Abstract network infrastructure visualization

Salt Data Blog


Technical insights from the field

Practical guides on IT infrastructure, cloud services, and technology from practitioners who solve these problems daily.

Every guide is written by practitioners who solve these problems daily, deploying infrastructure-critical software, setting up monitoring and backup systems, and managing compute, networking, and storage across client environments. We manage IT operations for growing businesses, and our articles are grounded in hands-on experience.

We publish independent reviews and reporting guided by transparent testing, clear disclosures, and strict separation from advertising or sponsorship influence. We do not sell coverage or outcomes. Review samples may be loaned, provided, or purchased, always disclosed, and never guarantee publication or positive results. We label affiliate links, manage conflicts of interest, and follow source-verification standards for news posts. If we make mistakes, we correct them quickly with visible update notes. Read our full editorial policy →

All Articles


LiteLLM Supply Chain Attack: What MSPs Need to Know

Analysis of the TeamPCP supply chain attack on LiteLLM via compromised Trivy GitHub Actions, covering the 3-layer payload, IOCs, and defensive actions for MSPs.

Huntress Blocks Device Code Phishing from Railway

Huntress deployed a conditional access policy across ITDR-protected tenants to block device code phishing from Railway infrastructure using AI-generated lures.

We Published a Complete Guide to IT Outsourcing in Romania

Our new guide compares in-house IT vs. outsourcing for Romanian SMBs with real costs, the invisible IT principle, and provider selection criteria.

Fixing "SQL VSS Writer Is Missing" in Veeam Backup

A trailing space in a SQL Server database name can silently break VSS writer registration for every database. Here's how to find it, fix it, and prevent it.

Automating Docker with Komodo — Builds, Syncs, and Procedures

Use Komodo's Resource Syncs for GitOps, Procedures for automated workflows, Builds for CI/CD pipelines, and the CLI for headless Docker management.

Fortinet 2025 Security Awareness Report: Key Findings

Analysis of the Fortinet 2025 Security Awareness and Training Report covering AI readiness gaps, training completion rates, and an action plan for MSP teams.

Huntress 2026 Cyber Threat Report: Key Findings for MSPs

Analysis of the Huntress 2026 Cyber Threat Report covering identity compromise, RMM abuse, ClickFix loaders, ransomware timelines, and a 30-day action plan.

Mapping Docker Containers Across Multiple Servers

An open-source CLI tool that SSHs into multiple servers, discovers running Docker containers, and generates Mermaid diagrams or HTML tables for documentation.

Managing Docker Across Multiple Servers with Komodo

Deploy Komodo Core with Docker Compose and install Periphery agents on remote servers to manage Docker containers, stacks, and builds from a single dashboard.

Hosting a Monitoring Stack - Grafana, InfluxDB, and Telegraf

Deploy a complete self-hosted monitoring stack using Grafana, InfluxDB, and Telegraf with Docker Compose — from installation to your first dashboard.

Self-Hosting Hudu with Docker & Cloudflare Tunnel

A practical guide to installing Hudu with Docker Compose, maintaining it over time, and securely publishing it via Cloudflare Tunnel.

Creating a Proxmox VM Template with Cloud-Init

Step-by-step guide to building a reusable Proxmox VM template with Cloud-Init — from base Ubuntu setup and hardening to cloning production-ready VMs in seconds.

Ubuntu SSH Key Authentication and Basic Hardening

Set up SSH key-based login on Ubuntu, disable password authentication, and enable passwordless sudo — essential hardening for any server or VM template.

Welcome to the Salt Data Blog

Introducing our new blog where we share technical insights, practical guides, and perspectives on IT infrastructure, cloud services, and managed solutions.

Search articles
esc to close