from the ground up to support the Prometheus query language, PromQL. The query language is the standard method to query metrics within the ecosystem, and it’s an entirely new way to slice and dice metrics within Sysdig Monitor.

From OpenVPN to Pritunl VPN: The transition

Usually, organizations use an internal network to prevent unauthorized people from connecting to their private network. By using their own network infrastructure and connectivity, they can maintain their desirable level of security for their data. But it would be convenient for users to connect to that private network while they are away from the office through their own internet connection.

Kubernetes Security: Lateral Movement Detection and Defense

What is Lateral Movement? Lateral movement refers to the techniques that a cyber-attacker uses, after gaining initial access, to move deeper into a network in search of sensitive data and other high-value assets. Lateral movement techniques are widely used in sophisticated cyber-attacks such as advanced persistent threats (APTs).

4 Reasons Why IT Risk Detection is Critical in the Service Desk

In the previous blog, I discussed how IT risks can infiltrate the service desk if proper incident, problem, and change management aren’t applied. But, IT risk detection in the service desk can act as a safeguard to avoid this. It can help notify service technicians of “prohibited” or questionable items that could cause problems. Here are four reasons why IT risk detection should be incorporated and is critical for successful use of the service desk.

Remote Work: What's Next?

Are you a remote worker, office worker, or both right now? What does your back-to-the-office look like? Will you still be a remote worker in July or September or January of 2021? If you have lost track of time, January 2021 is only six months away. There are many unknowns and in-betweens right now. Lots of questions, not many answers. How should your business prepare? The best way out is through as the saying goes—so, let's go through it.

Current State of Development: Dashboards

Icinga Web is equipped with various features to create and manage custom views in dashboards. We’ve taken not that many users are missing some features for dashboards, like drag and drop and a better sharing functionality. To meet those needs we set ourselves the goal to increase the overall flexibility of dashboards and to add new features that improve the management and sharing functionality.

Deliver Better Customer Experiences With Real-Time Business Orchestration

This year has been challenging for everyone. Many companies across different industries were forced to become digital businesses overnight. Timelines for digital transformation initiatives that were originally slated to roll out over years are now being accelerated to execute in weeks and months. And for an increasing number of companies, digital services and apps are now their primary business model and source of revenue.