Operations | Monitoring | ITSM | DevOps | Cloud

Git Shortlog: Who Really Wrote the Code?

Wondering who’s actually writing the code on your team? Git knows and it’s not subtle. In this episode of Wait… Git Can Do That?, we show you how git shortlog -sne breaks down commit counts by contributor. See who’s active, who’s dropped off Sort by name, email, and commit count Bonus: GitKraken Desktop shows this visually with diffs, additions, and deletions Useful for standups, retros, or just flexing.

Easily Ensure Security Compliance with Puppet Enterprise

Learn how Puppet Enterprise simplifies security compliance management, helping regulated enterprises strengthen their security posture through automated monitoring and actionable insights. Key Features and Benefits: Upgrade your compliance workflow today! Streamline your processes and gain confidence in your security operations with Puppet Enterprise.

AI-Driven Alert Correlation with EventiQ in Splunk ITSI

In this video, we introduce EventiQ in Splunk ITSI, a powerful AI-driven solution designed to cut through the noise and help you find the root cause of issues faster. We’ll show you how EventiQ automatically analyzes and groups related alerts into actionable episodes, significantly reducing alert volume. We’ll cover how to enable EventiQ for a Notable Event Aggregation Policy and review the resulting episodes that it creates.

Enhancing Vulnerability Management Through Exposure Management

Exposure management improves vulnerability management by integrating various attack surfaces and enhancing asset visibility. It promotes a proactive approach to continuously manage threats and exposures. Organizations define their risk appetite for quicker decision-making on vulnerabilities. A zero day response strategy enables swift action on critical vulnerabilities. Ivanti's approach includes strong asset discovery and prioritization, utilizing threat intelligence for effective risk management.

Debug live production issues with the Datadog Cursor extension

The Datadog Cursor Extension uses the Datadog remote MCP Server to give developers access to Datadog tools and observability data directly from within the Cursor IDE. The Cursor Extension enables you to view live variable values that your logpoints capture during execution, and you can use the Cursor Agent to identify the lines of code responsible for the issue at hand. The Datadog Cursor Extension is now available in Preview.