Operations | Monitoring | ITSM | DevOps | Cloud

%term

A Closer Look at Falco CVE-2019-8339

Recently, a member of the Falco community privately disclosed a capacity related vulnerability which, under circumstances where a malicious actor has already gained access to your system, could allow the actor to further bypass Falco’s detection of abnormal activity. The final details are still being worked out, but we believe the CVE will be classified as Medium severity according to the CVSS methodology.

Falco 0.15.0 Released

We are happy to announce the release of Falco 0.15.0. This release incorporates a number of improvements, as well as bug fixes, and rules updates. This release also includes a mitigation for CVE-2019-8339, and all users are encouraged to update to this release. You can find more details about the features and improvements in the release notes, but below are a few highlights.

Solr Monitoring Made Easy with Sematext

As shown in Part 1 Solr Key Metrics to Monitor, the setup, tuning, and operations of Solr require deep insights into the performance metrics such as request rate and latency, JVM memory utilization, garbage collector work time and count and many more. Sematext provides an excellent alternative to other Solr monitoring tools.

Solr Open Source Monitoring Tools

Open source software adoption continues to grow. Tools like Kafka and Solr are widely used in small startups, ones that are using cloud ready tools from the start, but also in large enterprises, where legacy software is getting faster by incorporating new tools. In this second part of our Solr monitoring series (see the first part discussing Solr metrics to monitor), we will explore some of the open source tools available to monitor Solr nodes and clusters.

Broadridge Financial uses Mattermost for secure enterprise-grade DevOps collaboration

After moving to Mattermost, a major financial services firm was able to increase developer productivity and organizational alignment without compromising on security. For years, the firm had been relying on a well-known instant messaging application for enterprise communication. Not only was the platform nearing its end-of-life, it fell short elsewhere for several reasons: conversations were slow, chat histories weren’t always persistent and compliance was difficult to achieve.

5 Critical Shortcomings of Traditional BI Tools

Business Intelligence (BI) tools have taken the business world by storm. According to new research, over 80% of executives believe that tools such as advanced visualization, dashboards, and reporting are critical tools when it comes to parsing data. However, many end users aren’t bringing in those dashboards because they really use them, rather they are hoping to get a sense of security (incorrectly) that they will know everything about their business.

Rails Migration A Complete Guide

A Rails migration is a tool for changing an application’s database schema. Instead of managing SQL scripts, you define database changes in a domain-specific language (DSL). The code is database-independent, so you can easily move your app to a new platform. You can roll migrations back, and manage them alongside your application source code.

Key Kubernetes Concepts

Cloud computing, containerization, and container orchestration are the most important trends in DevOps. Whether you’re a data scientist, software developer, or product manager, it’s good to know Docker and Kubernetes basics. Both technologies help you collaborate with others, deploy your projects, and increase your value to employers. In this article, we’ll cover essential Kubernetes concepts. There are a lot of Kubernetes terms, which can make it intimidating.

Where to Find IIS Log Files

Microsoft Windows Internet Information Services (IIS) log files provide valuable information about the use and state of applications running on the web. However, it’s not always easy to find where those files are to determine important aspects of app usage like when requests for servers were made, by whom, and other user traffic concerns.