Operations | Monitoring | ITSM | DevOps | Cloud

The Open-Source BigQuery Sink Connector Saga

The BigQuery Sink connector is a critical piece of Kafka infrastructure that allows you to offload your Kafka topic data into BigQuery in real time. It is the third most-used connector among Kafka users (after the Google Cloud Managed Service for Apache Kafka and the original WePay sink connector), but it's not without its fair share of plot twists. Here's the story of how this connector switched hands three times and we ultimately ended up helping to re-build it.

Introduction to Facts in Puppet

Unlock the full potential of your Puppet infrastructure with a deep dive into Puppet Facts. This guide explains how Puppet uses facts to gather real-time data, making your code more dynamic, adaptable, and aware of the systems it manages. Discover the different types of facts, from simple structured data to secure trusted facts, and learn how to leverage them for enhanced visibility and standardization across your entire estate.

Why Now Is The Time To Put In A 2026 Budget Request For Cost Management Software

As the Senior Manager of Finance & Accounting here at CloudZero, and with a career in FP&A that includes tenures at large public companies, I’ve spent a significant amount of time observing the interactions between the folks who plan the company’s budget and those who spend it. While engineering and operations teams focus on the execution side, my team ensures that the company has the resources required to make each endeavor a success.

Why 1% Packet Loss Is the New 100% Outage

For years, you had an unspoken agreement. Your networks were built to be resilient, and your applications were, for the most part, forgiving. You sent emails, transferred files, and backed up data. If a few packets went missing along the way, the protocols would quietly clean up the mess. A little bit of packet loss was just background noise, an expected imperfection in a system that was, by and large, incredibly robust. You could tolerate it.

ITAM strategies to secure BYOD, Daniel Spicer, CSO, Ivanti

How can IT and security teams get better visibility into devices and endpoints that are accessing their network? Ivanti’s latest research report, “Securing the Borderless Digital Landscape” (ivanti.com/borderless-security) found that poor device visibility and unmanaged BYOD are prime attack vectors for threat actors.

Introducing the BigPanda observability tool rationalization framework

Enterprises face spiraling observability costs. Gartner reports a 20% year-over-year rise in spending, with the median spend per observability tool reaching $800,000 annually. The average organization using BigPanda coordinates data from ~20 different observability solutions, each taking up an ever-larger portion of IT budgets.