Operations | Monitoring | ITSM | DevOps | Cloud

Get instant Grafana dashboards for Prometheus metrics with the Elixir PromEx library

I have been using Grafana for almost four years now, and in that time it has become my go-to tool for my application observability needs. Especially now that Grafana allows you to also view logs and traces, you can easily have all three pillars of observability surfaced through Grafana. As a result, when I started working on the Elixir PromEx library, having Grafana be the end target for the metrics dashboards made perfect sense.

Agent installation options for Google Cloud VMs

Site Reliability Engineering (SRE) and Operations teams responsible for operating virtual machines (VMs) are always looking for ways to provide a more stable, more scalable environment for their development partners. Part of providing that stable experience is having telemetry data (metrics, logs and traces) from systems and applications so you can monitor and troubleshoot effectively.

How an Experience Level Agreement can Benefit your Business

The success of a business is dependent on two key components: a quality product/service that is being offered and a team that can market and communicate about that product/service effectively. However, that team needs to first be able to communicate with each other to brainstorm and strategize. With many businesses still working on a remote or hybrid model because of the global pandemic, digital communication has become an invaluable part of productivity.

SIEM Deployment Remains Strategic in 2021

Some great new research coming out of the survey data published by 451 Research on Enterprise spending for Information Security. There have been more advanced ways of trying to implement security controls and avoid security issues by integrating security into the development or continuous integration and release pipelines. Despite that, there is still strong interest in using log and event data to manage the security posture of an organization in a SIEM solution.

Integrate security into development with Snyk, now a seamless part of Bitbucket Cloud

While PR analysis within Code Insights and Snyk Pipes are available to use right now, we're rolling out a native Security tab in Bitbucket Cloud. This will be a gradual rollout through the month of May so watch out for it in the left nav. We look forward to your feedback. Even small vulnerabilities can cost a team a lot. All too frequently we see news reports of organisations that mishandled their code & build level security, causing customer data to be exposed.

Mattermost plugins: How to set up your developer environment

The goal of this four-part series is to help you learn how to write your own Mattermost plugins for the first time. To kick things off, this article teaches you how to set up your developer environment. My test computer is a five-year-old laptop with an Intel i5 processor and 4GB of RAM. You need at least 30GB of hard disk for this project. Of course, you’ll also need an internet connection. We start with a freshly installed Ubuntu 20.04. You don’t need to install the desktop environment.

Security Starts With People, Unfortunately.

One of the findings of our investigations pointed to a compromised account as a possible cause of the cyberoperation. While I was reading the results, I thought, “That could have been me. In fact, it could have been any of our employees,” and I began asking myself what I as an individual could do to increase the security of the company I’m working for. Let’s face it, most of the risk is produced by us humans and our behavior.

Quick Demo: Ivanti UEM for Clients

Some of the many ways that malware, including ransomware, is commonly spread is through malicious attachments to business email, unsanctioned apps downloaded from third-party app stores, drive-by downloads via phishing and pharming attacks, employing brute-force tactics using Remote Desktop Protocol (RDP), and network propagation via SMB and CIFS sharing.

Mobile Devices are Ubiquitous, and so are Cyberattacks

We all like to enjoy untethered freedom, as is shown by the incredible growth of mobile devices we use every day for business and personal activities. We use mobile devices for buying products and services, and banking and investing. We download apps that allow us to connect with our favorite businesses and socially interact with friends and relatives.