Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Remote pair programming: Tips, tools, and how to measure

Remote pair programming is an Extreme Programming (XP) methodology which is a part of the Agile software development model. It takes the principle of pair programming to the remote workplace. Pair programming leads to higher quality code and fewer bugs by making continuous code reviews and synchronous collaboration possible. In traditional pair programming, two programmers sit side by side in front of the same computer.

SQL Server, Part 1: Why you should monitor SQL logs

Over 44 records are stolen per second every day due to data breaches, and according to the Risk Based Security Research report published in 2019, databases are the top most targeted assets for malicious actors to exploit organizations’ confidential data. Often, organizations don’t realize their databases have been compromised for months. Once sensitive data is leaked, the damage can’t be undone.

Ride Down Into JavaScript Dependency Hell

Every JavaScript project starts ambitiously, trying not to use too many NPM packages along the way. Even with a lot of effort on our side, packages eventually start piling up. package.json gets more lines over time, and package-lock.json makes pull requests look scary with the number of additions or deletions when dependencies are added. “This is fine” — the team lead says, as other team members nod in agreement. What else are you supposed to do?

Azure Monitor (Part 9): Azure Service Health

Now that we’ve talked a lot about how to monitor your Azure resources, let’s talk about how to monitor Azure itself. As the classic statement goes, “there is no cloud – it’s just someone else’s computer” – and all computers can go down. Even Microsoft’s. So how do you know when poor availability or performance of your resources is actually a result of Azure itself being sick?

Hardening Windows security: How to secure your organization - Part 1

The cybersecurity threat landscape is quickly changing. Administrators have become more cautious when it comes to security and governing access, end users have become tech-savvy and security-aware, and attackers have also raised their game. Living-off-the-land attacks, or LOTL, is one clear trend today, with attackers exploiting preinstalled features and default tools built into system.

Coronavirus Software Making a Difference

When the harmful effects of the coronavirus pandemic began to accelerate globally, Axosoft wanted to step in and do what we could to help as an organization. While we have always offered GitKraken Pro license free for students, teachers, and nonprofits, we wanted to extend our offerings in these especially trying times. We recently announced the GitKraken Pro for a Cure Program, offering free GitKraken Pro licenses for teams of up to 25 developers working on a COVID-19 related project.

WFH tips: 7 ways to make your remote workshop a success

The COVID-19 pandemic has forced many companies to require employees to work from home. It’s a new normal for many, but at Grafana Labs our team has always recruited and operated with a remote-first culture in mind. To help everyone transition to a home office environment, we launched a new WFH series in which Grafana team members have been sharing their best advice for staying productive at home – yes, even if you have kids around.

Getting SRE Buy-in from a Manager or Lead for Incident Response, Part 1

Adopting SRE best practices can be difficult, especially when you need approval from managers, VPs, CTOs, and everything in between. In this blog series, we will walk you through how to come up with a winning pitch for each level of leadership to ensure that SRE buy-in will succeed in your organization. Let’s start at the beginning with your team lead or manager.

Securing Tekton pipelines in OpenShift with Sysdig

In this blog post, you’ll learn how to create a reusable Sysdig Secure image scanning task, for Tekton pipelines and Openshift clusters, that can be deployed in many pipelines. As a DevOps engineer, you want to deliver applications fast but keeping compliance with security standards like CIS, PCI DSS or NIST 800-190, GDPR can be an arduous task. You might implement image scanning in your CI/CD pipelines to detect and resolve issues such as known vulnerabilities and incorrect configurations.

Fighting COVID-19 One Kubernetes Cluster at a Time

Recently the leadership at Rancher Labs challenged all of us to think about ways we can contribute to the community during this current crisis. Coming up with ways to help in such an overwhelming situation is quite daunting. Since most needs are medical related, finding ways to apply software isn’t obvious. When I heard about Folding@home’s (FAH) efforts to reprioritize their computing resources toward COVID-19 research, I was immediately curious.