NewRelic: Effective Alerting in Practice

Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech blog at DevOps School, travel stories at Holiday…

Read More

Most Popular Supply Chain Management Software

What is supply chain management? Supply chain management (SCM) is the strategic planning and coordination of all activities involved in sourcing, procurement, conversion, and logistics to ensure…

Read More

Apache Lucene Query Example

Lucene query cheatsheet Basic Search Boolean Operators Wildcard Searches Fuzzy Searches Proximity Searches Range Searches Regular Expressions Boosting Terms Field-Specific Searches Grouping How to search Apache HTTPD…

Read More

Google Cloud: Step by Step Tutorials for setting up Multi-cluster Ingress (MCI)

Steps: Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech blog at DevOps School, travel stories at…

Read More

What is Multi-cluster Ingress (MCI)

Multi-cluster Ingress (MCI) is an advanced feature typically used in cloud computing environments that enables the management of ingress (the entry point for external traffic into a…

Read More

What is OpenSearch?

OpenSearch is an open-source search and analytics suite, derived from Elasticsearch 7.10.2 and Kibana 7.10.2. It’s designed to provide distributed search, analytics, and visualization capabilities across large…

Read More

How Email Marketing and Website Development Join Forces to Redefine Marketing Success

When was the last time you checked your email? Whether it was to catch up with friends, receive updates from your favorite brands, or stay informed about…

Read More

Newrelic Tutorials: Critical Violation

What is critical violation in new relic In New Relic, a “critical violation” occurs when a key performance indicator (KPI) or threshold, defined in your alert policies,…

Read More

What is custom software development?

Custom software development is about creating unique programs and applications. They are designed to meet the specific needs of a business or organization. Unlike off-the-shelf software, custom…

Read More

Best Cloud-based Control Panel to Manage Servers and Websites

Choosing the best cloud-based control panel depends on your technical expertise, budget, and server management needs. Here’s a breakdown of some popular options to help you decide:…

Read More

How to Choose Your Hosting Smartly. Step by Step Guide

Selecting the right web hosting provider is crucial for your website’s success. It sets the foundation for speed, security, and overall user experience. Here’s a step-by-step guide…

Read More

Top 5 WordPress Hosting to Consider

Selecting the ideal WordPress hosting is pivotal for the success and smooth operation of your website. Whether you’re launching a new site or considering a hosting switch,…

Read More

Google Cloud: Step by Step Guide to create Application Load Balancers in Google cloud

Step by Step Guide to create Application Load Balancers in Google cloud and allow HTTP and HTTPS both port to the vm running on 3000 port Creating…

Read More

What are the Authentication type in phpmyadmin which for config.inc.php

In phpMyAdmin, the authentication type determines how users are authenticated when they try to access the phpMyAdmin interface. This setting is configured in the config.inc.php file of…

Read More

Lampp commands line reference with example

List of all command with options for /opt/lampp/lampp Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech…

Read More

List of Employee Background Check Company in Europe

Creating a list of employee background check companies in Europe that includes organizations not primarily known for this service, such as DevOpsSchool and Cotocus, requires a blend…

Read More

List of Employee Background Check Company in USA

HireRight HireRight is a well-known provider in the USA offering comprehensive background check services across various industries. Their extensive range of checks ensures businesses can make informed…

Read More

List of Employee Background Check Company in India

Quinfy Quinfy is known for offering global background verification services with a wide reach and comprehensive solutions across various industries including IT and healthcare. They specialize in…

Read More

Maximizing ROI with DevOps Implementation Services

In today’s fast-paced digital landscape, businesses must adapt quickly to stay competitive. DevOps implementation services have emerged as a game-changer, revolutionizing the way software is developed and…

Read More

How to collect the metrics of java application jar file using JMX and Datadog

Collecting metrics from a Java application using Java Management Extensions (JMX) and Datadog involves several steps, which include setting up JMX in your Java application, configuring Datadog…

Read More

How to migrate all the traffic from one to another port

I am running my app on 10.3.23.23:3000 but the i would like to access at 80 port instead 3000 but the same time i dont want to…

Read More

Networking Fundamental: Difference between Switches & Routers

Switches and routers are both critical components of networking infrastructure, but they serve different functions within a network. Understanding the difference between them is fundamental to grasping…

Read More

Networking Fundamental: What is network switches

A network switch is a piece of hardware that sits at the heart of a computer network. Imagine it as a central hub that allows different devices…

Read More

DevSecOps: Your AWS Abuse Report – scanning remote hosts on the internet for security vulnerabilities

Incidents It has been implicated in activity which resembles scanning remote hosts on the internet for security vulnerabilities. Activity of this nature is forbidden in the AWS…

Read More

Secrets Manager: Managing configurations, secrets, and parameters in AWS, Azure and Google Cloud

AWS Systems Manager Parameter Store AWS Secrets Manager AWS Config AWS AppConfig Key Practices for Managing Configurations and Secrets in AWS: Google Cloud: Azure: Rajesh KumarI’m a…

Read More

Google Cloud DNS Tutorials

Google Cloud DNS is a scalable, reliable, and managed authoritative Domain Name System (DNS) service running on the same infrastructure as Google. It provides a way for…

Read More

Elastic Agent Commands Reference

Start Elastic Agent Stop Elastic Agent Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech blog at…

Read More

What is Elastic Agents, Its Feature and How it works?

What is Elastic Agent: Elastic Agent is a unified tool that simplifies adding monitoring capabilities to your systems. It can collect various data types, including logs, metrics,…

Read More

Difference Between Beats and Elastic Agent

Beats and Elastic Agent are both data shippers used within the Elastic Stack, a set of tools for searching, analyzing, and visualizing log data in real time….

Read More

DevOpsSchool Youtube’s Membership Plan

Step 1 – Open this channel https://www.youtube.com/channel/UCrXr49kBvXJeQMMl2693c4g Step 2 – Find it out Join Button Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I…

Read More