Operations | Monitoring | ITSM | DevOps | Cloud

Free NetLogon Secure Channel Compliance MP

The Netlogon Remote Protocol (also called MS-NRPC) is an RPC interface that is used exclusively by domain-joined devices. MS-NRPC includes authentication procedures and a method of establishing a Netlogon secure channel. An elevation of privilege vulnerability exists in MS-NRPC that makes it possible for an attacker to establish a vulnerable Netlogon secure channel connection to a domain controller.

Why is it important to reduce the size of my SCOM Data Warehouse?

A company’s data warehouse is usually the largest database a company uses when dealing with SCOM data, this means it is often the most expensive to manage and maintain. They can also be a drain on your infrastructure, taking a long time to backup, slowing down reporting, consuming more hardware space and can be very time consuming to recover, if they go down.

Power your digitalization with End-User Experience Monitoring

In the digital world, user-centricity is the one thing all successful modern applications have in common. But no matter how great the application is, users’ experience - whether customers or employees - is instantly ruined if performance degrades. This webinar will explain the differences between four major approaches to application and user experience monitoring and show how to get true end-to-end coverage by combining them.

Breaking Down the DevOps Pulse 2020: Going Cloud-Native

Our annual DevOps Pulse identifies and tracks points of interest and emerging trends throughout the tech industry. The 2020 DevOps Pulse was our biggest ever with over 1,000 respondents. This year, we put an emphasis on cloud-native technology adoption and adaptation to architecture, applications, and observability technologies. However, we would be remiss not to trail and track how DevOps pros and their teammates are dealing with the other major events of the year.

Grubhub and JPMC Shift Reliability Testing Left at Chaos Conf 2020

Get started with Gremlin's Chaos Engineering tools to safely, securely, and simply inject failure into your systems to find weaknesses before they cause customer-facing issues. Gremlin’s Chaos Conf is always an exciting event, bringing together leaders at the forefront of Chaos Engineering practices. This year was no exception, moving beyond defining Chaos Engineering to more advanced adoption and best practices discussions.

Announcing HAProxy 2.3

HAProxy 2.3 adds exciting features such as forwarding, prioritizing,and translating of messages sent over the Syslog Protocol on both UDP and TCP, Stats Contexts, SSL/TLS enhancements, an improved cache, and changes in the connection layer that lay the foundation for support for HTTP/3 / QUIC. This release was truly a community effort and could not have been made possible without all of the hard work from everyone involved in active discussions on the mailing list and the HAProxy project GitHub.

Getting up and running with Calico on your Rancher Kubernetes Cluster

Rancher is a great way to deploy and manage Kubernetes clusters across a broad range of environments, abstracting away many of the differences between the environments, and using Canal for run-anywhere networking. But what if you want to up your networking game to squeeze the most out of your clusters? In this training session you’ll learn about the various networking options available to you in Rancher, and considerations to take into account in order to select the best option for your environment.

How to Manage Ruby Memory Usage

Even the most prominent and reliable frameworks are notorious for burning out resources if not configured perfectly. In this post, we are about to take a look at how Ruby, one of the most prominent programming languages and an awesome web application alternative when combined with Rails, manages memory, and how you can make it perform even better. Ruby is a scripting language built for use in web applications and similar stuff.