Steve Fenton

operations

You can subscribe to the operations tag micro-feed.

Uptime checker myth busting

Whether you use Pingdom, UpDn, Datadog, or some other platform to test if your website is up and running, you will need to keep in mind some common traps that are waiting to ensnare the unsuspecting. The idea behind an uptime checker is that it will visit your site frequently and report whether it managed […]

I saw a picture that hinted that DevOps was a substitute or successor for Agile. This made me consider the question “Is DevOps a replacement for Agile?”. It had a chart that represented time from left to right, and suggested that Agile was “waterfall with shorter iterations” and that DevOps was “agile with even shorter […]

Uptime and SLAs

This is a bonus post that follows up on some information that is useful if you read Web Operations Dashboards, Monitoring, and Alerting. This article is all about uptime and SLAs. Having helped a number of businesses understand what uptime and SLAs are, and how they work in real life, I have encountered a few […]

The Monitor Matrix

This is the last in a series of posts to share some techniques that I wrote about in Web Operations Dashboards, Monitoring, and Alerting. In this final bite-size chunk, I’m going to talk about the Monitor Matrix. Selecting monitors has a gradual evolution. You start off monitoring the things that everyone starts monitoring. You keep […]

The Monitor Selection Principles

This is one more article in a series of posts to share some techniques that I wrote about in Web Operations Dashboards, Monitoring, and Alerting. In this article, I’m going to talk about Monitor Selection Principles. While it can be tempting to start off by monitoring everything, and alerting every time something slightly odd happens, […]

The Alerting Principles

This is the next in a series of posts to share some techniques that I wrote about in Web Operations Dashboards, Monitoring, and Alerting. In this instalment, I’m going to talk about the Alerting Principles. When it comes to monitoring alerting is an area you will want to get right. There is a natural tension […]

The Incident Causation Principles

This is another in a series of posts to share some techniques that I wrote about in Web Operations Dashboards, Monitoring, and Alerting. In this article, I’m going to talk about incident investigations and the causations principles. When things go wrong, it may be that some internal trigger such as a software release or configuration […]

Log phishing attack

n an error log or HTTP log phising attack, a deliberately bad request is generated with a fake referer string. The hope is that the referer string will be displayed in your cool web-based log aggregation and monitoring service as a hyperlink – tempting operations teams to click on the link as it might explain […]