Operations | Monitoring | ITSM | DevOps | Cloud

Kafka Summit 2022

We had a fantastic time at the Kafka Summit in London this year. It was so great to be meeting everyone face to face again after such a long break. It was interesting to see how people had progressed with their Kafka implementations. At the 2019 event people were just getting started trying out Kafka in small test environments but no one had enough production experience to know understand their needs for management at scale and production support.

Top Benefits of Containerization For Your Startup

A container is an isolated unit of software running on top of an operating system. Containers are getting popular among startups because containerized applications are portable, have built-in scalability and fault tolerance, are more secure, and promote faster development cycles. That’s why startups prefer containers for new application development to gain a business advantage over competitors who are still using VMs for application deployment and packaging.

SEO 101: Keyword Research and Strategy

While SEO (search engine optimization) includes a variety of different elements to deliver measurable results, one of the foundational pieces of a good SEO strategy is keyword research. Since keywords and phrases are the actual targets that connect potential visitors to your website, finding ways to ensure your site places as highly as possible for relevant search terms is the linchpin for all other elements of SEO strategy.

Cybersecurity Measures Every Project Manager Should Know About

Online projects could be easy prey for cybercriminals due to the involvement of critical security information (emails, different platforms' login passwords, bank accounts, etc.) and multiple people. A simple phishing email requesting new login credentials or bank account details could be effective on negligent team members and could put everybody at risk. In other words, any breach of information by a project team member could lead to a disaster for the parties involved.

NGINX Logging Configuration: How to View and Analyze Access and Error Logs

NGINX is one of the most widely used reverse proxy servers, web servers, and load balancers. It has capabilities like TLS offloading, can do health checks for backends, and offers support for HTTP2, gRPC, WebSocket, and most TCP-based protocols. When running a tool like NGINX, which generally sits in front of your applications, it’s important to understand how to debug issues. And because you need to see the logs, you have to understand the different NGINX logging mechanisms.

Why is it so important for MSPs to have zero trust in the digital age?

The pandemic may have accelerated the need for enterprises of all sizes to move towards digital transformation, but the need for cyber security has existed since before. However, with new actors or hackers, malicious software has also evolved and expanded the cyber threats to a larger attack surface. While enterprises need robust digital solutions, implementing them may make your enterprise more vulnerable to security threats.

Tracking On-Call Health

If you have an on-call rotation, you want it to be a healthy one. But this is sort of hard to measure because it has very abstract qualities to it. For example, are you feeling burnt out? Does it feel like you’re supported properly? Is there a sense of impending doom? Do you think everything is under control? Is it clashing with your own private life? Do you feel adequately equipped to deal with the challenges you may be asked to meet? Is there enough room given to recover after incidents?

4 Best Practices for Root Cause Analysis

As failures are a common part of any system’s lifecycle - what would be the Root Cause Analysis for this type of problem? If you build and deploy a system, there are high chances that you'll have to deal with a failure in the near future. However, what matters is how you handle such failures. As an organization, you need to have pre-formulated strategies to handle failures as and when they occur.