Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Elastic Stack 7.6.0 released

We are excited to announce the general availability of version 7.6 of the Elastic Stack. This release streamlines automated threat detection with the launch of a new SIEM detection engine and a curated set of detection rules aligned to the MITRE ATT&CK™ knowledge base, brings performance improvements to Elasticsearch, makes supervised machine learning more turnkey with inference-on-ingest features, and deepens cloud observability and security with the launch of new data integrations.

Solving IT Talent Crisis Requires Self-Service Tools & Culture Change

Martha Heller is CEO of Heller Search Associates, an IT leadership executive recruiting firm. Martha is a frequent keynote speaker at IT industry events and author of two books: The CIO Paradox: Battling the Contradictions of IT Leadership, and Be the Business: CIOs in the New Era of IT. We chat with Martha about how CIOs are pushing tech work into the business, the IT skills they need most, and what they need to do to attract and retain women.

Using the NIST Cybersecurity Framework to Assess Your Clients' Network Security

The National Institute of Standards and Technology Cybersecurity Framework—NIST Cybersecurity Framework for short—is a set of best practices to help companies better identify, detect, and respond to cyberattacks. While the framework was intended to be used by internal IT teams, its five major themes—identify, protect, detect, respond, and recover—can be used to create a handy network security assessment tool for MSPs.

Making data-driven decisions with log management software

Today, most enterprises rightfully think about their business strategies by leveraging available data. Data-driven decisions certainly are more solid and reliable than those based upon mere instinct, intuition or just plain mysticism. Logs, in particular, are a fantastic source of information from which a company can draw to fuel its business intelligence (BI) strategies. However, there’s a big and sometimes unbridgeable gap between theory and practice.

How To Maximize On Your Usage Of Awk

Abbreviated from the names of its developers – Aho, Weinberger, and Kernighan – Awk is a scripting language used in Unix or Linux environments for manipulating data and generating reports. The awk command programming language requires no compiling, and allows the user to employ variables, numeric functions, string functions, and logical operators. In this article, we’ll be looking at some examples demonstrating its many and diverse uses.

How and Why to Monitor Logs: All You Need to Know

Logs. You have them. You need to keep track of them. The process of log monitoring can be tedious. Typically it’s one of those things we take for granted and only look at when it stops working. So, how do you deal with them? In this post, we’re going to talk about why and how to monitor logs. Toward the end, we’ll discuss a few tools that’ll help, mostly to avoid manual labor.

6 tips for preventing performance headaches in retail apps

Are you still thinking about last year’s software performance headaches? You aren’t alone. Even large-scale retail apps experience preventable problems like broken payment buttons, and every year we hear of another retail giant that is unable to cope with traffic spikes on Black Friday – a $3 billion e-commerce day. Luckily, many of these software problems can be prevented. We’ve put together a few tips for maintaining performant retail apps so you can be ready for anything.

Monitoring Setup Made Simple with Tanka and the Prometheus-Ksonnet Library

As mentioned in a previous post, at Grafana Labs we make heavy use of Tanka and the Jsonnet programming language to manage our Kubernetes infrastructure. One of the benefits of the use of Jsonnet is the depth of collaboration that it allows with others outside of your company. For example, the open source prometheus-ksonnet library can be used to install both Prometheus and Grafana.