Operations | Monitoring | ITSM | DevOps | Cloud

Engineering Levels at Honeycomb: Avoiding the Scope Trap

It has been seven years since Rent the Runway posted their engineering ladder, kicking off a veritable trend of engineering teams open sourcing their ladders. Interestingly, nearly all of them seem to have coalesced around “area of scope” as a useful proxy for level. At first glance, “area of scope” does seem to make sense. Senior engineers should be able to work across larger areas of the organization. In addition, your area of influence should expand as you gain experience.

DX UIM Team Practices DevSecOps for Secure Development, Delivery, and Deployment

DevOps is a composition of enhanced engineering practices that reduce lead time and increase the frequency of delivery. The primary goal of DevOps is to ensure operations team members are engaged and collaborating with development from the very beginning of a project or product development. Within many enterprises, teams are being compelled to reassess the security of their DevOps implementations. Recent news on vulnerabilities like Sun Burst and Log4j underscore why this is so critical.

Security Teams Are Struggling, and Cribl Is Here to Help

Many cybersecurity teams are drinking from multiple firehoses without solutions in place to deal with the onslaught of data. And with 70 percent of companies experiencing over one hundred attacks each day, it’s not slowing down. Teams are overwhelmed with data from multiple sources and formats with continuous requests to pull in more and more.

Understanding Kubernetes Cost Drivers

Optimizing Kubernetes costs isn’t an easy task. Kubernetes is as deep a topic as cloud (and even more complex), containing subtopics like: That’s a lot for a busy DevOps team to understand and manage, and doesn’t even consider that line-of-business stakeholders and finance team members should have some understanding of each cost driver’s function and importance to contribute to a successful FinOps Strategy.

Synthetic Monitoring vs Real User Monitoring: What's The Difference?

It’s important for both technical and business teams to understand the different web performance monitoring options that are available as well as their various use cases and the benefits of each. In this article, we’ll compare synthetic monitoring and real user monitoring (RUM).

Synthetic Monitoring Tools: 5 Must-Have Features

There are many different classes of web performance tools, from synthetic monitoring to application performance monitoring (APM), to real user monitoring (RUM), and more. These different classes exist because each has its own strengths and weaknesses. When evaluating open-source or enterprise-grade synthetic monitoring tools, you want to look for capabilities that maximize its strengths.

Telegraf Best Practices: SNMP Plugin

Telegraf has now reached 300+ plugins and is deployed in a wide variety of use cases. In January we released a blog post covering the golden rules for creating configs and optimizing your Telegraf agent. It’s now about time we got our hands dirty covering some of the plugins the community uses the most. In this post, we are going to cover the SNMP Input Plugin.

Identify Vulnerable Devices From Vendor Recalls and Security Notices

When network hardware vendors issue device recalls, field notices, or security alerts, the implication can be massive for MSPs. Take the 2017 clock signal issue, for example. That huge recall of Intel microchips was a large-scale vulnerability for tons of devices—and left MSPs scrambling to figure out which devices were affected on which client sites.