Operations | Monitoring | ITSM | DevOps | Cloud

SLO, SLA, SLI Oh My! Creating them can be easy

Imagine you are driving a car on a freeway. Your speedometer is telling you you’re going 62 mph. But you “gotta go fast”. Faster than then 65 mph speed limit. So you go for it: first 68mph, then 75mph, then 80mph. Then you pass a police officer hiding in a speed trap. To your dismay, they pull you over and give you a ticket. All is not lost: there is a silver lining here.

AKS Cluster Performance: How to Better Operate Kubernetes in Azure

AKS is the managed service from Azure for Kubernetes. When you create an AKS cluster, Azure creates and operates the Kubernetes control plane for you at no cost. The only thing you do as a user is to say how many worker nodes you’d like, plus other configurations we’ll see in this post. So, with that in mind, how can you improve the AKS cluster performance of a service in which Azure pretty much manages almost everything?

11 Design Tools to Create Amazing Visual Content for Your Website

When you add high-quality images, infographics, videos, and other visual elements to your website, you don’t simply make it look more beautiful. You boost SEO, increase engagement, and make your content much more memorable. Great sites need amazing visual content.

What Your Website is Going to Lose if it is Not Secured

The very foundation of exchange between web & client-server protocol started with HTTP, where HTML form was the source of fetching resources - from documents to images. This extensible protocol was designed in the early '90s and has evolved over time. Cache or authentication is the main feature handled by HTTP which has never been compromised. Still, there are dangerous sites that are keen on corrupting the digital world.

How to use Mint, an awesome HTTP library for Elixir - Part 01

Mint is a shiny new Elixir package which allows you to make HTTP requests using the HTTP 1 and HTTP 2 protocols. It can transparently handle ALPN (Application Layer Protocol Negotiation), which essentially means that it can figure out if a server uses HTTP2 or HTTP1 on its own. It also comes with an optional dependency on a castore package which verifies the SSL certificates of the servers (that you connect to).

Building an AI-powered IT infrastructure

From an enterprise IT perspective, AI continues to prove its worth, as it makes an IT admin's life easier by automating help desk operations and providing real-time insights about potential security incidents, offering conversational assistance for efficient management of help desk requests, and providing preemptive solutions to customers’ problems using predictive analysis.

How We're Improving Error Grouping

Imagine that you are developing an application and there's an error in the code. When you release it to production, this error causes hundreds of thousands of crashes. In this case, a logging tool would list all the crashes but an error monitoring tool, like Rollbar, would attempt to group the crashes together. Now you would receive just one notification about an error that crashed hundreds of thousands of times instead of many notifications about different crashes.

Joe vs. the NetFlow Volcano - SolarWinds Lab Episode #76

Whether you’re curious if flow monitoring might be helpful, or you’ve been coalescing IPFIX streams of network-activity goodness for years, IT’s reliable, old hand has learned a few new tricks. In this episode, Head Geeks™ Patrick Hubbard and Leon Adato are joined by Principal Product Manager for NetFlow Traffic Analyzer, Joe Reves, to revisit the basics and rediscover why network engineers use flow monitoring in the first place.