Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Kubernetes Logging and Monitoring: What Kubernetes Can and Can't Do Natively

Kubernetes is a container orchestration tool, but its functionality extends far beyond just orchestrating containers in a narrow sense. It offers a range of additional features that—to a limited extent—address needs such as load balancing, access control, security policy enforcement, and even logging and monitoring. Indeed, Kubernetes’s broad functionality has led some folks to call it an “operating system” in its own right.

Putting You in Control of Your InfluxDB Cloud Spend

We recently changed the pricing of InfluxDB Cloud to let you control your cloud database spend so you spend only as much as you need to run your software and systems — with no wasted budget. If you just want a summary, check the InfluxDB Cloud pricing page. But if you’d like to nerd out on the changes we made, why we made them, and how to estimate your monthly spend on InfluxDB, then buckle up for a deep dive.

Hassle-free IP and switch port management with NetFlow Analyzer's IPAM SPM add-on

“The IP of that device? Let me look it up in this spreadsheet with a never-ending list of IP addresses! *sigh*” Sound familiar? Do you often need to block a certain port allowing unauthorized traffic, get the MAC address of the IP taking up most of your bandwidth, or scan for rogue devices entering your network? Then the IPAM SPM add-on is the solution for you!

Monitor containers on Amazon Bottlerocket with Datadog

Amazon’s Bottlerocket is a new Linux-based open-source operating system that’s designed with containers in mind. Bottlerocket is optimized and stripped down to only the essential software needed to run containers. You can apply updates to Bottlerocket in a single step, and roll them back instantly if necessary. And, because it’s open-source, you can customize the operating system to fit your specific needs.

LM Container: Introducing Support for AWS Bottlerocket

Hybrid IT environments enable Enterprises to optimize factors such as performance, cost, agility, and security, but they also introduce complexity. Containers are a great way to reduce some of this complexity by standardizing how applications are developed and deployed.

Using Private Threat Intelligence Feeds on Hidden Security Attacks with Logz.io

Oftentimes, security attacks that were clearly recorded in logs go unnoticed. They are obscured by a large sea of log data created by most modern cloud environments. In some cases, like during a DDoS attack, there will be a huge spike in logs so it will be very clear what happened. In other situations, just a few logs will document the attack. Finding these logs can be like finding a needle in a hay stack. But if you know what to looks for, it doesn’t need to be so hard to spot these attacks.

Secure and monitor your containers on Bottlerocket from AWS

Sysdig is pleased to support AWS today in their GA launch of Bottlerocket, a special-purpose operating system designed for hosting Linux containers. Orchestrated container environments run potentially hundreds of compute nodes. Operating general-purpose Linux on container hosts introduces complexity for IT teams who must patch and update packages across their clusters. Worse, features and packages that are not necessary for running containers, introduce unnecessary security exposure.

A complete solution for installing Mattermost: Introducing Mattermost Omnibus

Some time ago, a group of Mattermost contributors sat down to think about how to improve the installation and maintenance flow of the platform. Managing a Mattermost install is quite straightforward already thanks to its binary distribution, but you still need to install and manage the different components that surround the application itself: the database, the web proxy, and the SSL certificate.

Tips for Success When Implementing Your Transformation Initiative

Change isn’t without its detractors in terms of people and systems. A misstep in expanding application performance monitoring (APM) across full-stack application monitoring can result in the degradation of availability and performance, stopping a digital transformation effort in its tracks. Avoid this at all costs. Deploying a full-scale digital transformation is a vast undertaking well beyond the scope of this brief article.