Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

LDAP authentication with Sensu Go: troubleshooting & tips

SSO is often accomplished by using Lightweight Directory Access Protocol (LDAP). While LDAP has a variety of use cases, in this post, I’ll focus on authentication — specifically, how to use LDAP authentication for single-sign on (SSO) with Sensu Go. First off, a quick overview of Sensu authentication.

Going Serverless: Best Practices

Making the move to serverless architecture? By accelerating app development time, serverless isn’t just a boon for business, it’s also a win for engineering teams. Gartner explains: “Serverless architectures enable developers to focus on what they should be doing — writing code and optimizing application design — making way for business agility and digital experimentation.”

Accenture and ServiceNow reimagine the future of business

Accenture and ServiceNow’s new partnership accelerates digital transformation and time to value for customers. Today’s business environment demands digitization. Specifically, digital workflows that transform how employees work, how customers receive service, and how work, well, flows. That’s because in the COVID-19 era, organizations are under pressure to innovate faster, reduce costs, improve productivity, and meet their customers’ needs.

TLDR InfluxDB Tech Tips; Creating Buckets with the InfluxDB API

Whether you’re using InfluxDB Cloud or InfluxDB OSS, the InfluxDB API provides a simple way to interact with your InfluxDB instance. The InfluxDB v2 API offers a unified approach to querying, writing data to, and assessing the health of your InfluxDB instances. In today’s Tech Tips post, we’re learning about how to create and list buckets. Buckets are named locations in InfluxDB where time series data is written to.

TLDR InfluxDB Tech Tips; Creating Tokens with the InfluxDB API

Whether you’re using InfluxDB Cloud or InfluxDB OSS, the InfluxDB API provides a simple way to interact with your InfluxDB instance. The InfluxDB v2 API, the read and write portions are available with InfluxDB v1.8+, offers a unified approach to querying, writing data to, and assessing the health of your InfluxDB instances. In today’s Tech Tips post, we learn how to create and list authentication tokens. Tokens provide secure data flow between an InfluxDB instance and its users.

Introducing Splunk Real User Monitoring (RUM)

A few days ago, I tried ordering lunch from a local restaurant. I went online, spent time looking at their menu, chose a few items, clicked “submit” and… got an error message. This experience is not unique. Earlier this week, when I tried to read the news, I got a message saying they’re experiencing a technical issue. You can see both messages below: We’ve all experienced such situations, and they can be very frustrating.

AWS Distro for OpenTelemetry will send metrics and traces to Datadog

Datadog has a long-standing commitment to open standards. Our integrations with OpenMetrics, JMX, and WMI, as well as our implementation of the tried-and-true StatsD protocol, enable you to collect data with the tools and libraries that fit best into your workflows.

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing pandemic, hackers are adopting advanced tactics that cleverly conceal their malicious intentions, and fly under the radar by leveraging the victim’s fear, anxiety, or plain negligence.

Web application performance monitoring: measuring and alerting

Everyone knows that web performance is everything for a quality user experience. Web performance affects conversion rates because users quickly form opinions based on a website’s or app’s responsiveness. In this article, we explore the importance of performance to your web application throughout the entire user journey, how to examine your web application performance results, and how to set up your web application monitoring to alert based on performance.

Track open source security exposure with Snyk and Datadog

Using open source code makes it easier to build applications, but the freely available nature of open source code introduces the risk of pulling potential security vulnerabilities into your environment. Knowing whether or not customers are actually accessing the vulnerable parts of your application is key to triaging security threats without spending hours fixing an issue that doesn’t affect end users.