Operations | Monitoring | ITSM | DevOps | Cloud

Speed Up Your Maven Builds With Jfrog Artifactory

The code we develop ends up being packaged into artifacts that are consumed as dependencies during the development of other software components. JFrog offers an end-to-end Maven repository solution to resolve complex challenges that come with consuming and developing all these artifacts. There are many reasons why you may want to use JFrog Artifactory as your Maven repository. As a Maven repo, Artifactory is both a source for artifacts needed for Maven builds and a target to deploy artifacts generated in the build process.

Now you can add Amazon Timestream to your Grafana observability dashboard

Today, AWS launched Amazon Timestream, a fast, scalable, serverless time series database purpose-built for IoT use cases. If you’re looking into trying out Timestream, know that you can visualize the native Timestream queries with Grafana out of the box. Here are some examples of the robust, SQL-style Timestream queries visualized in Grafana.

Is your microservice a distributed monolith?

Your team has decided to migrate your monolithic application to a microservices architecture. You’ve modularized your business logic, containerized your codebase, allowed your developers to do polyglot programming, replaced function calls with API calls, built a Kubernetes environment, and fine-tuned your deployment strategy. But soon after hitting deploy, you start noticing problems.

Microsoft Login Failures Affecting Office 365 and Azure

On Monday, September 28th 2020, Microsoft had a failure with their authentication system that affected major products and services such as Office 365, Outlook, Teams, Sharepoint, Azure and many others. The Microsoft login failure affected consumer and business users that were not already authenticated with the Azure Active Directory (Azure AD) service. Microsoft confirmed the outage on their Azure Status Dashboard website.

Mattermost integrations: Requesting data with slash commands

In the first two installments in this series, you learned you learned how to send alerts with incoming webhooks and request data with outgoing webhooks. In this article, you will learn how to set up a slash command. Slash commands are very similar to outgoing webhooks and even a little more powerful. To show their power in action, let’s find out how to use slash commands to request the temperature of a specific refrigerator.

Kubernetes Q3-2020: Threats, Exploits and TTPs

Kubernetes has become the world’s most popular container orchestration system and is taking the enterprise ecosystem by storm. At this disruptive moment it’s useful to look back and review the security threats that have evolved in this dynamic landscape. Identifying these threats and exploits and being a proactive learner may save you a lot of time and effort…as well as help you retain your reputation in the long run.