Operations | Monitoring | ITSM | DevOps | Cloud

Webinar: Choosing the right messaging service for serverless apps

By nature, serverless applications are highly-distributed and event-driven, relying heavily on relaying events from one service to another. With that in mind, selecting the right messaging service for routing events is critical for your serverless application's functionality and performance.

JFrog ChartCenter: How to Include Helm Charts from Source

Learn how you can add your Helm chart to ChartCenter directly from its Git-stored source. ChartCenter will host your Helm repository for you to share it with the world. Until the release of Helm v3, you might have submitted your Helm chart to the official `stable` or `incubator` chart repository to share it with the community. But this Helm chart archive is no longer actively maintained, and is not accepting new charts. Now all Helm charts must be in a hosted repository elsewhere.

How Flowmon Helps to Detect SUNBURST Trojan Attack in Your Network

Flowmon Anomaly Detection System from Kemp now contains Indicators of Compromise (IoC) for the SUNBURST trojan specifically. Users of the Flowmon network detection and response (NDR) tool can check if they are under attack and set up measures to detect SUNBURST. This December, the world shook at the news of several US government bodies falling victim to a highly sophisticated attack.

Mitigating Kubernetes Security Vulnerability when using ExternalIP Services (CVE-2020-8554)

Earlier this month the Kubernetes project discovered a security issue affecting multitenant clusters: If a potential attacker can already create or edit services and pods, then they may be able to intercept traffic from other pods (or nodes) in the cluster. An attacker that is able to create a ClusterIP service and set the spec.externalIPs field can intercept traffic to that IP.

Introducing a new dashboard creation experience in Cloud Monitoring

Having good observability is vital to the health of your cloud infrastructure and applications, and a key element to using that information effectively is being able to create dashboards with relevant metrics. Today we are announcing a new dashboard creation experience from Cloud Monitoring that allows you to generate a greater variety of visualization types, introduces better flexibility for dashboard layouts, and makes data manipulation easier so you can create dashboards that better fit your needs.

Finding Unstable Query Plans in SQL Monitor ("Bad" Parameter Sniffing)

A common but tricky issue to identify in SQL Server is when something called "parameter sniffing" goes bad. In this video, Redgate's Kendra Little shows how to identify if a query has an unstable execution plan in SQL Monitor, where to find the parameters which were "sniffed" for each query plan, and gives tips on where to start to resolve the issue.

Performance tuning with SQL Monitor: tempdb usage, parameter sniffing, and blocking chains

Looking to level up your performance tuning game? Check out three new videos on tempdb, unstable query plans, and identifying blocking chains with SQL Monitor. I got to work with some of my favorite folks from the SQL Monitor team last week to build some new workload patterns for our online monitoring demo site. Here are three videos sharing some highlights of performance tuning features in SQL Monitor.