Operations | Monitoring | ITSM | DevOps | Cloud

Introducing New Storage Dashboards in the Cloud Monitoring Console (CMC)

Monitoring and gaining additional insights about usage of your Splunk Cloud Platform deployment is essential for effective management as a Splunk admin. Your Splunk Cloud comes with the Cloud Monitoring Console (CMC) app, which displays relevant information about the status of your Splunk Cloud environment using pre-built dashboards.

Running Serverless Applications on Kubernetes with Knative

Kubernetes provides a set of primitives to run resilient, distributed applications. It takes care of scaling and automatic failover for your application and it provides deployment patterns and APIs that allow you to automate resource management and provision new workloads.

Deploying Docker Containers on AWS: Elastic Beanstalk vs ECS vs EKS

Containerization packages a software component and its environment, dependencies, and configuration into an isolated unit called a container. That makes it possible to deploy an application consistently across different computing environments, whether on-premises or on the cloud. The concept of containerization is more than a decade old.

How To Become A Small Business Consultant (3 Essential Tools)

If you want to become a successful small business consultant, you need to leverage a range of tools and applications. Small business consultants are in high demand, and if you want to hit the ground running in this field, you need to have the right tools and applications at your disposal. In this article, we will explore three essential tools every small business consultant should use. These tools will help you manage your clients more effectively and streamline your operations.

The Virtual Experience: 3 Future-Facing VDI Use Cases

In today’s world of flexible work, technology has to be one thing above all else: versatile. A decade ago, virtual desktop infrastructures (VDI) wouldn’t have been able to meet this moment – VDI used to be too narrow and restricted in terms of what use cases it could service. Fortunately, VDI has evolved dramatically since those days. Now, with the right resources, there’s very little you can’t accomplish through virtual desktops.

What Is Log Retention?

The idea of paying money to store logs nobody is looking at may seem like a waste. Well, that is until you need those logs. At that point, you see how valuable log retention is, especially if there’s a security or compliance issue. When you prioritize log retention, you can look back to investigate an incident or provide data for an audit — especially when you centralize log and metric data in one platform.

The Myth of the Missing Mac Malware, part 1

Apple once ran, and caught a reasonable amount of flak for, an ad that implied Macs didn’t get viruses. The PC (John Hodgman) in the ad says there were “114,000 known viruses” for PCs in 2006, to which the Mac (Justin Long) replies, “PCs. Not Macs.” While misleading, it’s technically correct, which may have been sufficient to avoid truth-in-advertising lawsuits.

Running VictoriaMetrics on ARM-based processors

ARM processors become more popular and more cost-effective according to many benchmarks. One of them was made by Percona for MySQL. Some of our users reported issues with VictoriaMetrics at AWS Graviton instances. The main concerns were higher CPU and disk IO usage compared to x86 instances of the same size and for the same workload. By that time, we verified that VictoriaMetrics works fine for raspberry and IoT devices, but didn’t do any optimizations for ARM builds.

CMDB Benefits for Service Delivery Across Your Organization

A configuration management database or CMDB can be a game changer in terms of service delivery. Done well, a CMDB benefits incident resolution, speeds up request fulfillment and makes change assessment safer. Implementing a CMDB is a significant task and it’s something that many IT departments struggle with. It’s very easy to make things complicated or difficult to maintain.