January 20, 15:01 UTC. I was sitting in my home office, watching the screen and feeling a mix of emotion and nostalgia as a pod was getting terminated. We have thousands of pods, continuously starting and terminating, and I’m definitely not spending my days watching them, so why was this one special? The terminating ingester-0 pod was the very last Cortex ingester running on chunks storage in Grafana Labs’ infrastructure.
What are the most important database performance metrics, and how do you monitor them? This is a question many IT professionals would like the answer to. We can collect and use a wide range of database metrics to analyze database and server resource consumption, not to mention overall usage. You are probably wondering why this is essential for business, so let’s explore this next.
A recent privilege escalation heap overflow vulnerability (CVSS 7.8), CVE-2021-3156, has been found in sudo. sudo is a powerful utility built in almost all Unix-like based OSes. This includes Linux distributions, like Ubuntu 20 (Sudo 1.8.31), Debian 10 (Sudo 1.8.27), and Fedora 33 (Sudo 1.9.2). This popular tool allows users to run commands with other user privileges.
As with any service in the cloud – particularly Microsoft 365 – it’s difficult to determine where along the path from user to Microsoft service lies the source of a service delivery problem. Without visibility into the entire spectrum of possible root causes – from endpoint to Microsoft cloud service – it’s nearly impossible to respond and potentially remediate the issue.
Modern applications are changing, and traditional testing practices are no longer up to the task. Learn more about the changing landscape of QA and how Chaos Engineering provides the necessary framework for testing modern applications.