Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

The Need for Speed: Why Fast Data Pipelines Are the Lifeblood of a Business

Today’s businesses are looking for ways to better engage customers, improve operational decision making, and capture new value streams. As the world of data continues to grow and its pace of change accelerates, it’s never been more important for businesses to have fast access to actionable data to serve customers with personalized services, in real-time, and at scale. To do this, they need a fast data pipeline.

April/2022 - CVE-2022-22965: Spring4Shell Remote Code Execution Mitigation

Recently, a Remote Code Execution vulnerability was discovered in the Java Spring Core library. This vulnerability allows attackers to execute arbitrary code on affected systems. You can find more information on that vulnerability in the announcement on the Spring Blog. While HAProxy Enterprise, HAProxy ALOHA, and other products within the HAProxy Technologies portfolio are not impacted by this (they do not use the Spring Core library at all), you can use our products to mitigate the attack.

A Primer for Monitor as Code: How to use Splunk Observability Cloud with Terraform

Managing the complexities of today’s cloud native infrastructure has resulted in the increased need for observability. As cloud adoption continues to grow, the need to deliver a better customer experience, scale efficiently and increase momentum on innovation has never been more important. For many organizations to carry out these principles, two technologies are helping organizations deliver on these goals faster: Monitoring-as-Code and Infrastructure-as-Code.

Your SpringShell (Spring4Shell) Remediation Cookbook Using the JFrog Platform

A new zero-day exploit in the spring-web package called “SpringShell” (nicknamed “Spring4Shell”) was just leaked and is threatening the internet and the community. The JFrog security research team is investigating the exploit and continuously updating our blog post with technical details on the SpringShell vulnerability.

API mock testing with Nock

For the latest full-stack applications to work, a backend service is required. That is especially true when the frontend service depends on the backend service to render data. In many cases, it can be difficult to replicate the setup of the backend services so that you can test the application. This tutorial will show you how to mock HTTP requests from an API so that you can test endpoints without actually calling them in your tests.

Revamp your backup strategy and redefine data security this World Backup Day!

Did you know that March 31 is World Backup Day? Who knew data backup was important enough to get its own day? I didn’t until recently, which may be the case for you as well, but that’s okay. It is never too late to learn about the importance of security practices like backing up data and establishing a routine that includes said practices.

A guide to Linux for embedded applications

An embedded device is a hardware and software system that performs a dedicated function within a larger computer system. It is typically resource-constrained and comprises a processing engine. The software of an embedded Linux system runs on top of the Linux kernel, the fundamental core of the OS with complete control over everything occurring in the system. It follows an embedded Linux system simply denotes an embedded system running on the Linux kernel.

Building Your Security Analytics Use Cases

It’s time again for another meeting with senior leadership. You know that they will ask you the hard questions, like “how do you know that your detection and response times are ‘good enough’?” You think you’re doing a good job securing the organization. You haven’t had a security incident yet. At the same time, you also know that you have no way to prove your approach to security is working. You’re reading your threat intelligence feeds.