Operations | Monitoring | ITSM | DevOps | Cloud

Configure custom SSL certificate expiration thresholds

When we first launched Oh Dear, we had a fixed certificate expiration timer: 14 days. As soon as the expiration date came within 14 days, we'd start sending a daily reminder to hurry up and renew those certificates. Our first exception was made when Let's Encrypt gained more in popularity. We started notifying Let's Encrypt certificates 7 days before expiration date.

From Web Scale to Edge Scale: Rancher 2.4 Supports 2,000 Clusters on its Way to 1 Million

Rancher 2.4 is here – with new under-the-hood changes that pave the way to supporting up to 1 million clusters. That’s probably the most exciting capability in the new version. But you might ask: why would anyone want to run thousands of Kubernetes clusters – let alone tens of thousands, hundreds of thousands or more? At Rancher Labs, we believe the future of Kubernetes is multi-cluster and fully heterogeneous.

Business Payload Analyzer: How to Track and Trend Business KPIs

Business Payload Analyzer, a capability in Application Performance Management is designed for application owners who want greater visibility into how the end-user experience and business KPIs align with application performance to help prioritize issues based on user experience and improve the digital experience. In this video, we will demonstrate how to leverage Business Payload Analyzer to track and trend business KPIs. To learn more, visit broadcom.com/apm.

Business Payload Analyzer: How to Enable Custom Transaction Naming

Business Payload Analyzer, a capability in DX Application Performance Management is designed for application owners who want greater visibility into how the end-user experience and business KPIs align with application performance to help prioritize issues based on user experience and improve the digital experience. In this video, we will demonstrate how to enable custom transaction naming using Business Payload Analyzer. To learn more, visit broadcom.com/apm.

While You Work from Home, Double Down on Elasticsearch Security

As engineers, you and I have a responsibility to protect both our customers’ and our respective companies’ data. But unlike our office networks that adhere to strict security protocols and a well-defined perimeter, our home networks usually fall short. And now that most of us are at home waiting out the COVID-19 pandemic, it’s time to revisit of logging in and Elasticsearch security during while you work from home.