Operations | Monitoring | ITSM | DevOps | Cloud

How Does Docker Network Host Work?

Docker is a platform as a service product. With Docker, you can easily deploy applications into Docker containers. Containers are software "packages" that bundle together an application's source code with its libraries, configurations, and dependencies. This helps software run more consistently on different machines. To use Docker containers, you need to understand how Docker networking works. Below, we'll answer the question: "what is Docker network host?". We'll also take a look to see how it works.

Our fully-redesigned incident response experience delivers a more intuitive workflow

Today we’re releasing fully redesigned Slack and Command Center experiences for FireHydrant so anyone on your team can intuitively navigate the incident response process — in the app or on the web. There are many things you can do ahead of an incident to help things run smoothly: design and document your process, automate predictable steps, train the team, and run drills.

Default Pull Request Tasks

There are multiple ways to create a task on a pull request. They can be added from the sidebar, top-level pull request comments, file-level comment or inline comments. Once created, they all appear in the sidebar. On any repository, merge checks can be configured for any branch to only allow merging if all pull request tasks are resolved. This is a very useful functionality if some tasks are critical to be resolved before changes are merged.

Slow Application? Here's What to Do

Today, everything we work on relies on being connected to an app. Whether we are in a household or running a business, applications have become as accessible as air. Alright, almost like air. If your business relies on applications to survive, a Slow Application spells disaster. Getting to the bottom of the slowdown becomes a tedious exercise of pointing fingers and going down the rabbit hole. Even worse is if it affects a business’ customers.

Logging in Python: A Developer's Guide

Have you ever had a tough time debugging your Python code? If yes, learning how to set up logging in Python can help you streamline your debugging workflow. As a beginner programmer, you’ll have likely used the print() statement—to print out certain values across runs of your program—to check if the code is working as expected. Using print() statements to debug could work fine for smaller Python programs.

Building for Scale and Traceability Using ABAC for Lambda Functions

The most important thing with building out any application is to think BIG. Build for ten users now and 10,000 users tomorrow. Having infrastructure that scales as your needs do is critical for user adoption—one of the many reasons we love a serverless approach and particularly AWS Lambda. The other part of any growth journey is managing access to organizational cloud infrastructure, especially with rapidly growing organizational development and DevOps teams.

Production Environment Review: The Ultimate Checklist

You’ve written code, you tested it and built it. Now, your release is ready to deploy into production. But: is your production environment ready for the release? That’s a question every IT professional and platform engineer should be asking before accepting a new release — whether the release is an update of an existing app or a totally new deployment. To that end, here’s a checklist to make sure that your production environment is ready to go.

Making a Time Zone Picker Control for .NET MAUI

This post is part of the MAUI UI July community series of blog posts and videos, hosted by Matt Goldman. Be sure to check out the other posts in the series! Hi, my name is Matt Johnson-Pint. I recently joined Sentry as an engineer working on the Sentry.NET SDKs. One of my first big projects was adding support for.NET MAUI, which we’ve now launched in preview. Go ahead, give it a try!

Beyond Backup: To data protection, and beyond

A while back, we wrote about the differences between backup and data protection. While the points made there are still valid, the industry’s definitions of these terms have continued to evolve, as has our thinking on the topic. At N-able, we’ve settled on a definition shared by analyst firm William Blair in a recent report: data protection solutions should include backup, disaster recovery, and archiving/retention of backups.

Top Freeware and Open-source IT Monitoring Tools

There are hundreds of monitoring tools available in the market for enterprises and MSPs to choose from. Many of these tools are open source or freeware. Over the years, the functionality of many of these open source tools have improved greatly. In this blog, we highlight the top open source IT monitoring tool options and discuss their pros and cons.