Operations | Monitoring | ITSM | DevOps | Cloud

%term

The New Version of Logagent Enriches Container Logs with Metadata and GeoIP

Logagent is a modern, open-source, light-weight data shipper with out of the box and extensible log parsing, on-disk buffering, secure transport and bulk indexing to Elasticsearch and Sematext Cloud. Its low memory footprint and low CPU overhead make it suitable for deploying on edge nodes and devices, while its ability to parse and structure logs makes it a great Logstash alternative.

How to identify malicious IP activity using Falco

One of the most common security use cases, is the ability to identify connections generated by malicious actors, or internal components connecting to suspicious servers (e.g malware C&Cs). In this post, we will show how to leverage the Falco engine, to identify connections made to IPs that were flagged by multiple security sensors, and are streamed as a feed to the Falco engine.

Conquer it with correlation-Part 2: The data breach

In my previous post, we looked at how event correlation can be used to deal with advanced persistent threats (APTs). The thing is, an APT is just one ugly face of a much larger epidemic: the data breach. In this blog, we examine this larger problem and the role of event correlation in securing sensitive data.

5 secrets design-led companies know about boosting customer value

Just when you think you’ve got this whole “knowledge economy” thing figured out, here comes the “creative economy” – the world in which your ability to succeed and add value is limited only by your imagination. Of course, that creativity needs to be informed by a deep understanding of your customers.

The Evolution of CI/CD and Agile

It’s nearly the end of 2018 and we still discuss CI/CD and agile as separate concepts. The truth is, the line between them is blurring. Doing either or both well is very difficult. In fact, many organizations struggle to effectively execute an agile workflow, or reach CD because they are so difficult to do well. This article focuses on why it is so important to keep striving toward this gold standard duo because CI/CD and agile result in quality and predictability.

Monitoring Microservices: IT's Newest Hot Mess

In this THWACKcamp session, you’ll learn how microservices are different from other applications, when performance bottlenecks most often occur, how they tend to break, and where you can add monitoring to stay ahead of trouble. You’ll also see how to extend existing infrastructure dashboards to include microservice workloads, cut troubleshooting time, and include new business metrics that measure the business goals driving microservices in the first place.