Operations | Monitoring | ITSM | DevOps | Cloud

How an Oil & Gas conglomerate automated their IT service delivery

Our client is one of the biggest oil and gas conglomerates in India, contributing to around 75% of Indian domestic production. They have been in business for over 60 years, currently employing around 30,000 people. With decades of growth, they have entered into different ancillary companies and expanded globally. The expansion has led to several offices, branches, desks, and teams spread across geographies.

VMware Management Pack Update Release (20.5.1899.0)

The third update release for 2020 of our VMware Management Pack for Operations Manager is now released. Improvements include better performance, extended discoveries of properties, and vSAN monitoring. We also simplified the configuration and licensing experience and moved everything under the administration pane. This will require you to remove the old Licensing UI Management Packs before upgrading.

DevOps Toolchain Explained: What Is & How to Create One. Choosing Between Buying or Building Your Own Tools

Over the past few years, we’ve seen an almost obsession with developing and adopting CI/CD tools throughout the DevOps community. There are thousands of “how-to’s”, “top x tools”, and “tool x vs tool y” type articles, and it has gotten to the point where it’s quite difficult to figure out how and which one to pick as your own.

Customer Story: How App Nouveau Canada Creates Specialized Software with Sentry Error Monitoring

App Nouveau is a Canadian professional services company that builds transportation management system software. As developers of highly-specialized software solutions, App Nouveau needs a robust error monitoring tool to deliver world-class code required by its commercial clients. App Nouveau recently began using Sentry to uplevel a few key areas in the code development lifecycle. Chief Technical Officer Paito Anderson and his team decided to switch to Sentry just a few months ago.

File Integrity Monitoring: Detecting suspicious file activity inside a container

In this blog, we will explore suspicious file activity inside a container and see how to effectively implement a file integrity monitoring (FIM) workflow. We’ll also cover how Sysdig Secure can help you implement FIM for both containers and Linux hosts.