Operations | Monitoring | ITSM | DevOps | Cloud

Top Liquid and Immersion Cooling Vendors for High-Density Racks

As rack densities rise and concern about the sustainability of data centers grows, data center managers need a way to not only cool their equipment but do so as efficiently as possible. To efficiently cool racks of 20 kW or more, organizations are seriously investigating liquid cooling and immersion cooling.

What the Hell is Activity Anyway?

I use .NET and I keep seeing something called `Activity` but in OpenTelemetry there is only talk about “Span” and “Trace,” why? And what should I be using? This is understandable, and has caused confusion since that decision was made by Microsoft back in 2018/19 (I believe). I’ll do my best to provide some guidance on what the distinction is, and also when each is useful.

Log Observability and Analytics Guide

Monitoring and analyzing log files to identify and resolve issues make up log observability. Log analytics is the process of extracting insights from log data. Logs are a valuable source of information for IT operations teams, as they provide insight into what is happening on a system or network. Logs can monitor system performance, troubleshoot problems, and identify security incidents. Logs are a vital part of application performance management.

IP Blacklisting: Your Beginner's Guide

IP Blacklists contain ranges of or individual IP addresses ‌you want to block. A blacklist can be used in combination with firewalls, intrusion prevention systems (IPS), and other traffic filtering tools. With the recent developments in cyber security, organizations are increasingly relying on IP blacklisting to protect their networks.

Node.js Performance Testing and Tuning: Step by Step Approach

Node.js is well-known for its lightning-fast performance. However, as with any programming language, you might develop Node.js code that performs poorly for your users. Appropriate performance testing is required to combat this. Node.js can be used for a variety of tasks, including scripting to do tasks, running a web server, and serving static files, such as a website. Today, we'll go over the procedures to test a Node.js HTTP web API.

Beginner's Guide to RabbitMQ Logging: How to View, Locate, and Analyze Logs

RabbitMQ is one of the most popular open-source message brokers available. Its ability to be deployed in various configurations and on various platforms makes it a widely used tool; it also supports all major messaging protocols, making it very versatile. Still, debugging issues with a tool like RabbitMQ can be challenging, especially when it’s deployed on a large cluster. RabbitMQ logs are one way to go, as they help you backtrack to an earlier point while debugging.

Cloud storage provider Koofr loves Icinga´s flexibility and simple handling

We´re proud of our many customers and users around the globe that trust Icinga for critical IT infrastructure monitoring. That´s why we´re now showcasing some of these enterprises with their Success stories. It´s stories from companies or organizations just like yours, of any size and different kinds of industries. Some of them are our long-standing customers, others have just recently profited from migrating from another solution to Icinga.

How to Monitor IT Infrastructure when adopting IaC for VDI and Digital Workspaces

IaC (Infrastructure-as-Code) is becoming ubiquitous in the EUC (End User Computing) community and within the datacenter. Automation and declarative infrastructure for on-premises VDI and cloud digital workspaces, such as Microsoft AVD (Azure Virtual Desktop) or AWS WorkSpaces, is now mainstream. Vendors such as Citrix now advocate the use of technologies such as Terraform and Ansible for deployments.

Nameserver Explained: What it is And How it Works

The Internet is a vast network of servers and devices connecting people worldwide. It allows for near-instant data communication between machines, which is presented in a readable format for the end-user. From a human perspective, it's a simple case of typing the URL of your desired website and pressing enter. Of course, computers talk to one another in their own numerical language, using lengthy IP addresses to refer to domains instead of URLs.

3 ways to improve your incident management posture today

Too many of us are still playing whack-a-mole when it comes to incidents: an incident is declared, the on-call engineer is paged, the incident is resolved and then forgotten — until next time. It’s time to start thinking in terms of proactive incident management, not just reactive incident response.