Operations | Monitoring | ITSM | DevOps | Cloud

How secure is your Grafana instance? What you need to know

One of Grafana’s most powerful features is the ability to funnel data from hundreds of different data sources (i.e., services or databases) into a single dashboard without migrating the data from where it lives. You can connect and correlate data from Grafana’s curated observability stack for metrics, logs, and traces, or third-party services, such as Splunk, Elasticsearch, Github, Jira, and many more.

Why Reliability Engineering Matters: an Analysis of Amazon's Dec 2021 US-East-1 Region Outage

In the field of Chaos Theory, there’s a concept called the Synchronization of Chaos—disparate systems filled with randomness will influence the disorder in other systems when coupled together. From a theoretical perspective, these influences can be surprising. It’s difficult to understand exactly how a butterfly flapping its wings could lead to a devastating tornado. But we often see the influences of seemingly unconnected systems play out in real life.

Podcast: Break Things on Purpose | Carissa Morrow: Learning to be Resilient

Being new in tech an be intimidating! Thankfully, folks like Carissa Morrow are shining examples of how to come into tech from the ground up. Carissa began with a career shift and just started coding, went through the Boise Codeworks bootcamp, and made the jump to tech. Carissa talks about the resilience it took in her early days, and how those experiences reinforced her attitude on continually learning.

Tracking Stability in a Bluetooth Low Energy-Based React-Native App

For most of my career I’ve worked with health and wellness startups. Most of these companies have a wearable that tracks movement, heart rate, body weight or stimulates a body part. The common denominator between these apps is their use of sensor data to determine physiological progress an athlete is making. Problem is, your Bluetooth Low Energy (BLE) device does not have an internet connection and cannot send diagnostics anywhere if there are errors.

APM vs. Logging: Do I Need Both?

The final stage of the popular Software Development Lifecycle after planning, analysis, design, and implementation is maintenance. This is where a full-fledged application running in production is constantly looked after and taken care of. Bugs, bottlenecks, slow database queries, security loopholes, and other issues are discovered and fixed before deploying the updated code. Log records and Application Performance Monitoring (APM) tools play a crucial role in software development maintenance.

The Complete UX Audit Checklist 2022: for CIOs and Self Auditors

It’s essential to perform a UX Audit on your website from time to time. It helps improve the quality of your site by reviewing its strengths and weaknesses. Chief Information Officers often carry out this job. However you can perform the UX Audit yourself if the company is small. Either way, you’re going to need a complete UX Audit Checklist that makes sure you get the most valuable insights from your audit.

IoT Security: How Important are Logs for System?

IoT has rapidly moved from a fringe technology to a mainstream collection of techniques, protocols, and applications that better enable you to support and monitor a highly distributed, complex system. One of the most critical challenges to overcome is processing an ever-growing stream of analytics data, from IoT security data to business insights, coming from each device. Many protocols have been implemented for this, but could logs provide a powerful option for IoT data and IoT monitoring?

Debugging Node.js Memory Leaks: How to Detect, Solve or Avoid Them in Applications

In this article, you’ll learn how to understand and debug the memory usage of a Node.js application and use monitoring tools to get a complete insight into what is happening with the heap memory and garbage collection. Here’s what you’ll get by the end of this tutorial. Memory leaks often go unnoticed. This is why I suggest using a tool to keep track of historical data of garbage collection cycles and to notify you if the heap memory usage starts spiking uncontrollably.