Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Announcing Our Series A

It’s Friday at about quitting time, and my plans for the evening involved a great cocktail, hanging out with friends, and maybe continuing to binge The Office. Sadly, there was a problem. Our alerting system detected an enormous and immediate spike in errors. The error description was along the lines of “table ‘servers’ does not exist” and thousands of customers couldn’t use a large cloud provider’s services.

Spam In the Browser

A new kind of spam is being observed in the field that uses the browser notification feature to trick users into subscribing to sites that will in turn bombard users with notifications usually related to click or add profit schemes. Subscription notification request seen below: Browser notification subscription requests are a legitimate feature that allows visitors of a site to be notified when there is new content available. It saves users the need to constantly refresh or keep open browser tabs.

What is Code Profiling? Learn the 3 Types of Code Profilers

At Stackify, we’re all about helping you improve your application’s performance. We have actually developed two code profilers ourselves. Because of that, we like to think we know a thing or two about code profiling. Today I want to talk about the three different types of code profilers, describe the differences between them, and recommend some tools for your toolbox.

Ubuntu 20.04 LTS to enforce stronger TLS v1.2 encryption by default

In Ubuntu 20.04 LTS, the OpenSSL 1.1.1f library has been modified to use Security Level 2 by default (previous versions of Ubuntu use Security Level 1). Security Level 2 guarantees that protocols, key exchange mechanisms, cipher suites, signature algorithms, certificates and key sizes provide a minimum of 112 bits of message secrecy. In practice, it means that RSA keys are required to be at least 2048 bits long and ECC keys at least 224 bits using the SHA256 certificate signature algorithm.

FIPS certification for Ubuntu 18.04 LTS

Canonical has received FIPS 140-2, Level 1 certification for cryptographic modules in Ubuntu 18.04 LTS, with FIPS-validated OpenSSL-1.1.1. modules included. This certification enables organisations to meet compliance requirements within the public sector, healthcare and finance industries when utilising Ubuntu 18.04 LTS within public and private cloud environments. Canonical worked with U.S. Government and BSI accredited laboratory, atsec information security, for the 18.04 LTS FIPS certification.

How to Run a Time Series Database on Azure

Today we’re pleased to announce the general availability of InfluxDB Enterprise on Microsoft’s Azure Marketplace. We’ll dive into all of these below, but first, let’s take a step back in case you’re not familiar with time series databases. If you’re looking for a time series database, here are three things to look for.

Elasticsearch Service on Google Cloud Marketplace: New ways to purchase and discover

Last year we announced an expanded partnership with Google to bring Elasticsearch Service to even more Google Cloud users. We were also named one of Google Cloud's partners of the year! We've since deepened our partnership, and today we are proud to announce new ways to purchase and discover Elasticsearch Service in the Google Cloud Marketplace. You can now purchase monthly Gold and Platinum subscriptions as well as Standard, Gold, and Platinum annual subscriptions through the marketplace.

Exploring Jaeger traces with Elastic APM

Jaeger is a popular distributed tracing project hosted by the Cloud Native Computing Foundation (CNCF). In the Elastic APM 7.6.0 release we added support for ingesting Jaeger traces directly into the Elastic Stack. Elasticsearch has long been a primary storage backend for Jaeger. Due to its fast search capabilities and horizontal scalability, Elasticsearch makes an excellent choice for storing and searching trace data, along with other observability data such as logs, metrics, and uptime data.

9 Low-Cost or Free Cybersecurity Training Resources

When it comes to cybersecurity, the landscape is constantly changing: the number of cyberattacks is always on the rise, the attacks themselves are becoming more sophisticated, and there’s a serious skills shortage in the industry. There’s a lot to learn about cybersecurity if you want to keep up and keep your users protected.