operations

You can subscribe to the operations tag micro-feed.

I saw a picture that hinted that DevOps was a substitute or successor for Agile. This made me consider the question “Is DevOps a replacement for Agile?”. It had a chart that represented time from left to right, and suggested that Agile was “waterfall with shorter iterations” and that DevOps was “agile with even shorter […]

Uptime and SLAs

This is a bonus post that follows up on some information that is useful if you read Web Operations Dashboards, Monitoring, and Alerting. This article is all about uptime and SLAs. Having helped a number of businesses understand what uptime and SLAs are, and how they work in real life, I have encountered a few […]

The Monitor Matrix

This is the last in a series of posts to share some techniques that I wrote about in Web Operations Dashboards, Monitoring, and Alerting. In this final bite-size chunk, I’m going to talk about the Monitor Matrix. Selecting monitors has a gradual evolution. You start off monitoring the things that everyone starts monitoring. You keep […]

The Monitor Selection Principles

This is one more article in a series of posts to share some techniques that I wrote about in Web Operations Dashboards, Monitoring, and Alerting. In this article, I’m going to talk about Monitor Selection Principles. While it can be tempting to start off by monitoring everything, and alerting every time something slightly odd happens, […]

The Alerting Principles

This is the next in a series of posts to share some techniques that I wrote about in Web Operations Dashboards, Monitoring, and Alerting. In this instalment, I’m going to talk about the Alerting Principles. When it comes to monitoring alerting is an area you will want to get right. There is a natural tension […]

The Incident Causation Principles

This is another in a series of posts to share some techniques that I wrote about in Web Operations Dashboards, Monitoring, and Alerting. In this article, I’m going to talk about incident investigations and the causations principles. When things go wrong, it may be that some internal trigger such as a software release or configuration […]

Log Phising Attack

In an error log or HTTP log phising attack, a deliberately bad request is generated with a fake referer string. The hope is that the referer string will be displayed in your cool web-based log aggregation and monitoring service as a hyperlink – tempting operations teams to click on the link as it might explain […]