Operations | Monitoring | ITSM | DevOps | Cloud

What's new in the updated Strava plugin for Grafana

Grafana dashboards are often used to monitor a company’s metrics, but what about using them to monitor yourself? That was the thinking behind our creation of the Strava plugin back in early 2020. Strava is a service that allows athletes to track and analyze their workouts and training sessions. It’s widely used for activities such as running and cycling.

How To Increase Efficiency by Empowering MSP Employees

The success of any managed service provider (MSP) is dependent on the people who work for it. When MSP employees are dissatisfied, unhappy, or unengaged they will be less be motivated, efficient, and productive. Employees make or break a company, so it’s vitally important to keep them satisfied with their work.

Monitoring a RESTful API on a Headless CMS Using Pingdom

There are plenty of ways to gain insights on website availability and performance, from setting up complex monitoring agents to browsing through real-time logs. Few services are as straightforward and robust as SolarWinds® Pingdom®. Pingdom lets you set up checks for your website including uptime, page speed, and user interactions. It then collates the results in a dashboard for you to visualize.

How Query Sampling Improves Database Performance

Given the overwhelming importance of data to organizations, anything they can do to speed up troubleshooting problems in the databases they use is of great value. If a company can speed up or avoid troubleshooting, it frees up time they can invest in doing and building more with their data. Careful attention to database query construction and execution also pays similar dividends, as improved database performance helps organizations get more done faster.

Google I/O Announcements - What Do Ivanti Customers Need to Know?

This week Google unveiled a number of exciting announcements at its annual developers’ conference, Google I/O 2021. Announcements included Android 12 and several security and privacy features that are coming to its platforms. At Ivanti, we are particularly excited about what Google is doing to improve user security and privacy. The consistent theme of Google I/O was Secure by default, Private by design, and You’re in control.

Untangling Network Policies on K8s

Network Policy is a critical part of building a robust developer platform, but the learning curve to address complex real-world policies is not tiny. It is painful to get the YAML syntax right. There are many subtleties in the behavior of the network policy specification (e.g., default allow/deny, wildcarding, rules combination, etc.). Even an experienced Kubernetes YAML-wrangler can still easily tie their brain in knots working through an advanced network policy use case.

Data Lake, Data Lab, Data Hub: what's the difference?

In this post we’ll explore the concepts of data lake, data hub and data lab. There are many opinions and interpretations of these concepts, and they are broadly comparable. In fact, many might say they’re synonymous and we’re just splitting hairs. But let’s look again carefully. We can discern some subtle trends in the way people are doing things, and find distinctions in these expressions.

Three Ways to Keep Cardinality Under Control When Using Telegraf

This article will show how we kept cardinality under control with a few tweaks in the Telegraf configuration. If you’re not yet familiar with it, Telegraf is the native and open-source plugin-driver metrics collection agent of InfluxDB. As you may know, cardinality is the combination of measurements, tags, sets, fields, and values in a time-series database, and having high cardinality can be a challenge.

ServiceNow integrates SecOps with Microsoft to boost user security

Over the past year, organizations worldwide have seen an increasing number of cyberattacks. Phishing and vulnerability exploits continue to be leading attack channels. The content adapts to the times (COVID-19-related phishing, for example), but the attack channels themselves are not new. Combating these attack types requires a focus on transforming security operations and response.

Healthcare cybersecurity: Our 6-step plan to secure healthcare data

The HIPAA Journal reported that “2020 was the worst ever year for healthcare industry data breaches.” In the US alone, there were 642 reported data breaches in which the number of records stolen exceeded 500, and in total, nearly 29.3 million healthcare records were exposed.