Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Maze Ransomware Attack Hits Cognizant

New Jersey-based service provider Cognizant is the latest victim of the Maze ransomware attack. This is an unfortunate reality check, proving that hackers don’t stop their calculated, malicious activities for COVID-19. Accordingly, managed service providers (MSPs) are still largely vulnerable to these malicious crimes.

The OpsRamp Monitor: Big Tech, Securing DevOps, AIOps Growth

As Covid-19 restrictions and predictions march on unabatedly, people are starting to think about what may be long-lasting changes to industries. The tech industry is a mixed bag: it all depends on your perspective. Layoffs are becoming commonplace, especially in BtoC tech startups: Lyft and AirBnB recently announced massive cuts. The giants-- which include the usual suspects Amazon, Microsoft, Facebook, Google, Apple, Netflix--are faring remarkably well, as discussed in a recent New York Times op-ed.

AWS Lambda Monitoring - what to keep an eye on with serverless

AWS Lambda is the leading serverless computing solution and is one of AWS’ most successful products, to date. Its popularity is in large part because of the way it makes development easier and faster. Lambda completely abstracts away the maintenance of underlying infrastructure including compute, storage, memory, and networking. Developers simply upload their code in the form of Lambda functions and the service fully handles the execution of these functions.

The New Ubuntu Server Guide

With the release of Ubuntu 20.04 LTS (Focal Fossa) the Ubuntu Server Guide has received a major set of updates and has moved to a new location on the Ubuntu website. The new location makes it much easier to read and contribute improvements. There is a link on the bottom of each page that points directly to the corresponding Discourse page which contains the source for each page of the Ubuntu Server Guide.

Ubuntu 20.04 LTS is certified for the Raspberry Pi

The release of Ubuntu 20.04 LTS was April 23, 2020. On the same day, Canonical added full support for Ubuntu Server 20.04 on all of the Raspberry Pis that we certify. Users can flash 20.04 to their Raspberry Pi knowing Canonical guarantees it will ‘just work’ and can make the most out of all of the new features added with 20.04. You can do this from our download page, or from the Official Raspberry Pi Imager tool.

Challenges with Monitoring Knockout.js Web Applications

Web applications like knockout.js help you to reach out to your audience and customers. And as your customer base increases, your web-application evolves so that you can cater to their varying needs. But the more features you introduce in your application, the more requests and responses need to be handled by your applications. That, coupled with design (CSS) can make your web applications pretty bulky. You must be thinking, “So what!

Security Log Monitoring and DNS Request Analysis

Monitoring all DNS requests in your network, including those that were blocked by (e.g., by a firewall) is a great way to increase visibility, enforce compliance and detect threats. A common problem with collecting DNS logs is that DNS server logs are notoriously hard to parse. Also, parsing only the logs of your DNS servers leaves a blind spot when it comes to usage of, or the attempt to use, an external DNS server like Google's 8.8.8.8.

SNMP vs WMI: the advantage of less resource consuming monitor types

WMI (Windows Management Instrumentation) is an actual standard to access and/or control Windows components, services and applications. With its query language (resembling the SQL used by many relational databases), WMI allows collecting information from multiple sources, so-called providers. However, this comes at a cost: running WMI query is a resource- and time-consuming operation (comparing to certain alternatives).

What is Subkeying?

Subkeying is a way to group a set of crashes at some level other than the top level of the call stack. Subkeying is a way to group a set of crashes at some level other than the top level of the call stack. At BugSplat, crashes are grouped by a stack key and groups of crashes can be found on the Summary page. By Default, BugSplat groups crashes using the topmost level of a call stack. A subkey is created when crashes are grouped at a level other than the top level of a call stack.

Introducing the Datadog Operator for Kubernetes and OpenShift

As more environments run on Kubernetes—including our own— Datadog has been making it easier to get visibility into clusters of any scale. To minimize load on the Kubernetes API server, the Datadog Agent runs in two different modes. The node-based Agent queries local containers or external endpoints for data, while the Cluster Agent fetches cluster-level metadata from the API server.