Monitoring

overops

How Much is Poor Quality Software Costing You?

Earlier this month, Herb Krasner, an Advisory Board member of the Consortium for IT Software Quality (CISQ) joined our VP of Solution Engineering Eric Mizell for a webinar examining the cost of poor quality software. A recent CISQ report [1], The Cost of Poor Quality Software in the US: A 2018 Report, aggregates publicly available data from a wide variety of sources to highlight the devastating financial impact of poor quality software.

sentry

Surface Kubernetes Errors with Sentry

Kubernetes, like a lot of other tools, can be noisy. Errors and warnings often go completely unnoticed in the event stream. Or sometimes they are noticed, but are hard to understand in the context of what else is happening in the cluster. Sentry, unlike a lot of other tools, works to eliminate that noise as much as possible, including Kubernetes-related noise.

grafana

How Bloomberg Tracks Hundreds of Billions of Data Points Daily with MetricTank and Grafana

Bloomberg is best known as a media company with its news destination site, its award-winning magazine Bloomberg Businessweek, and its daily 24-7 social media program, Tic Toc, on Twitter. But the main product for the 38-year-old company is actually Bloomberg Terminal, a software system that aggregates real-time market data and delivers financial news to more than 325,000 subscribers around the world.

metricly

AWS AMI Management—A Lifecycle Strategy With Best Practices

Amazon’s Elastic Compute Cloud (EC2) is one of the foundational services that launched Amazon Web Services (AWS) into the successful Cloud empire of today. When Amazon announced its new EC2 service in 2006, the Amazon Machine Image (AMI) was the virtual appliance which would define and create virtual machines on the platform.

sysdig

NIST SP 800-190 application container security with Sysdig Secure

In September 2017, the National Institute of Standards and Technology (NIST) released Special Publication (SP) 800-190, Application Container Security Guide. NIST SP 800-190 explains the security concerns associated with container technologies and recommendations for the image details and container runtime security. It provides prescriptive details for various sections including image, registry, orchestrator, container and host OS countermeasures.

NYC Kafka Meetup: How To Rewind The New York Times Homepage and Capacity Planning at Datadog

Datadog recently hosted the NYC Kafka Meetup. Presenters included Jamie Alquiza (Datadog), Stephen Dotz (NY Times) and Michael Kaminski (NY Times). Jamie shared how Datadog conducts capacity planning for Kafka, and the NY Times team shared how their publishing pipeline works.