Operations | Monitoring | ITSM | DevOps | Cloud

Interview

Video AMA: Ana Medina

Ana is currently working as a Chaos Engineer at Gremlin 10, helping companies avoid outages by running proactive chaos engineering experiments. She last worked at Uber where she was an engineer on the SRE and Infrastructure teams specifically focusing on chaos engineering and cloud computing. Catch her tweeting at @Ana_M_Medina 11 mostly about traveling, diversity in tech, and mental health.

Monitoring Microservices: IT's Newest Hot Mess

In this THWACKcamp session, you’ll learn how microservices are different from other applications, when performance bottlenecks most often occur, how they tend to break, and where you can add monitoring to stay ahead of trouble. You’ll also see how to extend existing infrastructure dashboards to include microservice workloads, cut troubleshooting time, and include new business metrics that measure the business goals driving microservices in the first place.

Six Ways to Improve Your Security Posture Using Critical Security Controls

Security policies within organizations are under a lot of scrutiny in today's times. Trying to stay up to date with these policies can create stress to users and the IT staff managing the infrastructure. Just like network standardization is a must, so is security standardization.

"Observability": Just a Fancy Word for "Monitoring"? A Journey From What to Why

Too often, monitoring is a never-ending arms race. We keep adding more monitoring in response to new problems, but the cycle never seems to end. Humans, (the business), drive new changes, which cause new problems, and need more, new monitoring. And that’s where real, useful observability may be able to help finally identify root cause and break the cycle of reactive monitoring for novel issues.

Monitoring Like a Network Engineer When You're a SysAdmin

Last year, we showed network engineers how to monitor like sysadmins. This year, we're flipping the script and showing systems administrators that there's nothing to fear from those network devices, and that monitoring them won't steal precious time from ensuring business services are up and users are happy.