Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Combining Log Analysis with Continuous Delivery to Reduce Release Cycle Times

One of the biggest challenges in the field of log analysis is being able to connect the dots and understand the underlying story connecting them. Applications and machines are generating an increasing amount of log data, making it extremely difficult to separate the wheat from the chaff.

Joomla! CMS Vulnerability Scanner

WordPress may power the majority or the internet, but Joomla! is the second most popular CMS on the planet, representing 6.1% of all known CMS websites. So we felt it was important to integrate it directly into our external website security and vulnerability scanner. Sitting alongside special checks for WordPress, Drupal and SilverStripe websites, we scan potential issues with the core version of Joomla! and any plugins installed.

Announcing Stackdriver Kubernetes Monitoring: Comprehensive Kubernetes observability from the start

Today, we are excited to announce the beta release of Stackdriver Kubernetes Monitoring, which lets you observe Kubernetes in a comprehensive fashion, simplifying operations for both developers and operators.

So What is Observability Anyway

It’s amazing. It’s brand new. Everyone needs it. It is “the next best thing”. Only half of these statements are true, it is not new and it is not the next best thing. It is branding an existing paradigm that many companies use and rely on—but—it is amazing and everyone should want it. If you’re new to the concept, what does observability really mean and how can it help transform your operations?

GDPR: Top 5 Logging Best Practices

The rather broad definition of personal data in the GDPR requires paying special attention to log data. GDPR and personal data in web server logs is a popular topic in many GDPR fora. For example, IP addresses or cookies might be considered personal data. Consequently, such data must be stored only with the consent of customers for a limited time. It is highly recommended to anonymize personal data before you hand over the logs to any 3rd party to minimize risk.