Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

How to Successfully Deploy Kubernetes Across Multi-Cloud Environments

Today’s enterprise organizations are using some form of multi-cloud infrastructure, and the numbers don’t lie. According to Flexera’s 2020 State of the Cloud report, an average of 2.2 public clouds are being used per enterprise company. And in a different report from the Everest Group, 58% of enterprise workloads are on hybrid or private cloud. The sheer increase in multi-cloud usage illustrates it’s growing popularity across enterprises.

Validating Elastic Common Schema (ECS) fields using Elastic Security detection rules

The Elastic Common Schema (ECS) provides an open, consistent model for structuring your data in the Elastic Stack. By normalizing data to a single common model, you can uniformly examine your data using interactive search, visualizations, and automated analysis. Elastic provides hundreds of integrations that are ECS-compliant out of the box, but ECS also allows you to normalize custom data sources. Normalizing a custom source can be an iterative and sometimes time-intensive process.

Pingdom Powered Status Page

Pingdom is one of the most used website monitoring tools, with almost 15 years in the business. It excels at providing simple and reliable synthetics as well as real user monitoring. This monitoring tool provides a simple public status page, but as you might have noticed it’s quite limited. It only serves as a display of your uptime and response time history, not much more than that.

Shifting Complexities in DevOps

In this episode of ShipTalk, Jim Shilts, Developer Advocate at Shipa and the Founder and President of North American DevOps Group (NADOG), chats with Ravi Lachhman, Evangelist at Harness on the “Shifting Complexities in DevOps.” Jim has been working on solving engineering efficiency problems for over 20 years, working at firms such as Build Forge and Electric Cloud, pre-dating the inception of Hudson/Jenkins.

Improve Business KPIs with Splunk APM Business Workflows

One of the biggest challenges that DevOps teams face is how to connect their efforts with the priorities of business leaders. In conversations we’ve had, developers and SREs discussed how they need to show business and engineering leaders that they are investing their time solving the right problems, and how solving these problems lead to overall better business outcomes.

Sumo Logic extends its APM to browser

Over a year ago we decided to invest heavily in Application Observability, understanding the modern observability platform must unite logs, metrics, and traces in one analytics layer to better serve reliability use cases. We have also advocated a modern trend to acquire tracing data via open source industry standards like OpenTelemetry without vendor lock-in.

Enough! 4 Work From Home Solutions to Heal IT's Pain

Let’s face it: when it comes to managing a work-from-home setup, IT has a lot of problems they don’t know how to solve. It’s not for lack of effort – there just don’t seem to be many practical solutions out there that can alleviate their new remote work-induced headaches. It was tough enough getting everyone up and running in home offices. Now, IT is all but drowning in tickets (a majority of tech leaders have reported ticketing increases up to 50%).

Website downtime: 4 more major websites that have gone down in the last month

Website down. Two words that cause panic in website owners far and wide, especially if they have thousands, if not millions of people, using their website on a daily basis. But it’s not as rare as most people think, even the biggest of companies find themselves in the deep depths of website downtime hell. The impact? Loss of revenue for starters, followed up by your competitors who are online getting your customers’ attention, bad SEO rankings, and lack of customer satisfaction.

What You Need to Know About Server Security in 2021

How often do you check your event log monitor for potential security breaches? Did you know that many potential security breaches, events, and other problems are logged to event logs? Unfortunately, even the most skilled IT professionals have a hard time making sense of what to watch for that could indicate security issues or even a potential breach until it is too late. Event logs contain a ton of information that can be useful.