Operations | Monitoring | ITSM | DevOps | Cloud

Getting Started with Grafana Dashboards using Coralogix

One of the most common dashboards for metric visualization and alerting is, of course, Grafana. In addition to logs, we use metrics to ensure the stability and operational observability of our product. This document will describe some basic Grafana operations you can perform with the Coralogix-Grafana integration. We will use a generic Coralogix Grafana dashboard that has statistics and information based on logs. It was built to be portable across accounts.

PCI Compliance for Containers and Kubernetes

Attend our webinar about PCI compliance in containers & Kubernetes: Download our PCI Guide: More info in our blog: Many of your applications are now starting to run on containers in the cloud. If your applications are at all dealing with credit card data, you may be wondering how to validate PCI compliance, a well known regulation for handling this data securely. PCI is also a must have requirement to check off before your code gets to production.

Dashbird 2.0 - Monitoring for modern cloud applications

Dashbird 2.0 is a monitoring and intelligence platform for operating serverless applications on AWS. Dashbird is a platform designed to give organizations the confidence to build and operate complex serverless applications in modern cloud environments. Alert Automation, Observability, and Well-Architected Insights.

Quick tips to create an effective remote access plan for your organization.

In this webinar, you'll learn:

  • Specific challenges that your IT teams face while working remotely during the COVID-19 crisis
  • Cybersecurity implications of opening up privileged access to infrastructure and data center assets to IT technicians working from home
  • How to handle remote access requests to critical systems
  • Strategies for IT teams to effectively adapt to a remote work plan without compromising on access security
  • How ManageEngine's Secure Remote Access Toolkit can help a

Hardening Windows security: How to secure your organization - Part 2

We’re back with part two of our three-part blog series on living-off-the-land attacks. If you missed part one, you can read it here. In a nutshell, living-off-the-land (LOTL) refers to a type of attack where the attacker uses the tools and features that already exist in the target environment to carry out malicious activities. The concept of LOTL is not new, but LOTL and file-less attacks have been gaining popularity over the last few months.

Azure Functions Live - April 2020

The Azure Functions team has yet again joined us for another monthly live webcast by staying remote and safe. In this live webcast, along with Jeff Hollan, Anirudh Garg and Sonia from Engineering team joined us to give a picture on the latest happenings in Azure Functions space. Without any further delay, let us jump in as there are tons of update are awaiting.

New AppSignal Feature: Graph Builder

Dashboards should be easy to build and provide powerful insights. Our magic dashboards are already created automatically, so you don’t have to spend any time setting up these dashboards yourself. Many developers started tracking custom metrics that were unique to their applications. From these metrics, you can create custom dashboards and add triggers to get notified if values go outside of your desired range.

Impact of COVID 19 on IT Infrastructure & Shift in Priorities

So many aspects of our business & lives are under pressure right now due to the global pandemic. In the middle of all this, IT infrastructure still remains the backbone of the smooth business operations. Motadata is committed to helping individuals like you & your organization to get through these tough times. We are in this together. We can do this together. People in IT are always busy. Now your firefighters are working from home, you would not want to bother them for redundant tasks.

Performing Image Scanning on Admission Controller with OPA

In this post we will talk about using image scanning on admission controller to scan your container images on-demand, right before your workloads are scheduled in the cluster. Ensuring that all the runtime workloads have been scanned and have no serious vulnerabilities is not an easy task. Let’s see how we can block any pod that doesn’t pass the scanning policies before it even runs in your cluster.