Operations | Monitoring | ITSM | DevOps | Cloud

%term

3 Reasons Why Website Speed is More Important than Ever

Today’s business environment is relentlessly fast-paced. Today’s startups blast into tomorrow’s enterprises. And just as rapidly, today’s unicorns take a one-way journey into “hey, whatever happened to…” country. However, there’s another critical piece of the velocity puzzle that many businesses are missing, and it’s costing them customers and profits: the speed of their website.

Make time-series exploration easier with the PostgreSQL/TimescaleDB query editor

Grafana v5.3 comes with a new visual query editor for the PostgreSQL datasource. The query editor makes it easier for users to explore time-series data by improving the discoverability of data stored in PostgreSQL. Users can use drop-down menus to formulate their queries with valid selections and macros to express time-series specific functionalities, all without a deep knowledge of the database schema or the SQL language.

From OAuth to GitHub Apps: How Sentry Built its New GitHub Integration

As the most widely used source code management and error monitoring solutions, GitHub and Sentry work together to help developers improve their code and their productivity. With the newest Sentry integration release, GitHub users benefit from faster sign-in, flexible repository permissions, and easier organization-wide setup. And for the first time, GitHub Enterprise users can also take advantage of these useful integration features.

Splunk Enterprise Security: Event Sequencing

Focus on high fidelity threats to your environment with Event Sequencing in Splunk Enterprise Security and accelerate time to investigate and respond to incidents. To learn more on how an analytics-driven SIEM can address your security challenges, visit the Splunk Enterprise Security product page or read our SIEM Buyer’s Guide.

Using Audit Logs for Security and Compliance

Most software and systems generate audit logs. They are a means to examine what activities have occurred on the system and are typically used for diagnostic performance and error correction. System Administrators, network engineers, developers, and help desk personnel all use this data to aid them in their jobs and maintain system stability. Audit logs have also taken on new importance for cybersecurity and are often the basis of forensic analysis, security analysis, and criminal prosecution.

PgBouncer monitoring improvements in recent versions

As I wrote in my previous article “USE, RED and real world PgBouncer monitoring” there are some nice commands in PgBouncer’s admin interface that allow to collect stats how things going and spot problems, if you know where to look. This post is about new stats added in these commands in new PgBouncer versions.