Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

In the ChaosSearch era we solved the problem in 3 minutes

In the late afternoon of a beautiful June day, a last-minute customer error was threatening to derail the end of my work day. We received communication from the customer that was simply titled, “There’s a weird error message happening.” The customer included a screenshot of the interface with a nasty SQL error that was propagating to the surface.

Deploy packages from a Cloudsmith repository with Ansible

Ansible is an open source continuous configuration automation (CCA) tool. You can use it to automate the management of the configuration of host systems. For example: installing and configuring applications, services, security policies; or to perform a wide variety of other administration and configuration tasks.

Through the Crisis: Nexthink Customer Stories (BG Engineering)

Nexthink is incredibly proud to be able to present yet another installment of our Through the Crisis series, in which our customers share their IT challenges and successes from the COVID-19 crisis. In this installment, Yves Habersaat (software engineer, BG Consulting Engineers) explains how his organization leveraged Nexthink to affect a significant update of their IT estate during the early stages of the pandemic.

Looking Forward with Legacy Application Logging

When developers think of log files and log analysis, their minds typically transports into the world of contributing factors and incident remediation. However, analyzing log events doesn’t always need to be about a specific bug and its corresponding resolution. In fact, log analysis can be a very useful resource for organizations looking to develop a more high-level and large-scale plan for their application moving forward.

InfluxDB Endpoint Security State Template

Our team recently discovered an exposed endpoint without authentication enabled, though we know it had previously been required. The root cause was a missing configuration as a result of a recent upgrade a few weeks earlier, and was easy to fix by simply enabling the configuration parameter correctly. We needed a way to catch this type of issue quickly going forward, for this and for other public endpoints, which should be secure by default. Here is how we solved it.

Operationalizing HashiCorp Vault: Introducing a New Splunkbase App to Monitor Vault

We are excited to announce the availability of the Splunk App for HashiCorp Vault. Using this app, organizations can seamlessly ingest and visualize performance metrics and audit logs in Splunk to investigate, monitor, analyze and act on Vault data across DevSecOps use cases.

Business Intelligence Group's 2020 Fortress Cyber Security Award for Threat Detection goes to...

We are excited to share that ManageEngine’s Log360 has been awarded the 2020 Fortress Cyber Security Award for Threat Detection. The Business Intelligence Group’s unique scoring system measures performance across multiple business domains.

Datadog API client libraries now available for Java and Go

Client libraries are collections of code that make it easier for developers to write flexible and efficient applications that interface with APIs. Datadog provides client libraries so you can programmatically interact with our API to customize dashboards, search metrics, create alerts, and perform other tasks. We’re pleased to announce that we’ve developed and open-sourced two new client libraries for Java and Go in addition to our existing Ruby and Python libraries.

Get alerts in Microsoft Teams with our newest integration

What tool does your staff use most to communicate? If you’re like a lot of other companies, you may have recently started using Microsoft Teams. In April of 2020, Microsoft reported having 75 million users with a push of 31 million new users due to the COVID-19 stay-at-home orders. At Uptrends, we think it is important that our customers can get their monitoring alerts using the communication channels they use most, so we’ve added a new Microsoft Teams integration.

Detect Content Security Policy (CSP) violations with Raygun

A Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross-Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement to the distribution of malware. Whilst blocking attacks is important, it is also useful to be notified of attacks when they happen. A breach could bring your organization to a halt — from broken webpages to data breaches.