Operations | Monitoring | ITSM | DevOps | Cloud

How to Use Quarkus With Micrometer Metrics to Monitor Microservice Pipeline

At LogicMonitor, we deal primarily with large quantities of time series data. Our backend infrastructure processes billions of metrics, events, and configurations daily. In previous blogs, we discussed our transition from monolith to microservice. We also explained why we chose Quarkus as our microservices framework for our Java-based microservices. In this blog we will cover.

Your Software Is Secure Until It's Not: An Informal And Unscripted Chat On DevSecOps

Join JFrog’s Kat Cosgrove, as she interviews Melissa Mckay, Developer Advocate, JFrog and Seth Vargo, Senior Staff Engineer at Google Cloud - for an interactive discussion about how to thrive with DevSecOps in a world of security threats and breaches. Listen in as they discuss the recent SolarWinds hack, which affected many high-profile Fortune 500 companies and large U.S. federal government agencies. They will also look at how you can overcome the stress, fear and paranoia of releasing something that you think could result in disaster, with some sound experience and knowledge.

Continuous Optimization in AWS CodePipeline using CloudFormation

For those of you who aren’t familiar with AWS CodePipeline, it’s a continuous integration and continuous delivery (CI/CD) framework that enables application development teams to deliver code updates more frequently and reliably. You may have also heard it being called a CI/CD or DevOps pipeline. These pipelines have always traditionally been used to deploy the components of a certain application whenever new code in “checked-in”.

Not All Buzzwords are Created Equal: Real Applications of Zero Trust Security for IoT

Zero Trust security. Some would say it’s the latest and greatest buzzword and this disposition is understandable given the amount of jargon introduced into the Information Technology market each year. With vernacular being used interchangeably like “AI,” “Machine Learning,” and “Deep Learning,” these words get stripped of their real significance.

Here's why you should be excited about Identity Director 2021.1

As an important part of the security ecosystem, Identity Management shields organizations against cyberattacks. In 2018 and 2019, Osterman Research published important findings indicating hackers’ increased preferences to target employees with social engineering being one of their preferred methods. But identity governance is not an easy task.

How to connect to the Icinga 2 API via the Icinga Console

Today I will show you a couple of small functions you can use with the Icinga Console. Using the Icinga Console can help with scripting in general and provides a quick and easy-to-use way of extracting information from your Icinga environment. We will take a look at extracting information belonging to the service objects in Icinga. Obviously, you can pinpoint different objects, like host objects, with which you can work via the Icinga 2 API and Console.