Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Support for ESR 5.9 has ended: Upgrade to ESR 5.19 for improved security, performance, mobile app compatibility, and user experience

As of April 15, 2020, Mattermost Extended Support Release (ESR) version 5.9 is no longer supported. If any of your servers are not on ESR 5.19 or later, we highly recommend that you upgrade immediately. With our simple upgrade steps, it takes only a few minutes. Mattermost adopts a monthly tick-tock release cycle, with a new version shipping on the 16th of each month.

Cassandra Monitoring: 6 Best Practices to Pay Attention To

Apache Cassandra is an open-source, distributed database management system specifically built for organizations needing to handle large volumes of data, including when said data is spread across many commodity servers. Cassandra development began at Facebook but later became an open-source Apache project. Now, it’s widely used by some of the biggest enterprises, like Uber, Spotify, eBay, and smaller developer teams.

JFrog Visits with New York Stock Exchange About COVID-19

JFrog was honored to be recently interviewed by NYSE Floor Talk regarding the company’s efforts during the COVID-19 crisis. The quick video was shot at a safe social distance of course, but focused on JFrog’s FrogCare program. The program provides free software development and DevOps tools to accelerate delivery for research organizations that are supporting the fight against the novel coronavirus.

Feature Spotlight: Timeline

Lumigo’s Transaction Timeline lets you see in a glance the flow of a transaction across its components and the latency caused by each, allowing you to easily identify bottlenecks and issues. Distributed tracing is a popular method for monitoring and profiling transactions in a microservices architecture. It’s what developers use to pinpoint failures, performance drops and other problems.

Parsley Health: Bringing Telemedicine to the Front Lines

As a child with a cancer survivor and heart disease patient for parents, I developed a psychological discomfort for visiting hospitals and the doctor’s office in my adult years. For me, the feeling of restlessness while sitting in a waiting room coupled with fear of the medically unknown can create the perfect breeding grounds for stress and anxiety—and apparently, I’m not alone.

Why CloudZero is the next step on my journey to empower developers.

Innovation drives success. And today more than ever, software drives innovation. No matter what product or service you offer, you’re a software company. You may not sell something called “software,” but successfully building, marketing, delivering, and supporting customers for any product today relies on software and technology. Innovation is what software developers do. And software developers are at the center of what CloudZero does.

How to implement Prometheus long-term storage using Elasticsearch

Prometheus plays a significant role in the observability area. An increasing number of applications use Prometheus exporters to expose performance and monitoring data, which is later scraped by a Prometheus server. However, when it comes to storage, Prometheus faces some limitations in its scalability and durability since its local storage is limited by single nodes.

Five Ways AIOps Can Improve IT Incident Management

Artificial intelligence for IT operations (AIOps) is an emerging technology that can help IT operations teams make sense of operational data. As hybrid infrastructure and cloud-native technologies present new levels of complexity, AIOps is showing great promise in simplifying and transforming digital operations management. In our recent Tech Talk, Five Ways AIOps Can Transform Your Enterprise, OpsRamp’s Eric Cook spoke about the need for AIOps in today’s multi-cloud environments.

Profiling "VIP Accounts" Part 1

Detecting malicious activity is rarely easy, but some attacker methods are more challenging to detect than others. One of the most vexing techniques to counter is credential theft. Attackers that gain control over a user account have access to the assets of that user. If the credentials are for an account with special privileges, like a system administrator, then the attacker may be able to gain access to system-wide resources and even be able to change logs to cover their tracks.