Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Use Cloud Infrastructure Data Model to Detect Container Implantation (MITRE T1525)

A unified cloud infrastructure data model is fundamental for enterprises using multiple cloud vendors. Enterprise customers prefer to use multiple cloud vendors as a way to prevent being locked in and dependent on specific platforms. According to Gartner the top vendors for cloud infrastructure as a service in the years 2017-2018, are Amazon 49.4%, Azure 12.7% and Google with 3.3%.

Make the Splunk Connected Experiences Mobile Apps Work for You

You can view mobile-friendly dashboards and interact with augmented reality (AR) visualizations with the Connected Experiences suite of mobile apps. Splunk Mobile, Splunk AR, and Splunk TV allow you to take Splunk data on the go for a secure mobile experience. Below, Ryan O'Connor from the Splunk for Good team shares some examples of how to build mobile-friendly dashboards. Splunk for Good makes machine data accessible and valuable to nonprofit organizations and educational institutions.

Does Observability Throw You for a Loop? Part One: Open with Observability

The duality of observability is controllability. Observability is the ability to infer the internal state of a "machine” from externally exposed signals. Controllability is the ability to control input to direct the internal state to the desired outcome. We need both in today's cloud native world. Quite often we find that observability is presented as the desired end state. Yet, in modern computing environments, this isn’t really true.

IAM Access in Kubernetes: kube2iam vs kiam

IAM is the de-facto method of authorization in AWS. Most Kubernetes “Quick Start” guides for AWS do not adequately cover how to manage IAM access in your pods. This blog series will first go over the security issues specific to AWS IAM on Kubernetes, then compare solutions, and then end with a detailed walkthrough for setting up your cluster with one of those solutions.

Your 5G infrastructure monitoring checklist

5G technology, with its speed 10 times faster than 4G LTE, can help businesses realize many long-held goals, like real-time augmented reality (AR), virtual reality (VR), distributed machine learning within the Internet of Things (IoT), autonomous vehicles, smart cities, edge computing, etc. While 5G technology is imminent and likely to transform the pace of business operations, it will bring scalability challenges along with changes to networking architectures.

COVID-19: A Personal Guide to Self-Isolating and Remote Working

It’s now day 3 since UK PM Boris Johnson instructed the nation to stay at home and begin self-isolating and remote working to limit the spread of Covid-19. We’re all starting to realise life may not be going back to ‘normal’ anytime soon. Aside from our nation’s unsung heroes (the NHS, Supermarket Staff, Teachers, Postal Workers, Waste Collectors, the list goes on – thank you!), many are now turning to remote working.

What's The Difference Between Monitoring Webhooks and Background Jobs

If you have some experience setting up monitoring for different setups, this post is for you. Since different parts of your architecture have different tasks, they also have different expectations. Today, we’ll take a quick dive into how to deal with that reality and set up monitoring for it. Warning: In this post, you’ll have to bear with our enthusiasm for setting things up perfectly.

Creating a thriving, agile, remote team

The coronavirus (COVID-19) pandemic has forced many organizations to take unprecedented steps towards remote working. As a fully distributed team, we’ve faced the common challenges of remote work. Based on our experience from our very beginning in 2018, all but a few of these organizations new to remote working will face hurdles to overcome and may try to revert to colocation as soon as possible. Remote working is hard, even when it’s carefully planned and executed.

Logz.io Suppliers Support Plan-COVID-19

We believe that small businesses are the backbone of the local economy and consider our suppliers as partners in our success. Unfortunately, the novel coronavirus/COVID-19 has brought tough times and economic disruption that could significantly change the global economy. So we at Logz.io decided that we can make a meaningful impact by supporting our suppliers and helping them to meet the challenges that this new era brings.

How we're using gossip to improve Cortex and Loki availability

Have you heard about using the hash ring in Loki and Cortex? Here is a short version: In Cortex and Loki, the ring is a space divided by tokens into smaller segments. Each segment belongs to a single “ingester” (component in Cortex and Loki that receives data) and is used to shard series/logs across multiple ingesters. In addition to the tokens, each ingester also has an entry with its ID, address, and the latest heartbeat timestamp updated periodically.