Operations | Monitoring | ITSM | DevOps | Cloud

Open Source Projects Contribute to in 2022

With a nearly endless array of open source projects available to contribute to these days, knowing where to start contributing can feel easier said than done. Need some inspiration? Whether you’re new to the world of open source, are gearing up for Open Source Fridays in the new year, or just want to see what other folks are excited about, check out a few of our favorite open source projects to contribute to in 2022.

How to Detect Log4Shell Events Using Coralogix

The Log4J library is one of the most widely-used logging libraries for Java code. On the 24th of November 2021, Alibaba’s Cloud Security Team found a vulnerability in the Log4J, also known as log4shell, framework that provides attackers with a simple way to run arbitrary code on any machine that uses a vulnerable version of the Log4J. This vulnerability was publicly disclosed on the 9th of December 2021.

Grafana 2021: Year in review

Numbers don’t lie — and the data shows that in a year in which we, once again, endured unpredictable changes, Grafana experienced unparalleled success. In June, we introduced Grafana 8.0, which included unified alerting, new visualizations, real-time streaming, and more. Since then we have introduced a host of new features as well as new data source plugins that only reinforce Grafana’s commitment to our “big tent” philosophy.

Heroku vs AWS : what to choose in 2022? - Detailed comparison

As a developer, using Heroku (a Platform as a service (PaaS)) helps get our applications up and running quickly. Without worrying about servers, scaling, backup, network, and so many underground details. Heroku is the perfect solution to start a project. But as the project grows, the needs become more complex, and moving from Heroku to Amazon Web Services (AWS) becomes more and more a no-brainer choice (discover why so many CTOs decide to move from Heroku to AWS).

How to help make sure your clients trust your MSP business

For a managed services provider (MSP) business, building a great relationship with customers is the ultimate way to secure continued business and build your brand. Every strong customer relationship centers on one key concept: trust. Without trustworthy correspondence between you and your customers, you can’t do much to prevent your end users from switching to another MSP team.

6 Alternatives to Sentry Error Monitoring

You are likely to face challenges in selecting the best alternatives to Sentry for error monitoring. It can be daunting to read through multiple software companies and vendors to note their features, benefits, and shortcomings. Let’s discuss simplifying this process by covering the six best alternatives to Sentry error monitoring. Feel free to navigate this guide using the links below.

How to achieve CIS Compliance with Puppet

Security compliance is the new black. Everyone is talking about it. Everyone is writing about it. Hopefully everyone is doing something about it, but it's a big lift for organizations. Compliance can mean adhering to departmental and company standards; it can mean well-defined regulatory standards like HIPAA, GDPR, and others. Compliance can mean adopting a standardized set of recommended protocols for cyber security. If compliance isn't on your radar right now, it should be.

Podcast: Break Things on Purpose | 2021 Year In Review

For this episode your hosts, Jason Yee and Julie Gunderson, are sitting down for a year in review! With the new year just around the corner, lets take a glance back at a year of chaos...engineering that is. The rest of the chaos we will leave out of the conversation. Julie and Jason talk about their favorite outages of the year. From Fastly to texts from Julie’s mom, we’ve definitely got a heck of a year to consider!

Log4j Detection with JFrog OSS Scanning Tools

The discovery of the Log4Shell vulnerability in the ubiquitous Apache Log4j package is a singular event in terms of both its impact and severity. Over 1 million attack attempts exploiting the Log4Shell vulnerability were detected within days after it was exposed, and it may take years before we see its full impact.