Operations | Monitoring | ITSM | DevOps | Cloud

What's new in the Grafana Image Renderer: higher-quality results, security enhancements, and more

Whether it’s for an email or that upcoming presentation, many Grafana users like to share their favorite dashboards or panels outside of Grafana itself. The Grafana Image Renderer is a backend service for Grafana that helps you do just that by rendering panels and dashboards as images, such as PNGs and PDFs, via a headless browser. It’s commonly used to support Grafana features like exporting dashboards, generating images for alert notifications, and creating PDF reports.

Different ways to Search Text in PostgreSQL

When it comes to text search, PostgreSQL offers a surprisingly rich set of tools. Initially, text search capabilities were quite basic, often relying on the LIKE operator. This is inefficient for large amounts of text and lacks the nuance that comes with language. A major breakthrough came with the introduction of the built-in tsquery and tsvector data types, along with the associated functions, as part of PostgreSQL's core distribution. But tsquery is not the only option.

Database DevOps vs. Database Migration Systems and Why You Need Both

Database DevOps and migration systems solve different parts of the same workflow - one enables collaboration, governance, and automation while the other delivers structured, versioned schema execution. Using both eliminates release friction by aligning developers, DBAs, and CI/CD pipelines with full auditability and rollback safety. Harness converges these capabilities to make database changes seamless, compliant, and production-ready by design. Every developer knows this story.

kubectl logs Command Reference and Documentation

The kubectl logs command retrieves container logs from Kubernetes pods. It supports real-time log streaming with -f, time-based filtering with --since, viewing previous container instances with --previous, and accessing logs from specific containers in multi-container pods using -c.

5 Network Issues That Affect Remote Offices (Not HQ)

Your headquarters runs flawlessly. Zero network complaints. But your remote offices? Constant connectivity problems, dropped video calls, and frustrated employees filing help desk tickets you can't solve. Remote offices experience 3x more network issues than headquarters, yet most of the IT teams have zero visibility into what's actually failing.

You've Found the Waste In Your Network Operations. Now What?

In a previous blog, we looked at your network operations through the lens of lean principles. We exposed the seven wastes that quietly drain your budget and burn out your teams. This constant cycle of reactive firefighting comes with a steep price. We outlined a concept in quality management known as the Cost of Poor Quality (COPQ), the total financial impact of wasted engineering hours, lost user productivity, and business risk.

What Is IT Compliance? IT Compliance Technology + Standards to Lower Your Compliance Risk

IT compliance is a broad discipline that ensures your organization’s systems operate in line with privacy, security, and regulatory expectations. Security and compliance teams use technical controls and automation to monitor, correct, and maintain compliance across the entire IT estate. Without a solid IT compliance management strategy, your organization faces elevated risks, from security breaches and downtime to financial penalties and legal consequences.

Secure the Mobile Edge: Android 16 & iOS 26 STIGs Require MTD

Whether it’s Warfighters deployed in the field or remote analysts supporting missions across the globe, mobile devices make these operations possible. But, these endpoints (and your data) need serious protection. That’s where the Defense Information Systems Agency’s Security Technical Implementation Guides (STIG) come in, setting the baseline for hardened endpoint and application security.

How Browser Monitoring Tools Improve Application Reliability and End-User Experience

Browser monitoring tools, also known as Real User Monitoring (RUM) solutions, enhance application reliability and end-user experience by providing detailed, real-time visibility into how users interact with web applications. These tools track key performance metrics, identify front-end errors, and help development and DevOps teams detect and resolve issues that directly impact users before they escalate.

Level Up Your Container Security: Introducing the JFrog Kubelet Credential Provider

Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed, compliant Kubernetes service that simplifies running, managing, and scaling containerized applications. EKS automatically handles the availability and scalability of the Kubernetes control plane, allowing teams of any size or skill level to focus on building and deploying production-ready applications across diverse environments, including AWS, on-premises, and at the edge.