Operations | Monitoring | ITSM | DevOps | Cloud

How to audit Node.js modules

Node.js is one of the best and most widely used Javascript runtimes used for building APIs. But, this popularity status has led to many hackers distributing insecure modules that exploit the Node.js application or provide a weak point for exploitation. In this tutorial, you will learn how to audit Node.js modules and also detect vulnerabilities in modules using npm audit.

How to review your CircleCI configuration

Configuration files can take some time to set up, but after that initial push they are easy to forget about. “If it’s not broken, don’t fix it” is a common approach that many developers take with their configuration files. But when it comes to your continuous integration pipelines, small changes can have huge benefits.

Using the Monitoring Calendar to drive reducing your support overhead

One of my favorite features in Serverless360 is the monitoring calendar. It is something we added in 2022. The feature aims to help give you a view over time about when your business application has experienced problems that would have triggered warnings or errors based on the monitoring you have configured.

Sensu Integration Catalog: Engineering an Open Marketplace

ICYMI, the recent release of Sensu 6.7.0 introduced the Sensu Integration Catalog – an open marketplace for Sensu Go. Along with the release, we also hosted a webinar highlighting how the Sensu Integration Catalog unlocks self-service infrastructure monitoring. In the webinar, we talked about the “what and why?” – what problems does the Catalog solve, and why we decided to solve them with a marketplace.

What are CIS Controls, and Why Are They Important?

Way back in the early days of the Internet, having an antivirus was the end-all-be-all of cybersecurity. These were admittedly wilder times but in a way, only a few bad actors had the tools and knowledge to threaten and breach corporate IT infrastructures. Times have changed and thanks to the dissemination of information and widespread accessibility to more hacking technology, cyber-attacks have become a very real and tangible menace with potentially devastating consequences.

The Basics of Enterprise OEM Software Licensing

For a long time, businesses have been using enterprise OEM software licensing to sell their products faster as well as to enhance the features and functionalities of their solutions. These solutions empower companies to provide more value to their customers without bringing in significant investments. And they present a huge portion of the global software market. In the age of the digital workplace, it's advantageous to have a full understanding of how these software agreements work.

Introducing the Mezmo Exporter for OpenTelemetry

At Mezmo, we see a massive opportunity to reduce Mean Time to Detection (MTTD) and Mean Time to Resolution (MTTR) by making log data more valuable and actionable. Today, we’re thrilled to announce the release of the Mezmo Exporter for OpenTelemetry- the first step in our continued work with the project to further simplify the ingestion of log data and make that data more actionable with enrichment of key OpenTelemetry attributes.

New StackPod Episode: Defining and Executing a Clear Product Strategy With Andreas Prins

We are happy to announce our latest StackPod episode featuring guest Andreas Prins! With over five years of experience in different product management and product strategy roles, Andreas is currently the VP of product here at StackState.

Sumo Logic - Challenging the status quo

As the applications we support evolve, so too must the services that keep them reliable and secure. And, evolve they have! Sumo Logic started life over a decade ago by solving the difficult problem of log management. Our cloud-native architecture eliminated the hassle of managing on-premise log management solutions while scaling on-demand to handle a significant volume of high-cardinality data. Powerful search made exploratory investigation fast and efficient for customers. This was a game changer!

Introduction to Infrastructure as Code

Cloud infrastructure has been on the rise for the last decade. As it's adoption grows, so has the complexity of managing infrastructure, becoming more complex and more prone to user mistakes. This led to a new wave of tools in the Infrastructure as Code (IaC) space that aim to tackle this issue by treating your infrastructure as you would any other piece of software.