Operations | Monitoring | ITSM | DevOps | Cloud

Searching Certificate Transparency Logs (Part 2)

In the last post we discussed why we’re building our own Certificate Transparency (CT) search tool. There’s good background on the CT ecosystem in that post, so check it out if you haven’t. This post assumes a certain understanding of terminology covered previously. Now that we know where the CT logs live, and the different kinds of logs, we need to start reading them.

Critical Vulnerabilities in Linux and VMware Tools: What You Need to Know #patch

CVE 2025-11561 affects Red Hat Linux and other distributions, requiring configuration of the Kross local authentication plugin for mitigation. Linux updates differ by vendor, with some delays in addressing vulnerabilities. A VMware tools vulnerability is actively exploited, prompting a recommendation to upgrade to a supported Linux version. Additionally, CVE 2025-58438 presents a traversal vulnerability in Python libraries on both Windows and Linux, resolved by upgrading to version 5.5.0.1.

Lightweight Open-Source APM with OTel Demo (Grafana OpenTelemetry Community Call)

We’re back with the second Grafana OpenTelemetry Community Call! Join us as we continue exploring how to get observability into your apps and infrastructure with Grafana, powered by OpenTelemetry. In this session, we’ll walk through the basics of application monitoring using the OpenTelemetry Demo — a realistic example of a distributed system built on a fully open-source stack: Prometheus, Jaeger, and OpenSearch, with dashboards powered by Grafana.

Packaging Operations Runbooks with Puppet Edge Workflows

Puppet Edge Workflows, available with Puppet Enterprise Advanced, provide the orchestration tools to define multistep workflows to run against your infrastructure. This allows Puppet experts to create workflows that Ops teams can run without having deep Puppet language knowledge or the underlying infrastructure.

How to Choose the Best Synthetic Monitoring Solutions & Software

To have a fast and reliable experience digitally you would need to do more than resolving issues. This is why people prefer synthetic monitoring which simulates real user actions with regular intervals. Using this method, businesses can detect performance shortcomings and any technical issues. From testing website load to full flow checkout, everything can be tested before users face any issues.

The 7 Most Common Incident Mistakes (and How to Prevent Them)

The hidden blockers slowing down your incident response and how to remove them before they become reliability risks. Incidents rarely go wrong because of one big failure. Most of the time, it’s a handful of small, familiar mistakes that slow teams down, muddy communication, or create confusion in the heat of the moment. Fortunately, these mistakes are predictable and fixable.