Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

NSA's Windows 10 Advisory - Is Your OS Really Secure?

New year, same old problems for Windows 10. But it doesn’t have to be that way. Earlier this month the United State’s National Security Agency (NSA) announced that they discovered a major vulnerability in Windows 10 and Windows Server 2016 that could have had dire consequences for businesses around the world. The vulnerability places Windows endpoints at risk to a broad range of exploitation vectors NSA official cybersecurity advisory

7 Online Proofing Tools to Make Life of a Designer Easier

When working on web and graphic designs there can be so much back and forth in emails and messages. There will be lots of email threads to keep up with. The review and approval process taking several turns. So, what do you do? Ask any designer about the pain they go through when it comes to the approval process. Luckily, the technology clearly will never disappoint any of us.

Accelerated App Containerization using AWS Container Services

App containerization has picked up momentum in recent years as it helps to save costs, time and resources. Resource vendors are available to assist in containerization of one or two apps, but most vendors struggle to execute a large number of app containerization projects with the same skill level and outcomes. As a matter of fact, it’s a manual approach in certain scenarios with a lot of dependencies which is not only time and cost consuming but also prone to errors and miscalculations.

Improve Your Logging Efforts by Leveraging Your Search History

When talking about log management, search history is overlooked more often than not. Past searches can be used as part of log analysis and forensic analysis, but the main issue with this data is the speed of search which gets compromised as data volume gets greater. We will discuss some ways to get the best out of your saved searches and to speed up the search process.

Getting AWS logs from S3 using Filebeat and the Elastic Stack

Logs from a variety of different AWS services can be stored in S3 buckets, like S3 server access logs, ELB access logs, CloudWatch logs, and VPC flow logs. S3 server access logs, for example, provide detailed records for the requests that are made to a bucket. This is very useful information, but unfortunately, AWS creates multiple .txt files for multiple operations, making it difficult to see exactly what operations are recorded in the log files without opening every single .txt file separately.

Using the Elastic APM Java Agent on Kubernetes

Elasticsearch and the rest of the Elastic Stack are commonly used for log and metric aggregation in various environments, including Kubernetes. In addition, the Elastic Stack is frequently being used for uptime tracking, with Heartbeat, as well as Application Performance Monitoring (APM), with agents supporting common programming languages, including Java.

Top 10 predictions for AI in IT operations

This article originally appeared in TechBeacon. Gartner first coined the term "AIOps" a few years ago to describe "artificial intelligence for IT operations," and over the last few years, IT operations monitoring tool vendors have begun incorporating AIOps features into their products. Now AIOps tools are commonplace, but many IT leaders remain cautious about using these relatively new capabilities.

Building Auvik Into Your MSP's Standard Operating Procedures

Standard operating procedures—more commonly known as SOPs—are written, step-by-step instructions that describe how to perform a routine activity. While you can create an SOP for anything, SOPs that outline technical procedures are a well-known path to increasing efficiency in your MSP business. Whether you’ve got existing SOPs you’re interested in updating, or you’re looking for some basic steps to build brand new SOPs around, you’ve come to the right place.