Operations | Monitoring | ITSM | DevOps | Cloud

Better Dashboarding - Grafana or SquaredUp?

As part of my job as a tech evangelist and a pre-sales engineer here at SquaredUp, I often find myself talking to a lot of people. And understandably, when you as a consumer are trying to evaluate a product that you may potentially invest in, it’s only natural that you want to compare different products and decide which one’s better and/or offers more value for money and why.

A Practical Guide to Logstash: Input Plugins

In a previous post, we went through a few input plugins like the file input plugin, the TCP/UDP input plugins, etc for collecting data using Logstash. In this post, we will see a few more useful input plugins like the HTTP, HTTP poller, dead letter queue, twitter input plugins, and see how these input plugins work.

How to connect and monitor your Raspberry Pi with Grafana Cloud

The Raspberry Pi is a popular and inexpensive device that comes in many shapes and forms. It’s a popular hobbyist tool that is generally purchased to run all kinds of software experiments on. But make no mistake, even though a Raspberry Pi comes in a tiny form factor, it’s a fully functional computer!

Learn how to comply now before your next audit

Are you struggling to keep up with manual compliance across your infrastructure? In this 25-minute episode of the Pulling the Strings podcast, powered by Puppet, learn how Puppet Comply makes automating your configuration compliance easy -- with full view dashboards and the ability to assess, remediate and enforce all through the Puppet Enterprise solution. Listen in and discover:

Compute Confidently at the Edge with Rancher and Longhorn 1.1

Today’s announcement of Longhorn 1.1, a Cloud Native Computing Foundation (CNCF) Sandbox project, is exciting news for users of Rancher, SUSE’s Kubernetes management platform, and the Kubernetes community. Longhorn is an enterprise-grade, cloud native container storage solution that went GA in June 2020. Since then, adoption has increased by 235 percent.

How to set AWS S3 Bucket Read Permissions with Relay

Cloud environments are susceptible to security issues. A big contributor is misconfigured resources. Misconfigured S3 buckets are one example of a security risk that could expose your organization’s sensitive data to bad actors. Policies and regular enforcement of best practices are key to reducing this security risk. However, manually checking and enforcing security is time-consuming and can fall behind with all the demands a busy DevOps team faces every day.

Mattermost survey reveals remote work is here to stay

Mattermost has always been a remote-first company. Building a product that safely and securely allows our teams to communicate with each other regardless of geography or distance is the cornerstone of our philosophy on working remotely. Over the last year, the world of working online from home changed dramatically. Many people have been forced to move into a working situation they might not have been familiar with.