Operations | Monitoring | ITSM | DevOps | Cloud

Some of the Top SQL-on-Hadoop Tools with Pros and Cons

Hadoop ecosystem now serves as a comfortable home to Big Data now, and the Hadoop data stores now have a greater acceptance across the world by programmers, developers, data scientists, and database management experts. These ecosystems are as convenient as the data storages; however, the inherent reporting system of Hadoop poses a few challenges for the users to overcome.

How SIGNL4 supports geolocation and GPS information

SIGNL4 provides great support for geolocation information and in multiple ways. When a new alert with geolocation information is displayed in the mobile app, the app renders a map to visualize geographic information of the incident. A double click allows to open the default map application on the mobile device, e.g. to get directions or traffic information.

Monitor Scylla with Datadog

Scylla is an open source database alternative to Apache Cassandra, built to deliver significantly higher throughput, single-digit millisecond latency, and always-on availability for real-time applications. Unlike Cassandra which is written in Java, Scylla is implemented in C++ to provide greater control over low-level operations and eliminate latency issues related to garbage collection.

IAM Access in Kubernetes: The AWS Security Problem

Identity and access management (IAM) in AWS is a way to grant access to AWS services and collect and transmit data and credentials. Most Kubernetes “Quick Start” guides for AWS do not adequately cover how to manage IAM access in your pods. This blog series will first go over the security issues specific to AWS IAM on Kubernetes, then compare solutions, and then we will end with a detailed walkthrough for setting up your cluster with one of those solutions.

So, what is Application Insights?

In the last few posts, Sameer has walked you through various aspects of Azure Monitor Logs and I’m sure you’ll agree that it’s a very powerful tool when it comes to gathering and analyzing data from your Azure resources and beyond. In this post and the next, I’m jumping in for Sameer to talk about Application Insights, which is a different beast altogether.

SSL certificate life cycle management: Unraveling the mystery behind web service outages

How often have we tried to access a website or a web service to find that the service is down? Most of the time, an expired SSL certificate is reason behind such unforeseen outages. Not only does it result in loss of productivity for end users, but also leaves a dent in the hard-earned reputation for business owners. This webinar throws light on a few such real-world scenarios and recommends a few best practices you should follow to stay on top of SSL certificate life cycle management.

Client Side Security: Magecart Attack Detection Upgrade

We’re excited to announce the release of a major upgrade to our market-leading client-side security feature that detects Magecart type attacks fast. We’ve improved the engine that powers our ability to detect Supply Chain Attacks, Web skimming and Formjacking with our most advanced features to date.