Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Online Sales Are Up! Ensure Your E-Commerce Platform is Not Being Used for Fraud

Even with tough economic times, e-commerce is up 25% since the beginning of March. But, fraud has increased as well; according to Malwarebytes online credit card skimming has increased by 26% in March alone. In our April “Staff Picks for Splunk Security Reading” blog post, I referenced a story about an e-commerce site getting hacked with a “virtual card skimmer” (thanks Matthew Joseff for sharing this with me).

Heroku Logs - The Complete Guide

Platforms like Heroku give you the freedom to focus on building great applications rather than getting lost setting up and maintaining infrastructure. One of the many great features of working with it is the Heroku logs that enable monitoring your stack error troubleshooting. It helps speed up the process when things go wrong. In this Heroku tutorial, we’ll uncover best practices for making the most of Heroku logs.

Accelerating your Zendesk customer support response times by 50% and meeting support SLAs

Zendesk is one of the most popular ticketing support and customer service platforms available in the market. Two metrics that measure the effectiveness of your customer support are the response and resolution times — how soon are you able to respond to a customer ticket, and how soon are you able to mobilize relevant personnel, perform necessary remediation tasks and finally resolve the ticket.

How to implement log management policies with your teams

Logs are an invaluable source of information, as they provide insights into the severity and possible root causes of problems in your system. But it can be hard to get the right level of visibility from your logs while keeping costs to a minimum. Systems that process large volumes of logs consume more resources and therefore make up a higher percentage of your overall monitoring budget. Further, log throughput can be highly variable, creating unexpected resource usage and financial costs.

Security configurations-Part two: 8 imperative security configurations for your arsenal

In part one of this two-part blog series, we discussed seven reasons security configurations are an important part of an organization’s security posture. In this part, we’ll look at eight security configurations that can help with ensuring comprehensive control over the endpoints, avoiding vulnerabilities, deploying security configurations, and automating a number of verticals of endpoint security.

Five worthy reads: Multiexperience: The next milestone in the digital transformation curve

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll take an in-depth look at multiexperience which came in second on the list of Gartner’s top 10 strategic technology trends for 2020 and it’s importance in an organization’s digital transformation.

Customer Story: How Sentry Helps Grofers Meet Unprecedented Delivery Demand

As one of the leading grocery delivery services in India, Grofers needed to make massive fulfillment adjustments as demand rocketed due to an entire nation sheltering in place to help control the spread of infection during a global pandemic. For the Grofers team, providing much-needed grocery delivery service is as much of a technical challenge as a human resources one.

13 Key features every Modern CI/CD Tool should contain

DevOps methodologies have become a huge staple of the Software Development Lifecycle. As such, more and more companies have been adopting the need for Continuous Integration/Continuous Delivery (CI/CD) tools. Building a successful CI/CD workflow can be a tedious process that requires your team to participate in a large amount of preparation and planning — but it doesn’t have to be that way.