Operations | Monitoring | ITSM | DevOps | Cloud

See How Restorepoint Helps You Remediate After a Network Breach

This is our first blog in a three-part series, where we demonstrate the many features and benefits of using Restorepoint and the ScienceLogic SL1 Platform together. Today’s demo takes you through a network breach scenario—showing how to identify and remediate following an unplanned network device change.

7 Types of Data Breaches You Must Know And How to Handle Them

Data breaches and the threat of cybercriminals are unfortunate realities of our digital lives. Research conducted by tech firm IBM put the average cost of a corporate data breach at $4.24 million in 2021. This trend continues in both frequency and severity as we become more entangled in digital spaces (think virtual reality). There really is no better time to learn about the common causes of data breaches and how to prevent them.

Adding Redis & MySQL to AppSignal for Node.js with OpenTelemetry

We've simultaneously launched 4 new integrations for Node.js: Redis, ioredis, MySQL, and MySQL2. This means that you can now see all the details of a query in the Event Timeline and Slow Query screens in AppSignal. Because we are a small and bootstrapped team, we've chosen to embrace OpenTelemetry as a means of expanding AppSignal's offering in the Node.js ecosystem.

Observability strategies that work - and some that don't

Creating an observability strategy is a lot like playing with Legos: It takes small building blocks to create a bigger picture, but the slightest mistake could throw off an entire build — and often you realize it very late in the process and have to rip and repair the Hogwarts castle infrastructure you spent many days creating.

Using Relay's flexibility to turn scripts into permanent tools

Relay’s inputFile capability is handy because it allows you to use familiar programming languages to get custom solutions working quickly. Using an inputFile with Relay is as easy as writing a script in bash, Python, or Powershell, and storing it in a remote Internet-accessible repository like GitHub. Let’s see how Relay enhances our daily driver skillset to solve problems quickly and reliably with minimal code.

The Power of ChaosSearch Alerts

How can you derive value from data? One answer is to generate alerts based on the data. Alerts help your team stay on top of a variety of potential challenges – like application performance issues, security risks, disruptions to the CI/CD delivery chain and beyond. ChaosSearch’s flexible alerting system makes it easy to generate alerts relevant to your organization’s needs.

How to Manage Data Center Cabling

Tracking and managing data center cabling is one of the most overlooked aspects of data center management. However, when it’s not done properly, it can cause all kinds of problems from costly downtime to inefficient use of capacity. Don’t settle for cable spaghetti. Keep reading to find out the basics about data center cabling, understand how to track and organize it, and learn how the best data center managers in the industry are dramatically simplifying cable management.

Building a search experience with Elastic

We’re excited to share an end-to-end demo that showcases how Elastic empowers developers to build rich search solutions. The demo provides mechanisms to run in your own environment, to ingest data into Elastic Enterprise Search using the Enterprise Search Python Libraries, and to create a modern UI in React, using the free and open source tool Search UI.

Trusted Device Authentication 101

Suppose you have to use your phone or other devices frequently, and you don’t want to type your password every time you wish to access an application. By implementing Trusted Device authentication, your system will recognize the device’s authentication and help you log in to the application quickly and safely. The whole process will not only save your time but will also allow you to witness an advanced authentication procedure.