Operations | Monitoring | ITSM | DevOps | Cloud

.NET Logging with Serilog and OpenTelemetry

Debugging modern.NET apps isn’t as simple as scanning logs anymore. With services spread out and systems growing more complex, it's easy to miss the bigger picture. Serilog gives you clean, structured logs. OpenTelemetry brings in traces and metrics to connect the dots. This guide covers how to wire up Serilog with OpenTelemetry, send logs to traces, and build an observability setup that helps you troubleshoot, without digging through disconnected logs for hours.

Prevent pipeline collisions with serial groups in CircleCI

In a single pipeline, it’s easy to control job order. But in a large engineering org with dozens of pipelines, hundreds of contributors, and countless shared environments and services, that control can start to slip. Pipelines interfere with each other. Deploys overlap. Test environments break. Someone merges code, triggers a build, and gets a failure they can’t reproduce. Unfortunately, this kind of instability is a routine byproduct of scale.

What is Amazon Inspector? Monitoring and Alerting with Amazon Inspector

Amazon Inspector is an automated security assessment service that scans AWS workloads for vulnerabilities, misconfigurations, unintended network exposure and compliance risks, helping organizations enhance cloud security, detect threats, and meet regulatory requirements (such as ISO/IEC 27001, HIPAA, NIS 2 and SOC 2 Type 2) in real time. Amazon Inspector discovers and scans Amazon EC2 instances, container images in Amazon ECR (Elastic Container Registry), and Lambda functions.

How We Built an Agentic DevOps Copilot to Automate Infrastructure Tasks and Beyond

At Qovery, our goal is simple: eliminate the grunt work of DevOps. The idea of an assistant that can understand developer intent and autonomously take action on infrastructure has always felt like the holy grail. In February 2025, we started building that assistant - our DevOps Copilot. Today, our Agentic DevOps Copilot is live in Alpha. It helps developers automate deployments, optimize infrastructure, and answer advanced configuration questions. But getting here took multiple iterations.

Observability vs Monitoring: Enhancing, Not Replacing

In the dynamic world of IT operations, a common misconception has emerged: Observability vs Monitoring is often framed as a battle where one replaces the other. At Icinga, where open-source monitoring is our expertise, we aim to clarify this misunderstanding. Observability doesn’t supplant monitoring—it complements and enhances it. The term “Observability” has become a buzzword in the tech industry, often touted as the modern solution to outdated, static monitoring practices.

Application Performance Monitoring Guide: Strategies, Best Practices, and Tools

With the introduction of cloud services and microservices, applications have become more complicated due to their increased layers of complexity and distributed architecture. While microservices clearly offer speed, they also make things harder for the developers and operations teams. These teams need to plan for the reliable and efficient performance of such applications. To combat these challenges, application performance monitoring (APM) has surfaced as an indispensable discipline.

5 Critical Steps in the Effective Change Management Process. Guide + Best Practices

Change is constant, but without a structured approach, it can lead to confusion, resistance, and costly disruptions. A well-planned change management process ensures transitions happen smoothly, minimizing risks while keeping teams aligned and operations running efficiently. Whether adopting new technology, restructuring teams, or refining business strategies, organizations that manage change effectively turn challenges into opportunities for growth.

Digital Noise Cancellation: What Gigamon Can Teach Us About Listening to the Right Signals

When I’m on the train to work in the morning, I always reach for my noise-cancelling headphones. Not because the world is too loud, but because I want to hear what matters. It’s a small act of filtering signal from noise. And this got me thinking that, increasingly, that same mindset is becoming essential in how we design and manage digital infrastructure. There’s no shortage of data. In fact, there’s too much of it.

Protecting Against SAP NetWeaver Vulnerability (CVE-2025-31324) with HAProxy

A critical vulnerability in SAP NetWeaver (CVE-2025-31324) is currently being exploited in the wild. Disclosed on April 24, 2025, this vulnerability has the highest possible CVSS score of 10.0, indicating severe risk. The vulnerability affects SAP NetWeaver Application Server Java's Visual Composer Framework (version 7.50), allowing unauthenticated attackers to upload arbitrary files to NetWeaver servers. This can lead to remote code execution and complete system compromise.