Operations | Monitoring | ITSM | DevOps | Cloud

SLOs for AWS-based infrastructure

In our latest two-part series blog, Gigi Sayfan, author of “Mastering Kubernetes”, discusses managing complex infrastructure on AWS with an eye towards SLOs (service level objectives). Though there are many ways to discuss the management of infrastructure, in this two-part series, he covers SLOs for AWS, Observability on AWS, Quotas Limits, and Optimizing cost on AWS and in the second part, he uses the lens of Kubernetes to compare and contrast compute infrastructure on AWS with Kubernetes.

SUSE Enters Into Definitive Agreement to Acquire Rancher Labs

I’m excited to announce that Rancher has signed a definitive agreement to be acquired by SUSE. Rancher is the most widely used enterprise Kubernetes platform. SUSE is the largest independent open source software company and a leader in enterprise Linux. By combining Rancher and SUSE, we not only gain massive engineering resources to further strengthen our market-leading product, we are also able to preserve our unique 100% open source business model.

The State of Event-Driven Automation

Talking about competition can be hard. It’s understandable. Product positioning can be touchy subjects especially when those use cases overlap. In the DevOps space, event-driven architectures are certainly not a new concept. Companies like Netflix, LinkedIn, and Facebook have in-house tools built specifically for this type of automation. However, Relay’s mission is make it easy for everyone to build event-driven workflows – not the Netflix-es of the world.

Understand Complex Environments Without Being an Expert Using AppOptics for APM

Over the past two decades, two trends have completely reshaped the IT landscape: cloud computing and microservices. With cloud computing, organizations of all sizes can provision infrastructure and run applications on a global scale within minutes. And with microservices, these organizations can deploy highly scalable distributed workloads just as quickly.

I Can Do That, Dave: Exploring AIOps

The movies are filthy with examples of artificial intelligence. Some, like the first Terminator, are evil. Some, like the Star Wars droids, work for the good guys. And so many of them are flatly iconic—Blade Runner (both of them), 2001: A Space Odyssey, War Games, Westworld (the movie and the HBO series), Matrix[i] … the list keeps going and going. We aren’t at the point yet when we can get R2 to talk the Millennium Falcon—or the data center—and find out what’s wrong.

4 ways to use Catchpoint to drive remote workforce productivity

IT professionals are now adapting to a remote environment and learning to manage a distributed, homebound workforce. From a technical standpoint, the process of setting up a remote workforce is well-known. For this blog post let’s dive into one step of the process, which is arguably the most important, user experience monitoring.

Introduction to security monitoring

Security Information Monitoring or Security Event Monitoring is part of Security Information Management. Yes, I acknowledge they are flashy names and that even experts have their differences about concept and scope. Here in Pandora FMS, flexibility is part of our name, so, hereby, I will abbreviate it as Security Monitoring. As you can see, it is short and manageable!

Enabling DevSecOps with the Elastic Stack

Software development and delivery is an ever-changing landscape. Writing software was once an art form all its own, where you could write and deploy machine code with singleness of purpose and no concern for things like connecting to other computers. But as the world and the variety of systems that software supports became more complex, so did the ecosystem supporting software development.