Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

PPS Spike Every 110 Seconds on AWS EC2

I don’t know what to say about this post… I found something weird while investigating PPS on EC2. It seems to correlate with CPU credits on t1/t2/t3 instances, but is consistently inconsistent in presentation. It only shows up when you track the stats yourself, because Cloudwatch doesn’t show the 1-second granularity needed to see these numbers.

Check Root Access Keys Action

Still referencing Best Practices for Managing AWS Access Keys, best practices recommends that root access keys are never used and should be completely removed from your AWS account. Instead, IAM users with limited permissions should be used. In fact, Skeddly even prevents root access keys from being registered with Skeddly. We always recommend using IAM third-party roles, however, access keys can still be used. And we only allow IAM user access keys to be registered.

Our Take on The New Stack's Guide to Serverless Technologies

We have read with great interest the recently released The New Stack ebook entitled: Guide to Serverless Technologies. It is a great report with great insights! We encourage you to read it as well (it's free!). We have recently closed our own survey and are tabulating the results and have seen many similarities and some differences in the responses. Weighing in on the findings of the New Stack survey in advance of releasing our report, we wanted to comment on three key themes from this eBook…

Payload Size and Max PPS on AWS EC2 - No Effect

While benchmarking packets per second (PPS) in AWS EC2 and searching for hard-coded or other software-based limitations, my early findings suggested that there definitely was a credit mechanism, complete with network throttling, in place. I now know that to be false, since finding the guaranteed throughput / best effort mechanic.

Announcing Advanced On-Premise and Multi-Cloud Logging Platforms

We’re excited to announce the general availability of our new On-Prem, Self-Hosted, and Multi-Cloud logging platforms. Our customers will have the capability to log data in their infrastructure of choice. Whether across multiple public/private clouds or within a customer’s own data center, logs can be viewed through a unified interface while addressing any data locality and performance requirements.

Near Real-Time Log Collection From Amazon S3 Storage

We are very excited to announce a new capability for our Amazon S3 sources. Until recently, the only method Sumo Logic used for discovering new data in an S3 bucket was periodic polling. However, with our new notification-based approach, users can now configure S3 sources such that Sumo Logic is notified immediately (via AWS SNS) whenever a new item is added to an S3 bucket, eliminating the need to wait for new objects to be discovered via periodic polling.

Disable Unused IAM Access Keys Action

According to Best Practices for Managing AWS Access Keys, if you must utilize IAM access keys, it is best to remove or disable unused keys. This will close possible security holes in your AWS account. Today, we’re happy to announce a new action to help with this task: Disable Unused IAM Access Keys. This new action will iterate through the IAM users in your AWS account, determine when any access keys were last used, and if they were not used inside a configurable threshold, disable the keys.

AWS re:Invent-What do Black Friday and Cyber Monday Have in Common?

With the genesis of Amazon Web Services, enterprises of all sizes can now take advantage of the public cloud to deliver significantly more agility and control. With AWS, elastic infrastructure is easier to attain, and usage spikes are an afterthought. Only days apart, Black Friday and Cyber Monday are arguably the two biggest days in retail. They’re what make “web scale” a requirement for leading eCommerce organizations throughout the world.

Monitoring and securing Kubernetes-based healthcare services on Google Cloud: Cota Healthcare

As Cota Healthcare moved to Kubernetes on Google Cloud, it chose Sysdig for Kubernetes monitoring and container security. With Sysdig, Cota accelerates healthcare service development, improves capacity planning, fixes issues rapidly, and strengthens its security posture.

Monitoring Apache Spark applications running on Amazon EMR

We recently implemented a Spark streaming application, which consumes data from from multiple Kafka topics. The data consumed from Kafka comprises different types of telemetry events generated by mobile devices. We decided to host the Spark cluster using the Amazon EMR service, which manages a fleet of EC2 instances to run our data-processing pipelines.