We've made some additions to the platform that we're pretty excited about and would like to share. An even easier way to add tests, service/daemon support for the application and job scheduling for those of you that like to know that your configuration is gold even when you're not watching.
1. Quick Test Create
There is no longer any need to trawl through our list of available test templates to add the one you want. Just start typing into the new test search box, make your selection and hit enter. You can still select from the full list by hitting the Add Test button.
2. Running the UpGuard Application as a Service/Daemon
We've added some necessary resilience to the UpGuard application by giving you the ability to run it as a service on Windows and a daemon on Nix.
For more information on setting up the application to run as a service or daemon please refer to the following Knowledge Base articles (NB: You need to have created an account before accessing the Knowledge Base):
OK, so if the ability to fire off your configuration tests direct from the website ain't enough for you we've now added the ability to schedule those tests for nodes or entire environments. If something happens to your config you weren't expecting you'll be notified. We're pretty happy that one of our scheduled jobs has already paid off by picking up the fact that some of our SSH keys got blown away from a production server. Always nicer to find that out when you don't urgently need access :)
Whether you schedule your jobs or not you can still kick off tests manually at any time.
As always, if you need any assistance with these or any other features don't hesitate to let us know.
If you don't yet have an account then what are you waiting for? Get started today!
Misconfigurations are an internal problem that emanate from within the IT infrastructure of any enterprise; no hacker is necessary for massive damage to occur to digital systems and stored data. And the problem is pervasive, with Gartner estimating anywhere from 70% to 99% of data breaches result not from external, concerted attacks, but from internal misconfiguration of the affected IT systems.