Operations | Monitoring | ITSM | DevOps | Cloud

TL;DR InfluxDB Tech Tips: API Invokable Scripts in InfluxDB Cloud

If you’re familiar with InfluxDB Cloud, then you’re probably familiar with Flux already. Flux enables you to transform your data in any way you need and write custom tasks, checks, and notification rules. But what you might not know is that InfluxDB Cloud now supports API Invokable Scripts in Flux.

Publish SIGNL4 oncall and alert information to your Grafana dashboard

Grafana is as open source analytics and interactive visualization application. You can connect different data sources to display chart and graphs or even trigger alerts. Wouldn’t it be great to add information about SIGNL4 alerts or about who is on call as part of your dashboard? In this case you immediately get an overview about open, acknowledged, and closed alerts per category. Of you can see wo it currently on duty. Here is an example with a who-is-on call, and an alert overview panel.

Reliable incident alerting for critical IT systems at German health insurance provider Debeka

“Thanks to Enterprise Alert and the acknowledgement function, we can track the alerting and response digitally and have the certainty that our employees always take care of incidents in our critical IT infrastructure in a timely manner. IT alerting with Derdack, which has to be documented according to BaFin KRITIS, is highly reliable.”, Markus Reusch, Product Owner Monitoring, Debeka

IT Heroes Podcast - EPS 04 What's inside the mind of a cybercriminal

In this episode, our host Edgar and product marketing manager of Pulseway, Andy Ellwood are discussing the recent cybersecurity webinar, giving you the real hacker's perspective on the current cyberthreat landscape. Listen to the podcast to be one step ahead of hackers, know their strategies and formulas to enhance your weak links.

What Is Server Monitoring?

Your IT infrastructure runs on servers, which makes them vital to the performance of your entire IT environment. therefore, it is essential to monitor your servers to ensure there isn’t any disruption in performance and uptime. Servers are devices or applications that can store, process and deploy resources to other devices, applications or users. Now that you know how important servers are to an IT environment, what happens if a server stops working?

4 Important Things to Consider When Creating an ITSM SLA

Service level agreements (SLAs), if used correctly, can be one of the most important tools in a service-oriented organization. Done well, they communicate what’s expected of all parties and can go a long way to improving the relationship between the business and its IT organization. Some would even argue that good IT service management (ITSM) is built on a bedrock of SLAs (as well as continual improvement). Here are four tips for building more effective SLAs.

How to Easily perform Data Masking of Social Security Numbers (SSNs) in Log files or Events in 4 Ways using Data Bots

This blog post covers 4 data masking techniques and data obfuscation techniques that you can implement with Robotic Data Automation (RDA) to mask or hide sensitive data or personally identifiable information (PII) like social security numbers (SSNs) that may have crept unintentionally in logs or events.