Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Top 12 Advantages of Effective IT Monitoring Software

As a company’s IT systems develop and overlap in function, it becomes increasingly important that they be carefully monitored at all times. Active network monitoring helps to ensure central servers and systems are functioning as intended, while also allowing business management staff to keep an eye on employee activity in the process.

Tutorial: How to Use VMware Tanzu Mission Control to Remediate Kubernetes Vulnerability CVE-2020-8554

The upstream Kubernetes community recently discovered a security issue—CVE-2020-8554— affecting multitenant clusters that allows anyone who is able to create a ClusterIP service and set the spec.externalIPs field to intercept traffic to that IP address. There is no patch for this issue yet, and it can currently only be mitigated by restricting access to the vulnerable features.

Experience Your Data in 3D with Splunk VR

Ever wanted to see and experience your data in 3D? Splunk VR unlocks the third dimension for data visualizations, so you can naturally interact with visualizations in virtual reality and find insights faster than ever before. Use Splunk VR to give your workflow an infinite canvas, free your data exploration from limited monitor screens, and display as much information as you want around you.

5 effective IP tools for network discovery and troubleshooting

Inspecting complicated network issues shouldn’t require you to switch between multiple tabs and network records. Solving these issues often boils down to finding the IP addresses of a network entity. Be it a desktop, server, port, or some other entity, its IP address gives you much-needed insight into details like its asset tag, interface specifics, user, and device type. This information helps you get to the bottom of network issues, aiding in effective troubleshooting.

Automate vulnerability analysis with the Datadog GitHub Action

To enhance and automate your vulnerability analysis, we’re excited to launch the Datadog Vulnerability Analysis GitHub Action. The action enables easy integration between your application, Datadog Continuous Profiler, and Snyk’s vulnerability database to provide actionable security heuristics. The action can be installed directly from the GitHub Marketplace, and does not require you to manage any additional scripts or infrastructure.

Using the DigitalOcean Container Registry with Codefresh

DigitalOcean has just announced the DigitalOcean Container Registry, which is directly integrated into the DigitalOcean Dashboard. While you can use any Container Registry in your DigitalOcean resources, the goal of the Container Registry is to provide for easy connection between the Container Registry and DigitalOcean Kubernetes resources.

The 7 cultural values that drive Grafana Labs

At Grafana Labs, we believe that our culture is one of the differentiators that make us an extraordinary company. In the middle of a pandemic, we’ve been in the very fortunate position to be in a high-growth phase: We’ve expanded the team by 118% this year, and our headcount just tipped over 250 global Grafanistas.