Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Dynamic alerts

The power and value that’s embedded in logs are reflected by the status and behavior of our applications and infrastructure. Many times we would like to be alerted when the application or its components show abnormal behavior. This behavior can be reflected by the application sending some logs at a higher than usual volume. Figuring out exactly what ‘higher than usual’ means, or in other words, setting the threshold value at which the alert should trigger can be a daunting task.

Launching Application Control Plus: Build an infallible stronghold against all application-related threats

We’re pleased to announce the debut of ManageEngine Application Control Plus, an application whitelisting, blacklisting, and privilege management solution. IT operations could come to a standstill if applications suddenly ceased to exist, but applications can be considered double-edged swords. As important as applications are, they also form the largest threat vectors in any network.

Hybrid Monitoring Platform Selection 101: Top 5 Capabilities to Look For

When looking for a new monitoring platform, the options available today can seem overwhelming. SaaS, on-premises, cloud-native… where do you even start? Below, find a breakdown of five key capabilities to be on the lookout for when comparing IT monitoring platforms. Although some of these capabilities are now must-haves for all platforms, certain providers still offer up richer feature sets and benefits.

Configuring YAML Files after Installing the ELK Stack

What is YAML? YAML is a readable data serialization language used frequently in configuration files for software; it stands for “Ain’t Markup Language.” This article will show you samples of YAML files (written .yml or .yaml) for the ELK Stack and other programs commonly used by DevOps team. And while some people love yaml and some hate it, it’s not going away.

Three Ways to Create Docker Images for Java

Long before Dockerfiles, Java developers worked with single deployment units (WARs, JARs, EARs, etc.). As you likely know by now, it is best practice to work in micro-services, deploying a small number of deployment units per JVM. Instead of one giant, monolithic application, you build your application such that each service can run on its own. This is where Docker comes in!

Enhancing Kubernetes Security with Pod Security Policies, Part 1

Kubernetes Pod Security Policies (PSPs) are a critical component of the Kubernetes security puzzle. Pod Security Policies are clusterwide resources that control security sensitive attributes of pod specification and are a mechanism to harden the security posture of your Kubernetes workloads. Kubernetes platform teams or cluster operators can leverage them to control pod creation and limit the capabilities available to specific users, groups or applications.

Artifactory Powers MicroEJ Forge IoT Application Store

Thousands of devices means thousands of software components, metadata items, and builds. Coordinating all that data for an Internet of Things system requires a binaries manager built for reliability and scale. That’s the challenge that faced MicroEJ, a software vendor of cost-driven solutions for embedded and IoT devices.

5 reasons why you should use EventBridge instead of SNS

SNS and SQS have been the goto options for AWS developers when it comes to service integration. However, since its (much needed!) rebranding, EventBridge (formerly CloudWatch Events) has become a popular alternative. If you’re still on the fence, then allow me to give you 5 reasons why you should consider using EventBridge instead of SNS.