Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The Cost of IT Downtime: An Overview

As the adoption of cloud computing continues to encourage innovation across industries, high-performing and resilient systems have become a necessity in order to keep pace with the competition and meet internal/external SLAs (service level agreements). In terms of customer expectations, a minute of downtime can mean thousands of dollars in lost opportunity and a soiled customer relationship. So what exactly is downtime?

Practitioner's Guide: An Introduction to Kubernetes Multi-tenancy

If your organization is adopting multiple Kubernetes clusters, chances are that multiple users or groups have access to these clusters on the same shared infrastructure. Kubernetes multi-tenancy aims to drive efficient use of infrastructure, while providing operators with robust isolation mechanisms between users, workloads, or teams. Running more applications on the same shared infrastructure means better utilization of resources and a reduction in overall operating costs.

Endpoint Security Data Collection Strategy: Splunk UF, uberAgent, or Sysmon?

Many threats originate from the endpoint and detecting them requires insights into what happens on the endpoint. In this post we look at different endpoint activity data sources, comparing the benefits and capabilities of Splunk Universal Forwarder with vast limits uberAgent and homegrown solutions.

Department of Defense Designates Splunk a Core Enterprise Technology

Last month, as part of its continuing efforts to acquire and secure advanced technology for cyberdefense, data analytics and other mission critical operations, the Department of Defense (DOD) designated the Splunk Enterprise Software Initiative (ESI) Blanket Purchase Agreement (BPA) as a Core Enterprise Technology Agreement (CETA). Of the 100+ OEMs that have been awarded a DOD ESI BPA, only seven have been selected for CETA designation by the DOD.

Network Firewall Security: Monitoring Firewalls 101

Installing a firewall onto your network is “good network firewall security”, right? Let’s be clear, it’s not – it’s the start to good security. While installing a firewall is an important component of security in a network firewall security posture, there’s much more to the process than just dropping in a piece of hardware, or enabling some new software.

TL;DR InfluxDB Tech Tips: Configuring a Slack Notification with InfluxDB

With InfluxDB you can create notifications to make the most out of your alerts. Notifications enable you to send check statuses to the endpoint of your choice. In this TL;DR we set up a Slack Notification Rule and Endpoint through the InfluxDB UI.

The Facebook data breach that affects over 533 million users explained

If you’re a Facebook user, brace yourself for this one. It’s recently come to light that 533 million Facebook users’ details were found on a very suspicious hacker forum. The details found include users’ phone numbers, Facebook IDs, full names, locations, birthdays, and email addresses – all typical information that is stored on a Facebook account.

Why Enterprises need to Modernize AIX (WebSphere) Workloads to Linux

IBM’s AIX operating system has powered zillion mission-critical applications for over three decades, providing enterprise applications the edge to do more. And, let’s not forget that a huge chunk of BFSI applications is still nesting on AIX within their own data centers due to its security, performance, and reliability.