Operations | Monitoring | ITSM | DevOps | Cloud

InfluxDB Community Office Hours - February 2020

InfluxDB Community Office Hours are one-hour, monthly online sessions, held on the 3rd Wednesday of the month at 10:00 am Pacific Time, by our Influxers to answer your questions about any topic related to InfluxDB or time series. We host this monthly live webinar so that users can directly ask a panel of Influxers questions and talk in real time. We record these sessions and post them on YouTube. InfluxDB Community Office Hours are part of our commitment to open source, developer happiness, and time to awesome.

Sumo Logic Kubernetes Webinar

Maximize your Kubernetes management by using the Data Explorer, which offers a service-oriented view of your cluster and allows you to seamlessly correlate logs and metrics as you accelerate your workflow. In this session, Sumo Logic Solutions Engineer, Dan Reichert, discusses how to navigate your Kubernetes environment and understand exactly what you should be monitoring across all workflows.

Citrix and Rancher Integration: Cloud-Native Stack on Kubernetes

Kubernetes and containers are changing how applications are built, deployed and managed. Rancher makes application deployment simple and easily portable regardless of location or infrastructure. At Citrix, we operate on the same core principle. We provide application delivery and load balancing solutions for a high-quality user experience, to any device, across any network, for your web, traditional and cloud-native applications regardless of where they are hosted.

SQL Server Agnostic Tuning Pack for Easy Tune Launched

Remember that old commercial from the eighties of the actor Chris Robinson saying “I’m not a doctor, but I play one on TV”? (Yes, I know it’s an old commercial, but the catchphrase has definitely outshone the original product placement.) Well, I would like to start this blog post by changing things up and saying that “I’m not a Database Administrator, but I like to play one on TV!” Or, um, well, at least I like to pretend to be a DBA. Sometimes.

Announcing Icinga for Windows v1.0

It is finally ready for launch – the first final release v1.0 of Icinga for Windows. The past months were quite challenging: Analyzing, troubleshooting and fixing issues reported by our awesome community and customers: Your support made it possible that we can celebrate the release of our new foundation for Windows monitoring. Scalable. Simplified. Extendable.

The Lifecycle of a Service

Services are the backbone of our systems. Whether they’re functional microservices or logical components of a traditional application, they are the pieces that make up our businesses. We can’t do the computer thing without services. But who’s responsible for owning a service in your company or organization? The cast of characters involved in the lifecycle of a service is more than just software engineers.

How to use the docker run command for Docker container execution

In this previous article we learned to create our own Docker images to test and distribute our applications regardless of their dependencies. As we know, Docker is a wonderful tool for collaborative programming work, allowing to work in a virtually identical environment regardless of the operating system you are in.

Elastic on Elastic: Securing our endpoints with Elastic Security

This blog post is one in an occasional series about how we at Elastic embrace our own technology. The Elastic InfoSec team is responsible for securing Elastic and responding to threats. We use our products everywhere we can — and for more than just logs. By harnessing the power and breadth of capabilities of the Elastic Stack, we are working on tracking risk and performance metrics, threat intelligence, our control framework, and control conformance information within Elastic.

Mac system extensions for threat detection: Part 3

This is the third and final post of a three-part series on understanding kernel extension frameworks for Mac systems. In part 1, we reviewed the existing kernel extension frameworks and the information that these frameworks can provide. In part 2 we covered techniques that could be used in kernel to gather even more details on system events. In this post, we will go into the new EndpointSecurity and SystemExtensions frameworks.