Operations | Monitoring | ITSM | DevOps | Cloud

TLDR InfluxDB Tech Tips; Creating Buckets with the InfluxDB API

Whether you’re using InfluxDB Cloud or InfluxDB OSS, the InfluxDB API provides a simple way to interact with your InfluxDB instance. The InfluxDB v2 API offers a unified approach to querying, writing data to, and assessing the health of your InfluxDB instances. In today’s Tech Tips post, we’re learning about how to create and list buckets. Buckets are named locations in InfluxDB where time series data is written to.

TLDR InfluxDB Tech Tips; Creating Tokens with the InfluxDB API

Whether you’re using InfluxDB Cloud or InfluxDB OSS, the InfluxDB API provides a simple way to interact with your InfluxDB instance. The InfluxDB v2 API, the read and write portions are available with InfluxDB v1.8+, offers a unified approach to querying, writing data to, and assessing the health of your InfluxDB instances. In today’s Tech Tips post, we learn how to create and list authentication tokens. Tokens provide secure data flow between an InfluxDB instance and its users.

Introducing Splunk Real User Monitoring (RUM)

A few days ago, I tried ordering lunch from a local restaurant. I went online, spent time looking at their menu, chose a few items, clicked “submit” and… got an error message. This experience is not unique. Earlier this week, when I tried to read the news, I got a message saying they’re experiencing a technical issue. You can see both messages below: We’ve all experienced such situations, and they can be very frustrating.

AWS Distro for OpenTelemetry will send metrics and traces to Datadog

Datadog has a long-standing commitment to open standards. Our integrations with OpenMetrics, JMX, and WMI, as well as our implementation of the tried-and-true StatsD protocol, enable you to collect data with the tools and libraries that fit best into your workflows.

Sophisticated phishing

Most of us can think of a time when we received a phishing email. In fact, most phishing emails are easy to identify, and automatically go to spam. However, in this ongoing pandemic, hackers are adopting advanced tactics that cleverly conceal their malicious intentions, and fly under the radar by leveraging the victim’s fear, anxiety, or plain negligence.

Web application performance monitoring: measuring and alerting

Everyone knows that web performance is everything for a quality user experience. Web performance affects conversion rates because users quickly form opinions based on a website’s or app’s responsiveness. In this article, we explore the importance of performance to your web application throughout the entire user journey, how to examine your web application performance results, and how to set up your web application monitoring to alert based on performance.

Track open source security exposure with Snyk and Datadog

Using open source code makes it easier to build applications, but the freely available nature of open source code introduces the risk of pulling potential security vulnerabilities into your environment. Knowing whether or not customers are actually accessing the vulnerable parts of your application is key to triaging security threats without spending hours fixing an issue that doesn’t affect end users.

JavaScript Internals: Garbage Collection

Garbage collection (GC) is a very important process for all programming languages, whether it’s done manually (in low-level languages like C), or automatically. The curious thing is that most of us barely stop to think about how JavaScript — which is a programming language, and hence, needs to GC — does the trick. Like the majority of high-level languages, JavaScript allocates its objects and values to memory and releases them when they’re no longer needed. But, how?

Reading and resolving Puppet errors

When Puppet shows up red, don't panic! You need to figure out what's causing the error, so you can understand whether it's something fixable, or an actual bug. Generally, the first error in a Puppet run is the one you need to concern yourself with. Once the first thing fails, others that run after it or require it to succeed will also fail and could produce a LOT of red text! So scroll to the first red error on your Puppet run.