NewRelic: Effective Alerting in Practice
Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech blog at DevOps School, travel stories at Holiday…
Most Popular Supply Chain Management Software
What is supply chain management? Supply chain management (SCM) is the strategic planning and coordination of all activities involved in sourcing, procurement, conversion, and logistics to ensure…
Apache Lucene Query Example
Lucene query cheatsheet Basic Search Boolean Operators Wildcard Searches Fuzzy Searches Proximity Searches Range Searches Regular Expressions Boosting Terms Field-Specific Searches Grouping How to search Apache HTTPD…
Google Cloud: Step by Step Tutorials for setting up Multi-cluster Ingress (MCI)
Steps: Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech blog at DevOps School, travel stories at…
What is Multi-cluster Ingress (MCI)
Multi-cluster Ingress (MCI) is an advanced feature typically used in cloud computing environments that enables the management of ingress (the entry point for external traffic into a…
What is OpenSearch?
OpenSearch is an open-source search and analytics suite, derived from Elasticsearch 7.10.2 and Kibana 7.10.2. It’s designed to provide distributed search, analytics, and visualization capabilities across large…
How Email Marketing and Website Development Join Forces to Redefine Marketing Success
When was the last time you checked your email? Whether it was to catch up with friends, receive updates from your favorite brands, or stay informed about…
Newrelic Tutorials: Critical Violation
What is critical violation in new relic In New Relic, a “critical violation” occurs when a key performance indicator (KPI) or threshold, defined in your alert policies,…
What is custom software development?
Custom software development is about creating unique programs and applications. They are designed to meet the specific needs of a business or organization. Unlike off-the-shelf software, custom…
Best Cloud-based Control Panel to Manage Servers and Websites
Choosing the best cloud-based control panel depends on your technical expertise, budget, and server management needs. Here’s a breakdown of some popular options to help you decide:…
How to Choose Your Hosting Smartly. Step by Step Guide
Selecting the right web hosting provider is crucial for your website’s success. It sets the foundation for speed, security, and overall user experience. Here’s a step-by-step guide…
Top 5 WordPress Hosting to Consider
Selecting the ideal WordPress hosting is pivotal for the success and smooth operation of your website. Whether you’re launching a new site or considering a hosting switch,…
Google Cloud: Step by Step Guide to create Application Load Balancers in Google cloud
Step by Step Guide to create Application Load Balancers in Google cloud and allow HTTP and HTTPS both port to the vm running on 3000 port Creating…
What are the Authentication type in phpmyadmin which for config.inc.php
In phpMyAdmin, the authentication type determines how users are authenticated when they try to access the phpMyAdmin interface. This setting is configured in the config.inc.php file of…
Lampp commands line reference with example
List of all command with options for /opt/lampp/lampp Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech…
List of Employee Background Check Company in Europe
Creating a list of employee background check companies in Europe that includes organizations not primarily known for this service, such as DevOpsSchool and Cotocus, requires a blend…
List of Employee Background Check Company in USA
HireRight HireRight is a well-known provider in the USA offering comprehensive background check services across various industries. Their extensive range of checks ensures businesses can make informed…
List of Employee Background Check Company in India
Quinfy Quinfy is known for offering global background verification services with a wide reach and comprehensive solutions across various industries including IT and healthcare. They specialize in…
Maximizing ROI with DevOps Implementation Services
In today’s fast-paced digital landscape, businesses must adapt quickly to stay competitive. DevOps implementation services have emerged as a game-changer, revolutionizing the way software is developed and…
How to collect the metrics of java application jar file using JMX and Datadog
Collecting metrics from a Java application using Java Management Extensions (JMX) and Datadog involves several steps, which include setting up JMX in your Java application, configuring Datadog…
How to migrate all the traffic from one to another port
I am running my app on 10.3.23.23:3000 but the i would like to access at 80 port instead 3000 but the same time i dont want to…
Networking Fundamental: Difference between Switches & Routers
Switches and routers are both critical components of networking infrastructure, but they serve different functions within a network. Understanding the difference between them is fundamental to grasping…
Networking Fundamental: What is network switches
A network switch is a piece of hardware that sits at the heart of a computer network. Imagine it as a central hub that allows different devices…
DevSecOps: Your AWS Abuse Report – scanning remote hosts on the internet for security vulnerabilities
Incidents It has been implicated in activity which resembles scanning remote hosts on the internet for security vulnerabilities. Activity of this nature is forbidden in the AWS…
Secrets Manager: Managing configurations, secrets, and parameters in AWS, Azure and Google Cloud
AWS Systems Manager Parameter Store AWS Secrets Manager AWS Config AWS AppConfig Key Practices for Managing Configurations and Secrets in AWS: Google Cloud: Azure: Rajesh KumarI’m a…
Google Cloud DNS Tutorials
Google Cloud DNS is a scalable, reliable, and managed authoritative Domain Name System (DNS) service running on the same infrastructure as Google. It provides a way for…
Elastic Agent Commands Reference
Start Elastic Agent Stop Elastic Agent Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I have worked at Cotocus. I share tech blog at…
What is Elastic Agents, Its Feature and How it works?
What is Elastic Agent: Elastic Agent is a unified tool that simplifies adding monitoring capabilities to your systems. It can collect various data types, including logs, metrics,…
Difference Between Beats and Elastic Agent
Beats and Elastic Agent are both data shippers used within the Elastic Stack, a set of tools for searching, analyzing, and visualizing log data in real time….
DevOpsSchool Youtube’s Membership Plan
Step 1 – Open this channel https://www.youtube.com/channel/UCrXr49kBvXJeQMMl2693c4g Step 2 – Find it out Join Button Rajesh KumarI’m a DevOps/SRE/DevSecOps/Cloud Expert passionate about sharing knowledge and experiences. I…
