1. Avoid Relying Solely on Email for Alerts Email is not a reliable alerting mechanism. Alerts can be delayed, filtered as spam, or ignored due to cluttered inboxes. From a user experience perspective, email-based alerts are often messy and ineffective. Recommendation: Use a dedicated alerting app or platform that supports webhook integrations. Azure and most modern monitoring tools offer this functionality. These solutions provide more reliable and timely alerting mechanisms. 2. Be Selective and Strategic with Monitors Not all systems or services require immediate alerts. It’s important to evaluate the criticality of each component before creating alerts. Example: If a non-business-critical website goes offline atRead More →

If you got this error – [inputs.docker] Error in plugin: permission denied while trying to connect to the Docker daemon socket at unix:///var/run/docker.sock It’s because /var/run.docker.sock is only accessible by root or anyone in docker group. telegraf is not in this group. The fix is to add telegraf to docker group: usermod -a -G docker telegrafRead More →

I just bought a Canon 5D Mark IV. I had 5D Mark III before, here are new features that i like on Mark IV Touch screen More pixels (30.3 vs 24) 4K Videos vs HD Video GPS LCD seems a nicer Photos seems betterRead More →

We mostly care about the cpu/memory/storage metrics for mysql. I found another interesting metrics, it’s the aborted clients. What is it? It’s the number of the client is unable to authenticate to your servers. Why does it matter? There are a few reason why the client is unable to connect: your server is reaching the maximum connections, the user is using wrong password. If this value is showing, it means we are not fully operational. It’s good for proactive action on this.Read More →

We recently got a spike in the requests, all the requests are coming from Alibaba IP address space. We are not sure what the purpose of this request is, the user agent does not identify what tool it is. The request is also coming from many IP addresses, blocking individual IP is challenging as there are so many IPs. After checking some properties of the IP, we see it’s coming from the AS number. Luckily Cloudflare WAF supports the rule condition based on AS number, applying the new rule based on the AS number helped us mitigated the issue in a few minutes. Cloudflare hasRead More →

When you want to apply some policy, most of the articles on the internet will provide you this sample mkdir -p /etc/opt/chrome/policies/managed /etc/opt/chromium/policies/managed \ /etc/opt/chrome_for_testing/policies/managed \ && echo ‘{ “ExtensionManifestV2Availability”: 2 }’ | tee \ /etc/opt/chrome/policies/managed/policy.json \ /etc/opt/chromium/policies/managed/policy.json You do the same, put it seems that the rules where not applied. How can you identify it, create some new lines in your script to capture your current chrome info , open the following urls ( about://chrome , about://policy/logs, about://extensions) When you have the screenshot, you will see the actual chrome configuration, it will give you some hints to troubleshoot. In my case, i found thatRead More →