If you haven't had a chance to explore Azure's Network Watcher, including the Network Security Group Flow logs, here's how to get the ELK integrated for analysis.
What should a DBA do other than wait for new edicts from on high — especially when data held by the IT department is a business asset and data governance is the responsibility of multiple people?
Single Sign-On (SSO), has become a very popular method of authentication. Read on to learn about the two different methods available for implementing SSO.
Azure Log Analytics lacks versatility, doesn't have any Log API connectors, and fails in terms of Java APIs. Check out how a sample project I made solves this problem.
Learn how to load data with GET requests and object ids, set the data to a CKEditor instance, and save the CKEditor's data back to your database with a POST request.
Walk through experimenting with CRDTs (conflict-free replicated data types) and learn how to do CRDT-based active-active geo-distribution in Redis Enterprise.
When we first created the Kubernetes templates, I wrote a blog post about it. In the comments, someone suggested that we should create a Helm package for Neo4j. 11 months later… we have it!