Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Strengthening cybersecurity with log forensic analysis

Any system connected to the Internet is vulnerable to malicious attacks and breaches. If it’s online, there’s someone out there trying to break into it and do something bad with it (usually stealing data). Plain and simple. To protect your most valuable assets, you need bulletproof security measures, a skilled SecOps team, robust investigation tools, and reliable prevention/mitigation strategies.

Building Business with Cybersecurity

Cybersecurity is a hot topic. With high profile breaches making headlines on almost a monthly basis, combined with a far more restrictive regulatory environment, the need to responsibly protect your customers’ data has never been felt more keenly. It is estimated that a business is subjected to a ransomware attack every 14 seconds, predicted to drop to eleven seconds by 2021.

What Is Log Correlation? Making Sense of Disparate Logs

Before the need for log correlation, there was a time not so long ago when reading software application logs was simple. Your application would output log files in sequential order, and you’d read through them. In the event of a bug, software outage, or security incident, you could easily parse what happened and when. It was a tedious process, but it was simple.

Using GitHub Actions to Create Sentry Releases

At Sentry, we’re big fans of continuous integration and deployment. We’re also big fans of GitHub — and not just because we employ a number of notable GitHub alumni. We use our own GitHub integration to link issues, identify suspect commits that likely introduced new errors, and suggest assignees who can best resolve each issue. Last month, GitHub released GitHub Actions for general availability.

Top 5 Challenges in Cloud Migration and How to Handle Them

In our previous blog post, we discussed how we are approaching an important inflection point in the cloud migration timeline. Certain legacy applications will remain on owned infrastructure for the foreseeable future, but the scale and agility offered by cloud platforms offers competitive and operational advantages that most organizations cannot ignore. As cloud adoption became mainstream, many enterprises saw fewer objections to migrating their infrastructure to cloud.

Our Top 10 Kubernetes and Cloud Native Guides For 2019

2019 has been a great year for cloud native technologies. This year we launched the world's first managed Kubernetes service back-ended by Rancher's k3s distribution, opened the #KUBE100 beta, and watched our users create some really neat things on our platform. To that end, we wanted to highlight some of our top posts from the wider Civo community, and posts that showcase the exciting state of play of the cloud native landscape at the moment.

Create your own Docker containers to test and deploy applications

If you are a developer, a systems administrator, you work in the information technology sector or you are simply a technology enthusiast who has ever deployed some type of application, surely you will have faced the same problem we all ran into. If you are thinking of dependencies, bingo!