Introducing Notice Search
The ability to search through individual error events (we call them Notices) has been one of our most requested features. Today we are shipping an updated section to our Errors page that allows you to do exactly that.
The ability to search through individual error events (we call them Notices) has been one of our most requested features. Today we are shipping an updated section to our Errors page that allows you to do exactly that.
Certificates can be difficult to track and opaque to administrators, and if any expire without someone noticing, embarrassing outages can happen. At Grafana Labs we strive to make all things visible and observable; why should certificates be any exception? In this post we will explore an easy way to expose and monitor certificate expirations using Grafana and Prometheus.
Yesterday, we sent out notifications to all our clients that are affected by the Let's Encrypt mass revocation of SSL certificates. In this post, we'll share the details how we found those certificates. Now, the morning after, we're well rested and in good shape to do a proper write-up on the matter.
Over 100 million users across 400,000 organizations use Citrix virtual apps and desktops technologies for accessing different types of business applications. There are many software products for monitoring the availability, performance, and usage of Citrix technologies. Of these, Microsoft SCOM is the most popular.
Pandora FMS and Toshiba met each other on a cold winter morning, they exchanged looks and… This would be a great start to a love story, wouldn’t it? However, the relationship between Pandora FMS and Toshiba has a different nature: teamwork. By now you know Pandora FMS, don’t you? That flexible and complete monitoring software, with which you can monitor all your devices, from networks, servers, UX, IoT, applications or business processes, to virtual environments, etc.
Have you ever looked at your website logs and realized they don’t make sense to you? Maybe your log levels have been abused, and now every log categorizes as “Error.” Or your logs fail to give clear information on what went wrong, or they reveal sensitive information that hackers may harvest. Fixing these problems is possible! Let’s explore how you can write meaningful log messages and use log levels correctly.
Welcome to Stackify’s guide to C# exception handling. Why is this topic so important? In modern languages like C#, “problems” are typically modeled using exceptions. Jeff Atwood (of StackOverflow fame) once called exceptions “the bread and butter of modern programming languages.” That should give you an idea of how important this construct is.
For those out there searching for “What is syslog?,” this post has answers to all of your questions. Simply put, syslog handles a very important task—collecting events—and is present in almost all systems and peripherals out there. It’s the standard used to collect events in an ever-growing number of devices. Syslog can often be related to Ubuntu and servers, but it’s certainly much more than that.
During development, it's important to think about how your application will work with your databases. You can run into performance issues all the way through the stack, so you'll want to be mindful of how the data is being accessed. From the client to the database, there are layers where trouble may creep in.
There are three popular methods for running Kubernetes on AWS: manually set up everything on EC2 instances, use Kops to manage your cluster, or use Amazon EKS to manage your cluster. Managing a Kubernetes cluster on AWS without any tooling is a complicated process that is not recommended for most administrators, so we will focus on using EKS or Kops. In this blog post, we compare cluster setup, management, and security features for both Kops and EKS to determine which solution you should use.