Operations | Monitoring | ITSM | DevOps | Cloud

How Identity Management Authentication Works

An organization can have multiple systems like Active Directory, SharePoint, Oracle, Outlook, Teams or simply web applications and they may have hundreds or thousands of employees or outside organization users that can access these systems. Managing accounts of every user and allowing proper access to their respective system is called Identity and Access Management (IAM).

Why a CDN Doesn't Solve All Your Performance Needs

A Content Delivery Network, or CDN, is a collection of proxy servers that are connected to the same origin server, and are geographically distributed relative to end users. Instead of utilizing a single server to respond to user requests, CDN edge servers are able to deliver content more effectively and efficiently to users based on their physical location. For example, if someone from Europe accesses your U.S.-hosted website, it would likely be done through a local U.K.

Time for a CDN? Waterfall Charts Have 90 Percent of the Answers

When was the last time you looked into the loading time of your website on actual end user screens? Do you know that the load time of your website content may significantly vary from different geographical locations? An end user sitting in Los Angeles may face a delay in downloading your web page and content than a user accessing your web page from London. The simple fact is lots of back-end processes are happening behind the scene to deliver your website and content to the end uses.

Why Traditional Monitoring Isn't Enough for Modern Web Applications

Website and web application technologies have grown tremendously over the years. Websites are now more than just the storage and retrieval of information to present content to users. They now allow users to interact more with the company in the form of online forms, shopping carts, Content Management Systems (CMS), online courses, etc. The list goes on and on.

How Volatility Impacts Visibility

If you’re like me, you’re working from home, social distancing, and staying safe during these unprecedented times. I spend a lot of time thinking about how this will impact the way we will work in the future. Going through this with our teams creates stronger bonds as we learn how to work remotely and through a global pandemic. We now spend more time in zoom meetings and use more collaborative tools than we did even just a month ago.

How LineMetrics Uses InfluxDB to Launch Its IoT Monitoring Platform

“What would it be like to have an asset monitoring solution that can be installed within minutes and is independent of all existing IT systems, without endangering existing processes?” LineMetrics was founded in 2012 in Haag, Austria, in response to questions just like this one. LineMetrics developed a complete real-time asset monitoring solution delivered through its end-to-end Internet of Things (IoT) platform.

Approaching Kubernetes Security - Detecting Kubernetes Scan with Splunk

The Kubernetes framework has become the leading orchestration platform. Originally developed by Google, Kubernetes is a "platform for automating deployment, scaling, and operations of application containers across clusters of hosts" * . The kubernetes platform is used in all Cloud platform provider vendors as a tool that allows orchestration, automation and provision of applications and specific needs computing clusters and services.

Introducing template variable saved views for dashboards

Datadog dashboards provide immediate visibility and insight into your environments. Setting template variables enables you to filter your dashboard graphs on the fly to visualize specific sets of tagged objects. Now, with saved views, you can save sets of frequently used template variables in order to easily find the data you most care about with just a few clicks.

SQL Server, Part 3: Adopting the principle of least privilege

In the previous blog in this series, we discussed authentication and authorization mechanisms, and how configuring them properly can help secure your databases. In this blog, we’ll talk about how data breaches can be prevented by implementing the principle of least privilege (POLP). According to Verizon’s 2019 Data Breach Investigations Report, insiders account for 76 percent of all compromised database records.

Grafana 7.0 sneak peek: Inspect drawer lets you get raw data and download as CSV

Grafana v7.0 is coming soon! Here’s another sneak peek of one of its features: the inspect drawer. The inspect drawer is a feature that every panel will support, including internal as well as external community plugins. In this new drawer, you will be able to view the raw data in a table format, apply some predefined transformations, and download as CSV. “Download as CSV” previously only existed as a custom feature for the Graph & Table panel.