Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Elastic 7.13.0 released: Search and store more data on Elastic

We are pleased to announce the general availability (GA) of Elastic 7.13. This release brings a broad set of new capabilities to our Elastic Enterprise Search, Observability, and Security solutions, which are built into the Elastic Stack — Elasticsearch and Kibana. This release enables customers to search petabytes of data in minutes cost-effectively by leveraging searchable snapshots and the new frozen tier.

The What and The Why of TLS Inspection

Connecting to nearly any web page today, you’re more often to see a URL that begins with “https://” instead of “http://”. Wondered what the “S” is for? It stands for “secure”, but more importantly, it identifies that the connection is taking place over a secure channel using the Transport Layer Security (TLS) protocol. But what is TLS, and beyond that, what’s a TLS inspection?

3 Steps to Optimize Collaboration Solutions and Drive Adoption Today

It’s hard to imagine our work lives without collaboration tools. Whether you attend Zoom meetings or brainstorm projects (and send the occasional humorous GIF) on Slack, these solutions have become foundational elements of the workplace – even moreso in recent times, when most workplaces became more digital than ever before.

Monitor Your InfluxDB Open Source Instances with InfluxDB Cloud

Everyone says the cloud is the future. Sure, but try telling that to someone who has terabytes of sensitive data stored in an on-prem InfluxDB Open Source (OSS) instance, and they will bring up a whole set of reasons why it doesn’t make sense for them to move into the cloud right now. There are also some use cases which make more sense for on-prem software deployments.

Building a complete network security checklist

Understanding what to audit in a network can be chaotic and confusing. Building a complete network security checklist is crucial for organizations with computers connected to the internet or to each other. Think of it like an antivirus scan you might run on your computer to find Trojans or malware, except you’re scanning your entire network to find anything that may cripple it.

Introducing Datadog's Lambda extension

AWS Lambda extensions enable you to seamlessly integrate third-party tooling with your Lambda environment so you can run custom code or monitoring agents alongside your functions. We’ve partnered with AWS to create a Lambda extension that offers a more cost-effective, simplified process for collecting data from your functions.

How to Improve IT Service Desk Performance

IT Service Desks are developed as an efficient mechanism of delivering quick help whenever your employees need it. But as businesses grow, so does the request volume and the pressure on the technicians to attend every call and resolve a ticket. And with the onset of the work-from-home necessity induced by the COVID-19 pandemic, IT teams are struggling to efficiently support a remote workforce with minimum resources.

The Importance of Log Management - Guide & Best Practices

Log management encompasses the processes of managing this trove of computer-generated event log data, including: There are two ways that IT teams typically approach event log management. Using a log management tool, you can filter and discard events you don’t need, only gathering relevant information – eliminating noise and redundancy at the point of ingestion.