Operations | Monitoring | ITSM | DevOps | Cloud

November 2023

Doing DevOps Your Way On SaaS Solutions: Custom Plugins Come to JFrog Cloud with Workers Service

To no one’s surprise, cloud adoption continues to be a focus for organizations of all sizes and verticals. However, for those who are used to the flexibility and adaptability that comes with customizing self-hosted software, moving to a SaaS offering and losing some of that customization can be a deal breaker. At JFrog, giving developers the freedom – and flexibility – to work however they want to has always been a central tenet to our offering.

Diving into JTAG - Overview (Part 1)

As the first segment of a three-part series on JTAG, this post will give an overview of JTAG to set up some more in-depth discussions on debugging and JTAG Boundary-Scan. We will dive into the intricacies of the interface, such as the Test Access Port (TAP), key registers, instructions, and JTAG’s finite state machine. Like Interrupt? Subscribe to get our latest posts straight to your inbox.

Navigating the New SEC Data Breach Rule A Blameless Blueprint for Compliance

The new SEC rule on material security breaches goes into effect on December 18, 2023 for larger publicly traded companies and all other public companies within 180 days. If you're not already in compliance, it’s important for you to prepare for the new rule now by developing a plan for incident response and disclosure.

Memcached Metrics Monitoring with OpenTelemetry

Let's dive deep into the realm of Memcached, where we'll uncover the power of monitoring with OpenTelemetry and SigNoz. This isn't just about caching data; it's about watching over Memcached like a vigilant guardian, ensuring it performs at its best, and optimizing your application's speed. In this tutorial, you will install OpenTelemetry Collector to collect Memcached metrics that should be monitored for performance and then send the collected data to SigNoz for visualization and alerts.

How to Monitor MongoDB Metrics with OpenTelemetry

For high throughput systems that focus on gathering continuous data or have a heavy read-only traffic, NoSQL databases came as a blessing. NoSQL databases, due to their unstructured nature of data, allow relatively faster inserts as well as reads compared to relational databases. One such database that’s quite popular today is MongoDB. In this article, our focus would be to understand how to extract metrics out of MongoDB and ship them to Signoz using the Open Telemetry collector.

Sysdig Achieves the Amazon EKS Ready Designation

Today Sysdig has been recognized for achieving the Amazon Elastic Kubernetes Service (Amazon EKS) Ready designation from Amazon Web Services (AWS). This specialization recognizes that the Sysdig cloud-native application protection platform (CNAPP) is validated by AWS Partner Solutions Architects to integrate with Amazon EKS and Amazon EKS Anywhere. Amazon EKS Ready Partners like Sysdig offer AWS customers the ability to customize the Kubernetes solution to fit their business needs.

PagerDuty Named a Leader in GigaOm's Inaugural 2023 Incident Response Platforms Radar Evaluation

In a world where organizations of all industries increasingly rely on digital innovation and experiences to create differentiation in the market, it has never been more critical to ensure the integrity of their operations are safeguarded against unforeseen outages and incidents. Operational disruptions today can have a major impact on brand reputation, create negative revenue implications and impact customer loyalty.

What is Zero Trust and How IT Infrastructure Monitoring (ITIM) Makes it Happen

When the concept of Zero Trust emerged in 2010, it marked a sea change in how IT and network security are handled. The term, invented by Forrester Research analyst John Kindervag, is loosely based on the “never trust, always verify” motto. So why is this a sea change? Before 2010, IT focused on perimeter defenses and the concept of DMZs — areas of the network they deemed safe based on the protection they implemented.

Anomaly Detection for Time Series Data: Techniques and Models

Welcome to the third chapter of the handbook on Anomaly Detection for Time Series Data! This series of blog posts aims to provide an in-depth look into the fundamentals of anomaly detection and root cause analysis. It will also address the challenges posed by the time-series characteristics of the data and demystify technical jargon by breaking it down into easily understandable language.

How to Create a Network Assessment Report with This Template

As an MSP, your role is to ensure your client’s network operates without a hitch. Checking the health of their network and sharing your findings in a network assessment report helps you identify potential vulnerabilities so you can fix them sooner rather than later. Creating these reports is a critical part of an MSP’s role, but it’s also a tedious one. That’s why we’ve created a network assessment report template.