Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Automating Collection of Troubleshooting Data with Triggers: a How-To Guide

Everyone wants to be more efficient — to spend less time on the tedious things, and more time on the things that move the needle. As much as possible, if you can automate those tedious things, you should. With Honeycomb, we enable you to understand how your application behaves in production through the ability to iteratively ask questions of the system instrumentation data, no matter how granular. Honeycomb triggers enable you to be notified when specific things happen in your system.

[OpsComm May] Continuing the AIOps Momentum with the Summer 2019 Release and State of AIOps Report

May 2019 saw the announcement of our latest SaaS platform update - The OpsRamp Summer 2019 release which delivers several new AIOps innovations like OpsQ Observed mode, Topology context capabilities, out-of-the-box Kubernetes dashboards and an array of other features. We also launched our latest AIOps report - The State Of AIOps which gives deeper insights on how AIOps is being used by enterprises in IT today.

Keeping Graylog Secure

Now that you have your brand new Graylog instance up and collecting your organization’s logs, all the data is quickly searchable and available for troubleshooting any issues as they arise. Just as easy as it is for you to use, an attacker with access to the logs now has a much simpler job of understanding your environment and seeing all of your data. You need to make sure you are doing all the due diligence you can to protect the data.

A Beats Tutorial: Getting Started

The ELK Stack, which traditionally consisted of three main components — Elasticsearch, Logstash and Kibana, has long departed from this composition and can now also be used in conjunction with a fourth element called “Beats” — a family of log shippers for different use cases. It is this departure that has led to the stack being renamed as the Elastic Stack.

Use Caution When Enabling Default Encryption of New EBS Volumes

Amazon has enabled a great new feature for cloud security: Default Encryption for New EBS Volumes. When enabled in a region, any new EBS volume that is created will automatically by encrypted with the configured KMS key. At first glance, this sounds great. However, here there be monsters, as the saying goes, if you are copying EBS snapshots or AMI images across AWS accounts.