Changelog: Extended Handlebars template functions & Groups API
Here is an overview of the features & fixes we released over the last month.
The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.
Here is an overview of the features & fixes we released over the last month.
Software services are at the heart of modern business in the digital age. Just look at the apps on your smartphone. Shopping, banking, streaming, gaming, reading, messaging, ridesharing, scheduling, searching — you name it. Society runs on software services. The industry has exploded to meet demands, and people have many choices on where to spend their money and attention. Businesses must compete to attract and retain customers who can switch services with the swipe of a thumb.
ProxySQL is a MySQL/MariaDB protocol–compliant load balancer and reverse proxy with native support for a range of popular backends including ClickHouse, Amazon Aurora, and Amazon RDS. ProxySQL efficiently distributes queries to your database servers and caches results, improving resource management and boosting database performance. You can also configure ProxySQL for high availability to reduce downtime.
Working from home has become our new normal, with many of our jobs being performed remotely. The experience of working remotely can be as seamless as it was from our workplace, with all the technological advancements available today. Businesses have also put network security on the forefront by implementing use of virtual private networks (VPNs). This enables users to securely access confidential information hosted on the organizations’ servers.
93% of businesses use cloud services, and many are looking forward to investing more in it. Which means almost everyone nowadays is using cloud in some form or another. If any part of your infrastructure is in the cloud, then you must monitor it. This article will show you the features and benefits of cloud monitoring. We’ve also covered how cloud monitoring can help in the current pandemic situation.
In a previous blog post I discussed the complexity of securing Kubernetes environments, and some best practices. Unfortunately, even if we follow best practices in setting up and configuring our system, we can never eliminate all the vulnerabilities.