Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Driving business resilience as a CIO: It's all about people

“An adaptive business model that has employee experience at its core is the key to building business resilience, creating sustainable competitive advantage, and scaling effectively in times of disruption.” This is one of the key findings of a new commissioned study by Forrester Consulting, on behalf of Elastic.

How I Built a Data Discovery API for AWS Data Lake

This simple FastAPI service will help you find data in a data lake Data lakes provide a myriad of benefits. They are data agnostic and don’t require you to define a schema upfront. However, without a proper structure, it may be challenging to find the data that you need. In this article, we’ll address this problem by creating a FastAPI abstraction allowing us to query the AWS Glue metadata catalog.

Monitor and Troubleshoot VMware Infrastructure with Splunk

Splunkbase apps are very popular among IT administrators and provide out-of-the-box content for different infrastructure types such as Windows, Unix, VMware, and AWS. As customers expanded their need for more infrastructure types, they historically had to manage and leverage multiple apps.

Splunk IT Essentials Work: A Centralized App for All Things ITOps

Splunkbase apps are very popular among IT administrators and provide out-of-the-box content for different infrastructure types such as Windows, Unix, VMware, and AWS. As customers expanded their need for more infrastructure types, they historically had to manage and leverage multiple apps. We have now introduced IT Essentials Work, one centralized app that provides a simpler way to monitor and troubleshoot across different infrastructure types without having to install and maintain different apps.

The Hidden Costs of Your ELK Stack [VIDEO]

At first glance, there may seem to be little not to love about the ELK Stack. It’s open source. It’s free (if you set it up and manage it yourself, at least). It’s a widely used solution with a thriving ecosystem surrounding it. But if you’ve ever actually built and managed an ELK stack environment, you have probably found that the theory doesn’t match the reality. The ELK stack is full of hidden costs, and it often fails to deliver real value over the long term.

Why Python cProfile is the Recommended Profiling Interface

Performance optimization is a basic need for software development. When it comes to optimizing app performance, tracking frequency, maintaining production, or perpetuation method calls, profilers play a vital role. Learn why Python cProfile is a recommended profiling interface and how it enhances your software performance.

Wait, your IT team did that? 10 unique hybrid work saves

Although IT teams are called upon to deliver a lot these days, I doubt many are being asked to solve the type of post-2020 (read: weird) hybrid work scenarios depicted below. IT support tends to stick to its ‘bread and butter,’ they focus on things like network connectivity, application performance, cybersecurity, or onboarding for new hires—to name just a few.

Using Remote Actions to Create ServiceNow Incidents

Recently we have received a lot of requests for Enterprise Alert to not only alert on critical situations but to also take a proactive approach to initiate, record and track those situations through ITSM tools such as ServiceNow and BMC Remedy. This post will center around what happens when critical systems fail and tickets are not being created in ServiceNow due to a break in the workflow.

IAM Policies: Good, Bad & Ugly

In my last post we looked at the structure of AWS IAM policies and looked at an example of a policy that was too broad. Let's look at a few more examples to explore how broad permissions can lead to security concerns. By far the most common form of broad permissions occurs when policies are scoped to a service but not to specific actions.

What is an ARP Table?

ARP (Address Resolution Protocol) is the protocol that bridges Layer 2 and Layer 3 of the OSI model, which in the typical TCP/IP stack is effectively gluing together the Ethernet and Internet Protocol layers. This critical function allows for the discovery of a devices’ MAC (media access control) address based on its known IP address. By extension, an ARP table is simply the method for storing the information discovered through ARP.