Operations | Monitoring | ITSM | DevOps | Cloud

%term

3 Reasons to Disable JavaScript Source Fetching in Sentry

When you’re using the Sentry JavaScript SDK, the source code and source maps are automatically fetched by scraping the URLs within the stack trace. While this is the default setting, the ability to disable JavaScript source fetching on a project-by-project basis has always been available. In our continued push to improve configuration accessibility and security, Sentry now allows you to control this feature organization-wide.

ManageEngine Extends Its SIEM Solution's Log Management Capabilities to the Cloud

PLEASANTON, Calif. - July 17, 2018 - ManageEngine, the real-time IT management company, today announced that it has extended the log management capabilities of its security information and event management (SIEM) solution, Log360, to the cloud.

Simplify Troubleshooting your IT Healthcare Virtual Architecture with Goliath Technologies

Virtual architecture is complex to standup and deploy, and when it comes to the ability of your support team to fix an issue it needs to be done fast and when possible – proactively. This is extremely important from the business user perspective in all organizations, but even more importantly in healthcare where there is another person’s health and possibly even their life on the line.

4 Steps to Monitor Your Cron Jobs Using PushMon

It is imperative to keep a close watch on all the Cron jobs you have defined on your system, this would include checking errors and validation of codes. For monitoring of defined Cron Jobs, a developer can use a “Hosted monitoring system” like PushMon. This kind of a system is defined as a push monitoring system as it depends on receiving signals from Cron jobs for monitoring and error notification. A system like PushMon has the following 4 steps in its monitor of your Cron job.

Docker image scanning - How to implement open source container security (part 2).

In this article we will cover Docker image scanning with open source container security / image scanning tools. We will explain how to to deploy and setup Docker image scanning: both on private Docker repositories, and as a CI/CD pipeline validation step. We will also explore ways of integrating image scanning with CI/CD tools like Jenkins, Kubernetes runtime configuration features and runtime security tools like Falco.

5 questions on the latest ITSM trends

Last month, Atlassian attended SITS 2018, The Service Desk and IT Show. We staffed a busy booth, demoing our software and learning about challenges facing the support managers, analysts, IT directors, and CTOs in attendance. Our own Principal Solutions Engineer, Paul Buffington, also spoke to an overflowing crowd about best practices for incident management. We sat down with Paul to get his thoughts on some of the most noteworthy ITSM trends.