Operations | Monitoring | ITSM | DevOps | Cloud

%term

Cloud Security: What It Is and Why It's Different

The principles of data protection are the same whether your data sits in a traditional on-prem data center or in a cloud environment. The way you apply those principles, however, are quite different when it comes to cloud security vs. traditional security. Moving data to the cloud introduces new attack-surfaces, threats, and challenges, so you need to approach security in a new way.

Reducing MTTR in the Field: 10 Simple Steps Using Retrace

The last decade has ushered in a golden era of software engineering. The rise of cloud computing freed companies from managing their own data centers and provided on-demand scaling. These services allow for provisioning servers on the fly using configuration and code. Treating that task as just another type of software development led to the advent of DevOps.

Best Tools to Help You Get More Engagement

“You cannot buy engagement. You have to build engagement.” Have you already created your customer engagement strategy? And have you already answered the question “How to increase customer engagement?” If your answer is half yes, half no or simply no, then you will probably face problems that will turn into lost sales opportunities, customer dissatisfaction, and low popularity.

6 Best Practices For Outstanding Critical Incident Management

"Businesses need to face the inevitability of being hacked at some point. It's not a question of if, but when — and that's why being proactive to minimize the risk is essential." Robert Egan. When a critical incident hits, what happens to an organization without an efficient incident management plan? Essentially, all stakeholders are left "fighting fires," trying to recover their systems, and get their business back up and running.

Fireside chat with Kelsey Hightower, part one: on Kubernetes, legacy tech, and the future of monitoring

At Sensu Summit 2018, Sensu CEO Caleb Hailey and CTO Sean Porter sat down with Kelsey Hightower, Staff Developer Advocate at Google Cloud Platform (GCP), for a fireside chat on a variety of topics, including the evolution of the monitoring space, Kubernetes best practices, their opinions on an open core business model, how operators’ jobs are changing, and more. Kelsey, Sean, and Caleb discussing all things Kubernetes and open source at Sensu Summit 2018

How to install Datadog on AWS hosts with Ansible dynamic inventories

Ansible is an automation tool for provisioning, managing, and deploying infrastructure and applications. When building large-scale applications, Ansible enables users to manage and configure their infrastructure across platforms like AWS. Whether you rely on temporary or dedicated hosts, you can use Ansible to create a repeatable process for configuring them with the Datadog Agent.

Logging Istio with ELK and Logz.io

Load balancing, traffic management, authentication and authorization, service discovery — these are just some of the interactions taking place between microservices. Collectively called a “service mesh”, these interconnections can become an operations headache when handling large‑scale, complex applications. Istio seeks to reduce this complexity by providing engineers with an easy way to manage a service mesh.