Operations | Monitoring | ITSM | DevOps | Cloud

Real User Monitoring vs Synthetic Monitoring: Why You Need Both

When it comes to Application Performance Management (APM), there are two main technologies used to measure end-user perspective performance: synthetic monitoring (STM) and real user monitoring (RUM). We’ll discuss the pros and cons of each of the technologies especially related to monitoring third-party apps. Third-party apps like Office 365 and GSuite are experiencing a surge of growth for mission-critical purposes within business.

Startup CTO: How to Screen Software Engineers

Once you’ve got software engineers applying for your job opening, you’ll need to determine who is good enough to interview, and who is not. Additionally, you’ll want to make sure the time investment made by you and your team has a high return on investment. In this part of our series on hiring software engineers as the CTO of a startup, we’ll talk about Blue Matador’s approach to the screening process and the insights I’ve gained in this part of this CTO experience.

How we used Caddy and Laravel's subdomain routing to serve our status pages

We recently launched our new Status Page feature. Under the hood, it's using the Caddy proxy server and Laravel's subdomain routing to serve the right status page on the right domain. With this technology stack, we can automatically generate, configure & renewe the SSL certificates for custom domains of our clients. In this post we'll deep dive in to our current setup.

Time drift monitoring: Troubles of unsynchronized servers

A distributed IT infrastructure has many servers operating across multiple regions. Applying a single consistent time across servers will ensure isolated servers communicate in the proper time zone when exposed to the internet. When Microsoft encountered this problem back in 2017, the servers were offset by almost an hour, affecting a number of windows machines. With Reddit, it was a different case.

Easy Ingress Management on the Edge with K3s lightweight Kubernetes and Traefik

K3s and Traefik are partnering to speed up cloud native applications deployment. K3s, by Rancher, is the best way to have a lightweight, fully CNCF conformant Kubernetes cluster running on diverse infrastructures, including possible IoT appliances such as Raspberry Pis. K3s starts in seconds thanks to its light weight nature. As it adds some components to the cluster automatically, k3s is very easy to use and therefore very accessible for new users.

How to Get Stronger Consistency Out of a Datastore

Welcome to our series of blog posts about things Sentry does that perhaps we shouldn’t do. Don’t get us wrong — we don’t regret our decisions. We’re sharing our notes in case you also choose the path less traveled. In this post, we stretch technologies to their limits to see real-time data while handling traffic spikes.

Have it Your Way - Detailing the New ServiceNow CMDB Release and Auto Balanced Collectors

Earlier this year we announced the official LogicMonitor - ServiceNow CMDB App, and it’s been exciting to see how quickly our customers are adopting the feature-rich integration. As with most workflow integrations across the LogicMonitor ecosystem, the CMDB App was built with customization in mind.

Securing Secrets With HashiCorp Vault and Logz.io Security Analytics

Secrets, i.e. passwords, API keys, certificates, and any other type of credential used for digital authentication, have exploded in number and type. Even small-sized organizations might have thousands of SSH keys for example. Secrets are also a common security weakness often exploited by attackers.