Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Role of ITSM in BFSI

As the BFSI market gets more crowded, the only real differentiation available for businesses in this industry comes down to superior customer experiences. And this applies to both the internal teams and external customers. If the IT teams at the firm get the right type of support, they can work more efficiently and provide a seamless experience to the external customers.

3 Ways SRE Can Boost your Business Value

Adopting SRE principles into your organization can be a big undertaking. You’ll need to develop new practices and procedures to minimize the costs of incident coordination. You’ll need to create a retrospective process that encourages continuous learning. You’ll need to shift culture to begin appreciating failure as an opportunity to grow. Your transition to the world of SRE will also require buy-in from all levels of your organization.

Elasticsearch Release: Roundup of Changes in 7.9.2

The latest Elasticsearch release version was made available on September 24, 2020 and contains several bug fixes and new features from the previous minor version released this past August. This article highlights some of the crucial bug fixes and enhancements made, discusses issues common to upgrading to this new minor version and introduces some of the new features released with 7.9 and its subsequent patches. A complete list of release notes can be found on the elastic website.

Elasticsearch Vulnerability: How to Remediate the most recent Issues

An Elastic Security Advisory (ESA) is a notice from Elastic to its users of a new Elasticsearch vulnerability. The vendor assigns both a CVE and an ESA identifier to each advisory along with a summary and remediation details. When Elastic receives an issue, they evaluate it and, if the vendor decides it is a vulnerability, work to fix it before releasing a remediation in a timeframe that matches the severity.

Machine learning log analysis and why you need it

Your log analysis solution works through millions of lines of logs, which makes implementing a machine learning solution essential. Organizations are turning to machine learning log alerts as a replacement or enhancement of their traditional threshold alerts. As service uptime becomes a key differentiator, threshold alerts are only as good as your ability to foresee an issue.

Strategically Managing Cloud Resources for Security, Fun, and Profit

The first time I created a cloud compute instance, then still called a “Cloud VM”, was an almost transcendent moment. It was like magic. I was at my first organization which had adopted the cloud, in my first DevOps position, and I immediately knew that the world had changed.

The Cloud Network Security Gap

Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember how it used to be. “Network” was a team. When you needed to open a port on the network, you had to provide an exhaustive definition of the change, explaining what port you needed, what external addresses should be able to reach it, and where it should be routed to internally.

How to switch Cortex from chunks to blocks storage (and why you won't look back)

If you’ve been following the blog updates on the development of Cortex – the long-term distributed storage for Prometheus – you surely noticed the recent release of Cortex 1.4, which focuses on making support for “blocks engine” production-ready. Marco Pracucci has already written about the blocks support in Cortex, how it reduces operational complexity for running Prometheus at massive scale, and why Grafana Labs has invested in all of that work.

Secure Your Endpoints with Trend Micro & Logz.io

Trend Micro Cloud One is a strong enterprise data security solution for data centers and cloud environments. Trend Micro’s advantages, like most other security tools, lie in its pairing with other security resources. That’s where Logz.io comes in. It brings together disparate data that Trend Micro tracks to create fully summarized dashboards and extremely detailed ones with specific focuses.