Introduction to Prometheus Monitoring

Our Team hosted a Workshop on Prometheus which was very insightful and made absolute sense in terms of the Principles and the application part. The audience strength was pretty amazing, besides this, we also received many queries from the people who couldn’t join because of the Virtual Meet Limit. So, we shared the recording and the slides on social platforms. Here we try to share a glimpse of the workshop while keeping the same essence.

Continue reading “Introduction to Prometheus Monitoring”

VPN Services Comparison- How to find the best VPN for your business?

VPNs are a great way to securely connect your private networks. They are even used to mask your public IP, so that you can access a public server without getting traced. There are a number of VPN offerings in the market ranging from open-source to proprietary software, self-managed to VPN-as-a-service, and with a huge range of features.

I recently got an assignment to get the best offering in the market. Best is a vague term. An Open-source VPN covering all the basic functionalities can be best for a simple implementation . Or a proprietary VPN having a lot of simplicity and customisation can be best for a medium or high budget implementation. So, I decided to compare different offerings in the market. Complete open-source VPNs are out of the scope.

Here are the things I kept in my mind before starting:

Continue reading “VPN Services Comparison- How to find the best VPN for your business?”

OpenGrok Setup and Features

Do you have a large source code and find difficulties in searching the code or history of the code. There is a solution for you! Opengrok

OpenGrok is a Java-based application that helps you to search in source code in a fast manner. It is developed by Oracle and supports a large number of languages and formats.

Continue reading “OpenGrok Setup and Features”

Using TruffleHog Utility in Your Jenkins Pipeline

Introduction

This is a quick blog on how we can use the TruffleHog utility in our Jenkins pipeline to search for the secrets, passwords, sensitive keys which may have been accidentally committed in our repositories.

TruffleHog proves to be a great tool in helping us to fetch the sensitive data from our repositories which we do not want to expose at any cost.

Before moving further with this blog, I would like you all to take a look at the prerequisites that are mentioned below.

Continue reading “Using TruffleHog Utility in Your Jenkins Pipeline”