spot_imgspot_imgspot_imgspot_img

Monitoring

SRE Tooling – Part 1 How and what

In our first post in this series, we discussed SRE and why it is an integral paradigm concerning modern-day operational functionality.  If you remember the principle of MADARR that we introduced in the first article, you will recognise that it is predicated on Observability. Without the correct and expansive...

7 great schemas to hang behind your desk

There's been a lovely amount of blog posts, articles, tutorials, eBooks, and Youtube videos about all kinds of IT-related topics. These sources help you If you're stuck with a programming-related issue. Or when you face trouble setting up your (cloud) infrastructure resources. Websites such as Stackoverflow provide valuable discussions...

What is SRE, and is it important?

Several buzzwords floating around in conversational circles have pushed themselves to the forefront to such an extent that they have gained some traction with the Recruiters. One that seems to have particularly piqued the Recruiter's interest is SRE, to the point that I now receive three or four calls...

5 Distributed Tracing Startups to Watch in 2022

The most valuable software and applications in the modern world aren’t just those that offer speed, automation, and efficiency. Instead, the most successful and beneficial are the ones that provide visibility, and security across applications. As modern software infrastructure becomes more complex and with changing business requirements, observability that...

How distributed tracing fills a critical gap in cloud-native monitoring

Modern applications are increasingly distributed in nature - that is, they follow the microservices model where a single application is decomposed into numerous independent, and interdependent services. This is great for reducing technical debt, and advancing innovation. However, with the complexity of distributed applications, diagnosing errors and performance issues...

Containers are the new Virtual Machines

There are still people in organizations that need to understand what a container is. And what the main benefits of container technology are. Although the concept is pretty old and the most famous container software (Docker) saw the light nearly a decade ago, this still holds true. Sometimes technical...

Marking sensitive data – here’s how

Companies that process information should classify their data assets to distinguish mission-critical data and publicly available data. Sensitive data requires better protection in terms of access control, storage, transfer, destruction, etc. This is true for organizations that primarily run in the cloud but also for the ones that operate...

Open source software in the cloud – from a closed door to an open world

Open-source software continues to be on the rise. Not only do consumers use very powerful applications in their daily lives, but companies as well. More and more organizations adopt open source solutions (in the cloud) to fulfill their business needs. The same is true for third-party dependencies and/or libraries...

Kubernetes monitoring – What metrics to look at when managing Kubernetes

Kubernetes is rapidly becoming the most popular container orchestrator in the modern IT environment. However, Kubernetes deployments are massive – extending up to several thousand containers. The large number of containers introduce several complexity and challenges in operations. The first step to manage Kubernetes effectively is to proactively detect...

Distributed tracing brings deeper observability

As organizations move towards service-oriented architectures and leave behind the monolithic workloads, they find themselves in uncharted territory. On the one hand, the microservices architecture makes development quicker and boosts collaboration among teams to deliver faster and meet SLAs. But, as workloads grow in size, they can become tough...