Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

New in Grafana roles: Manage user permissions better with 'No basic role'

Since we introduced role-based access control (RBAC) in Grafana 9.0, users — and later, service accounts — have been required to have an assigned role that includes a basic set of permissions. This sometimes led organizations to create users and service accounts that had more permissions than necessary. As a result, Grafana administrators had to make additional adjustments to users’ permissions on a case-by-case basis.

Icinga 2 API with Let's Encrypt certificates, just for fun

In our community forum Michael already outlined the possibility to operate Icinga 2 with an external certification authority, not the one Icinga 2 generates by itself. Thomas, one of our NETWAYS colleagues, reported his experience in that field: in short, it’s easy to mess up lots of things and hard to debug them. And I absolutely agree. At the moment I’m reading TLS Mastery from Michael W. Lucas.

5 Tips For Consumers To Shop Safely This Black Friday

While it makes for bleak reading, the frenzy of sales and online shopping activity surrounding Black Friday, means this pre-holiday season is a key period for cybercriminals. And each year we see an increase in cyberattacks during what should be a feel-good time. With more consumers expected to be shopping online this year, the opportunity for fraudulent behaviour is rife. But that doesn’t mean we have to surrender to the risks of poor website security.

Navigating Security Challenges in Kubernetes Orchestration Platforms

As Kubernetes solidifies its position as the standard for container orchestration, it’s imperative to examine the associated security challenges. Kubernetes brings powerful capabilities to the enterprise and introduces new attack vectors and potential vulnerabilities. Here at Kublr, we sat down with our best experts to discuss how our team solves security challenges and how Kublr helps clients mitigate them.

Turkeys, Tech, and Table Settings: A Humorous Guide to IT Security at Thanksgiving Dinner

Let’s set the table a bit. As you know, in the U.S., Thanksgiving is coming up. And recently I had a conversation with my 83-year-old mother about Thanksgiving. Of course, we came across the inevitable parallels between Thanksgiving dinner and network security! That’s what you would be thinking when talking about Thanksgiving dinner with someone right? Before we dive into the feast, let me set the table.

Better when closer: the role of the data centre in your network

For those who remember the tech world before the COVID digitalisation gold-rush, the 2019 assertion by Gartner that 'The Data Centre Is (Almost) Dead, ruffled feathers. The report warned that by 2025, 80% of enterprises will shut down their traditional data centres. In fact, 10% of organisations already have. Then the pandemic hit and the global demand for world-class user experiences (for workforces and customers alike) exploded.

Defensive Instrumentation Benefits Everyone

A lot of reasoning in content is predicated on the audience being in a modern, psychologically safe, agile sort of environment. It’s aspirational, so folks who aren’t in those environments may feel like the path there includes doing “the new thing” or using “the new tool.” If you write software and your employer hasn’t caught up to all the newest, best ways to work, I hope this pragmatic post helps you sleep better at night.

Best Practices to Avoid Website Outages on Black Friday

The most frenzied shopping day of the year – Black Friday – is fast approaching, and businesses around the globe are bracing themselves. However, imagine this – a massive number of eager shoppers ready to snag the hottest deal, and just when your website should be working at its best, it crashes, leaving behind frustrated customers and potential revenue slipping through your virtual fingers. This scenario is not entirely fictional.

A Quick Guide To Google Cloud Platform (GCP) Tools

Over the past few years, Google has grown its cloud services to include more than 100 products and services. Today, Google Cloud rubs shoulders with the top two cloud service providers. Yet, managing a Google Cloud environment has become increasingly challenging as the platform expands its GCP tools. It’s not just Google Cloud. The same is true today for other leading public cloud providers. To its credit, Google Cloud provides plenty of tools to help you get the most out of the platform.

Canonical releases Charmed Kubeflow 1.8

Canonical, the publisher of Ubuntu, announced today the general availability of Charmed Kubeflow 1.8. Charmed Kubeflow is an open source, end-to-end MLOps platform that enables professionals to easily develop and deploy AI/ML models. It runs on any cloud, including hybrid cloud or multi-cloud scenarios. This latest release also offers the ability to run AI/ML workloads in air-gapped environments.