Operations | Monitoring | ITSM | DevOps | Cloud

How Cortex uses the Prometheus Write-Ahead Log (WAL) to prevent data loss

Since the beginning of the Cortex project, there was a flaw with the ingester service responsible for storing the incoming series data in memory for a while before writing it to a long-term storage backend. If any ingester happened to crash, it would lose all the data that it was holding.

Remote Workforce Monitoring Dashboards 101

It's more important than ever to ensure your applications, tools and services are available for your remote workforce. Having visibility into the health and performance of these business-critical applications and infrastructures is critical for IT to maintain business continuity. With visibility into cloud applications like Zoom and Office 365, as well as the performance of critical services like VPNs and other tools, your team can quickly respond to issues and prevent outages.

Universal Artifact Management and Security Scanning - DevSecOps with JFrog Cloud ProX

Are you ready to deliver higher quality releases more quickly, efficiently and securely? In this webinar you will learn how to accelerate your delivery, with confidence. We will demo how JFrog Cloud ProX combines all the benefits of Artifactory Universal Repository Manager, with JFrog Xray - for integrated security vulnerability scanning & license compliance.

How IT Ops Teams are adapting to a world gone remote

Join Cameron Deatsch, Atlassian’s Chief Revenue Officer, and Andrew Burton, President and COO of Rapid7 for a live conversation about how to focus on what matters most - your customers - in today's remote environment. You’ll walk away with practical tips and proven solutions to stay ahead of the needs and changing requirements of your IT Ops teams.

Five things CISOs can do to make containers secure and compliant

Chances are, if you’re not already moving applications to containers and Kubernetes, you’re considering it. However, it’s likely that security and compliance implications are something you haven’t fully thought through. Addressing container security risks later in the development life cycle negatively impacts the pace of cloud adoption while simultaneously raising security and compliance risks. The use of containers and Kubernetes changes your security calculus.