Operations | Monitoring | ITSM | DevOps | Cloud

Grafana 7.5 released: Loki alerting and label browser for logs, next-generation pie chart, and more!

Grafana v7.5 has been released! This is the last stable release before we launch Grafana 8.0 at GrafanaCONline in June. Register for free now, so you won’t miss the great sessions we’re planning around all things Grafana. And if you’re doing something special with Grafana that you’d like to share with the community, the CFP for GrafanaCONline is open until 06:59 UTC on April 10! Now, back to 7.5.

Using Sentry Performance To Make Sentry Performant

Like many companies, Sentry uses feature flags to determine when certain users see certain features. Recently, we decided to switch our feature flag software to an open-source system called Flagr. And while implementing Flagr, we used our new Performance tools to find — and ultimately fix — a serious issue in how we were fetching our flags.

SaaS vs. PaaS vs. IaaS: What's the Difference?

Every service you acquire to use temporarily and let go of when you’re done can use the “as a service” suffix. A cab is a vehicle as a service. Rather than buying a car, you merely pay to have another person’s car move you from one point to the next. IT services embody the same model. Browser-based text editors alleviate the need to install fully-fledged word processors on computers.

How to Achieve Unified IT Observability Amidst the Global Pandemic

The concept of unified IT observability has gained newfound importance in today’s world of remote work, hybrid infrastructures, and technological convergence. In this video, Christina Kosmowski, President at LogicMonitor, shares five tips on how to power your business forward and achieve unified IT observability during uncertain times.

Customer Highlight: HIPAA Vault

As an MSSP (Managed Security Service Provider), HIPAA Vault relies on CFEngine to automate & secure their infrastructure on behalf of their customers. HIPAA Vault has been a longtime CFEngine Community user since 2012 and recently upgraded to Enterprise in order to boost their infrastructure visibility through Mission Portal and features like Compliance Reporting that help them provide a more secure & compliant cloud hosting solution.

Key Challenges of Database Cloud Migration

As we shift enterprise computing to the cloud, the need for database migration increases—but with this comes the inherent challenges of migration and the need to plan. Moving to the cloud can come with more risks and obstacles than migrating a database within a data center or from one on-premises data center to another. If a business isn’t fully prepared to migrate, they’re almost certain to run into issues.

Automated Patch Management and Team Swarming are Key Security Practices

In the blink of an eye, you can miss a new business disrupting security incident. We all recognize that cybersecurity breaches are increasing in volume and sophistication. How we respond to them is critical. Security vulnerabilities force organizations to go outside of their daily activities to execute out-of-band responses. We face numerous challenges in managing security risk.

Acquisition with Intent and The Rise of The Everywhere Workplace: Why Ivanti Is Moving Faster Than Ever During a Global Pandemic

It's easy for businesses to drop into reactive survival mode during a crisis like COVID-19. Navigating rapidly changing conditions can make it difficult to think beyond immediate challenges. And yet, even – or perhaps especially – in a crisis, it’s imperative that companies execute strategies that will make them stronger in the long term. In the case of COVID-19, those strategies should support clients as they transition to new working conditions.

Detecting rare and unusual processes with Elastic machine learning

In SecOps, knowing which host processes are normally executed and which are rarely seen helps cut through the noise to quickly locate potential problems or security threats. By focusing attention on rare anomalies, security teams can be more efficient when trying to detect or hunt for potential threats. Finding a process that doesn’t often run on a server can sometimes indicate innocuous activity or could be an indication of something more alarming.

How to: Pingdom super powered status page

Pingdom is one of the most used website monitoring tools, with almost 15 years in the business. It excels at providing simple and reliable synthetics as well as real user monitoring. This monitoring tool provides a simple public status page, but as you might have noticed it’s quite limited. It only serves as a display of your uptime and response time history, not much more than that.