Your monitoring system provides a comprehensive overview of any infrastructure. This centralization of data inevitably creates a vulnerable point that attackers can potentially target and exploit. In this article we'll look at how to set up your monitoring system so that this doesn't happen.
Hosting your own Graphite and Grafana monitoring system is tough. This article looks at how to do it, and the pros and cons of running it on your own.