Operations | Monitoring | ITSM | DevOps | Cloud

Top 4 must-monitor API Gateway metrics

Marc Andreessen famously said, “Software is eating the world.” Dr. Steve Willmott subsequently retorted, “APIs are eating software.” This is because API based architectures are enabling companies to get away from monolithic architectures and move to microservices. Innovative, disruptive companies like Netflix, Airbnb, Uber, Square, and Slack all build their infrastructure and technology using APIs.

CFEngine in a High Performance Computing environment

In High-Performance Computing (HPC) uptime and performance are very important. HPC is an area of computing that often focuses on research and development, supporting teams with extremely complex problems they need to solve, and heavy computation mathematical problems, such as protein folding for vaccine development. To achieve this, HPC systems rely on high performance, the equipment is expensive, and the average customer has very high demands.

Anodot - Autonomous Business Monitoring

Business metrics are notoriously hard to monitor because of their unique context and volatile nature. Anodot’s Business Monitoring platform uses machine learning to constantly analyze and correlate every business parameter, providing real-time alerts and forecasts in their context. Anodot reduces detection and resolution for revenue-critical issues by as much as 80%. We have your back, so you’re free to play the offense and grow your business.

New and improved dashboards: PromQL, Teams sharing, and more!

To accompany Sysdig’s announcement of the first cloud-scale Prometheus monitoring offering, we had to re-architect our dashboarding experience from the ground up to support the Prometheus query language, PromQL. The query language is the standard method to query metrics within the ecosystem, and it’s an entirely new way to slice and dice metrics within Sysdig Monitor.

From OpenVPN to Pritunl VPN: The transition

Usually, organizations use an internal network to prevent unauthorized people from connecting to their private network. By using their own network infrastructure and connectivity, they can maintain their desirable level of security for their data. But it would be convenient for users to connect to that private network while they are away from the office through their own internet connection.