Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

A List of the Best Open Source Threat Intelligence Feeds

Threat intelligence feeds are a critical part of modern cybersecurity. Widely available online, these feeds record and track IP addresses and URLs that are associated with phishing scams, malware, bots, trojans, adware, spyware, ransomware and more. Open source threat intelligence feeds can be extremely valuable—if you use the right ones. While these collections are plentiful, there are some that are better than others.

Announcing our new $11M Series B funding

Nearly eight years ago, Cory and I started on a journey to help developers build software quickly and painlessly. As software developers ourselves, we had felt the pain of being afraid to ship and spending late nights tracking down bugs. In 2013, we launched Rollbar into the world so that developers could build software faster, shipping often without fear. These days, lots of people talk about continuous delivery, and nearly all of them focus on automating releases.

Pro tip: How to monitor client certificate expirations with Prometheus

Certificates can be difficult to track and opaque to administrators, and if any expire without someone noticing, embarrassing outages can happen. At Grafana Labs we strive to make all things visible and observable; why should certificates be any exception? In this post we will explore an easy way to expose and monitor certificate expirations using Grafana and Prometheus.

Defer Mode in Azure Service Bus Queues and Topic Subscriptions

Azure Service Bus is a brokered messaging service offered by Azure that can be used to decouple the various applications forming the business integration solving the business problem. The Applications transfer messages between them to share the data between them. The messages can be in XML, JSON or simple text format.

How we identified clients with SSL certificates affected by Let's Encrypt mass-revocation

Yesterday, we sent out notifications to all our clients that are affected by the Let's Encrypt mass revocation of SSL certificates. In this post, we'll share the details how we found those certificates. Now, the morning after, we're well rested and in good shape to do a proper write-up on the matter.

3 Things We Learned from EMA About AIOps and the Automation Handshake

AIOps is the trendy cool new kid on the block in the IT operations world. No doubt about it. However, with all the buzz surrounding AIOps, it’s easy to skip over some of the basics. How many IT operations professionals can clearly define what AIOps is? Beyond the baseline definition, why should you care? What about plugging it into your existing automation and analytics ecosystem?

Asset Management On-Boarding and Off-Boarding Users: 3 Keys to an Off-Boarding Process

A friend of mine recently shared an experience with me that he had while working as a manager for a software manufacturer. The experience was about an employee he had to terminate. He told me that after meeting with the employee and HR, he completed the paperwork that was required and sent it back to the HR department. Six months later, he received an email from finance giving him an overview of the expenses for his department.

Citrix SCOM Management Pack is Reaching EOL - eG Innovations Can Help!

Over 100 million users across 400,000 organizations use Citrix virtual apps and desktops technologies for accessing different types of business applications. There are many software products for monitoring the availability, performance, and usage of Citrix technologies. Of these, Microsoft SCOM is the most popular.

Pandora FMS and Toshiba: a success story in hospitality business

Pandora FMS and Toshiba met each other on a cold winter morning, they exchanged looks and… This would be a great start to a love story, wouldn’t it? However, the relationship between Pandora FMS and Toshiba has a different nature: teamwork. By now you know Pandora FMS, don’t you? That flexible and complete monitoring software, with which you can monitor all your devices, from networks, servers, UX, IoT, applications or business processes, to virtual environments, etc.