Operations | Monitoring | ITSM | DevOps | Cloud

The Advent of Monitoring, Day 10: Better Observability Into Your Local Clickhouse Instance With Grafana and Prometheus

Cloud-based database providers often provide great observability out of the box. But, what if you’re developing a tricky feature locally and need more details about what your local Clickhouse is doing? There are many options, but if you’re a numbers and graphs person like me, you’ll want to be able to view the inner workings of Clickhouse in something like Grafana.

The Advent of Monitoring, Day 9: Advantages of Multi-Step API Checks vs Original API Checks

This is the ninth part of our 12-day Advent of Monitoring series. In this series, Checkly's engineers will share practical monitoring tips from their own experience. As a Checkly user, you’ve always had access to our two core check types: API and browser checks. API Checks are much cheaper, and therefore only run a curl-like request against the endpoint of your choice.

What Is IPv6? Definition & Full Overview

Poised to redefine the landscape of digital communication stands the groundbreaking achievement that is IPv6, the sixth generation of the Internet Protocol. The evolution from IPv4 to IPv6 marks a pivotal shift in internet technology, driven by the increasing scarcity of IPv4 addresses and the expanding scale of the global network.

How to Deploy Microsoft LAPS

Securing privileged accounts is of utmost concern to cybersecurity professionals, and Active Directory, Microsoft’s identity and access management service, forms the backbone of the majority of organizations. Active Directory (AD) centralizes user accounts, computers, and resources, ensuring access control, and local administrator accounts wield substantial power within Windows systems.

What is SSH?

SSH stands for “Secure Shell.” It’s a network protocol used to securely access and manage devices and servers over an unsecured network. It provides an accurate form of authentication as well as encrypted communication between two systems, making it especially useful in environments where security is a concern. SSH is commonly used to access remote servers through a command line interface, but can also be used to securely transfer files (through SFTP or SCP).

What is the principle of least privilege (PoLP)?

The Principle of Least Privilege, also known as PoLP, is a computer security rule that states that each user or group of users must have only the necessary permissions to perform their corresponding tasks. In other words, the less power a user has, the lower the chances of them having a harmful impact on the business.

Product Release Notes November 2023

One of the major issues with first-generation cloud cost management platforms is their tendency to become shelfware. Low data quality, high barriers to entry for new users, and low signal-to-noise ratio made it hard to drive cost accountability among engineering teams — and pushed many organizations to nearly give up on it.

Monitor Docker With Telegraf and MetricFire

Monitoring your Docker environment is critical for ensuring optimal performance, security, and reliability of your containerized applications and infrastructure. It helps in maintaining a healthy and efficient environment while allowing for timely interventions and improvements. In general, monitoring any internal services or running process helps you track resource usage (CPU, memory, disk space), allowing for efficient allocation and optimization.