Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Make sure your Web servers support modern security protocols

To make sure no site content is modified or intercepted en route, HTTPS protocol is used (this is currently a must; using HTTP, insecure version, is strongly discouraged). Different versions of so called “transport security layer” protocol, known as TLS, can be used to provide the mentioned secure data exchange.

Chasing a Hidden Gem: Graph Analytics with Splunk's Machine Learning Toolkit

Do you like gems? Perfectly cut diamonds? Crystal clear structures of superior beauty? You do? Then join me on a 10 minute read about a quest for hidden gems in your data: graphs! Be warned, it is going to be a mysterious journey into data philosophy. But you will be rewarded with artifacts that you can use to start your gemstone mining journey today.

Remote Work: Splunk + Zoom

As everyone is taking proactive measures to stay healthy, organizations are increasingly having their employees work from home. At Splunk, we are focused on bringing data to every question, decision and action — and remote work for us equals Zoom for online meetings and workspaces. As our customers use Splunk for real-time data processing and analytics, they use our Splunk Mobile App (Android, iOS) when they need to take their dashboards on the go.

IT Monitoring: Top Services to Monitor Now That Everyone is WFH

One of the practices being thrust into action right now is social distancing. As you would expect, this means millions of people around the world are working from home and this migration in the workforce is going to have a massive impact on the services IT practitioners must monitor and maintain in a virtual-first environment. We are already seeing reports of massive usage surges across tools like Zoom and outages in Microsoft Teams just as the COVID-19 pandemic pushes people to work from home.

IT Monitoring: How Do I Know Who is in My Network?

As WFH usage surges, an increasing number of users will be connecting from home laptops over the internet into a Citrix server that could be hosted in a data center. This will likely put strains on licensing, internet bandwidth and server performance hosting the Citrix environment. These are all key areas that Splunk can monitor with various add-ons.

February 2020 Downtime Report

February kicked 2020 off with a terrifying glimpse into what happens when the Internet of Things stops Internetting things. If we consider our central question this year of uptime in the age of always-connected, then we start to see the impact of hidden failures. All the stuff we don’t know we know impacts the end-user. Someone forgets to renew a TLS certificate, half the business world can’t collaborate. Someone else flubs an update?

Azure Functions Live - March 2020

The experts from Azure Functions team has yet again joined us for the monthly webcast. Given the unprecedented time, this webcast happened a bit unusual where the folks joined from their home rather from Channel 9 studio and which made this webcast even more unique and exciting. In this session, Jeff Hollan, Eduardo and Alex Karcher have joined to give us the picture of the latest happenings in the Azure Functions space.

Our Top 5 On-Call Practices

On-call: you may see it as a necessary evil. When responding to incidents quickly can make or break your reputation, designating people across the team to be ready to react at all hours of the day is a necessity, but often creates immense stress while eating into personal lives. It isn’t a surprise that many engineers have horror stories about the difficulty of carrying a pager around the clock. But does on-call have to be so dreadful? We think not.

6 Steps to a More Effective Postmortem

Detailed and specific description of impact? Check. In-depth root cause analysis? Check. Clearly defined and easy to follow resolution? Check. Postmortems present an incredible learning opportunity, despite the inherent cost of time and effort. They ensure an incident is documented, that all contributing factors are understood, and that effective preventative actions have been put in place to reduce the likelihood or impact of recurrence.