Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Five cybersecurity best practices to follow in 2019

Research by Cybersecurity Ventures predicts ransomware alone will cost businesses around the world more than $11.5 billion in 2019. What’s worse, this same study also predicts businesses will experience a cyberattack every 14 seconds by 2019, up from once every 40 seconds in 2016. So what can you do to mitigate the increasing threat of cyberattacks? Here are five IT security best practices that can help.

Grafana 5.3.3 and 4.6.5 released with important security fix

Today we are releasing Grafana 5.3.3 and 4.6.5. These patch releases include an important security fix for all Grafana installations between 4.1.0 and 5.3.2. We also release 5.3.4 at the same time containing some fixes and improvements that we have been holding off for a while to release 5.3.3.

Using AppDynamics Business iQ to Uncover Airline Competitive Seat-Blocking

At AppDynamics, we frequently talk about how insights derived from application performance metrics can help achieve favorable business outcomes. It’s easy to imagine how this would be the case with a slow e-commerce application or full-blown outage, but there are many other use cases that don’t readily come to mind.

Falco 0.13.0 Released: Kubernetes Audit Events Support

We recently released Falco 0.13.0, which is probably the most exciting release since Falco’s 0.1.0 release almost two and a half years ago. With 0.13.0, we’re adding support for a second stream of events — Kubernetes Audit Events. This release also lays the groundwork for additional event sources to be easily added.

WebLogic Smart Dashboard and Monitoring-A Tool for WebLogic Administrators by Rounak Agrawal

I have been working on WebLogic server for more than 3 years. I do monitor server log files, Server status, Data source , JMS servers, deployed application status, CPU/Memory usage and much more J2EE applications related metrics. This was a repetitive task for me checking manually everything on console .I always thought of writing some scripts , even i wrote one Jython script which was giving HTML formatted report.

SLF4J: 10 Reasons Why You Should Be Using It

One of the most important aspects of developing an efficient system is to have clean, helpful logs that will help you understand what errors are being triggered, and what information is being processed. When you are first creating an application, you might not know what logging framework will be most suitable for your future needs, or you could simply want your system to remain agnostic regarding the logging implementation to be used.

timeShift(GrafanaBuzz, 1w) Issue 68

The team was busy speaking at events in Europe and the US this week, showing off new Grafana features and talking about what’s to come. Check out the presentation on logging in Grafana below; we’ll share the video once it’s available. Also in this week’s issue we have 2 new plugins to share, and your weekly dose of Grafana related blog articles and videos.

Check Root Access Keys Action

Still referencing Best Practices for Managing AWS Access Keys, best practices recommends that root access keys are never used and should be completely removed from your AWS account. Instead, IAM users with limited permissions should be used. In fact, Skeddly even prevents root access keys from being registered with Skeddly. We always recommend using IAM third-party roles, however, access keys can still be used. And we only allow IAM user access keys to be registered.