Operations | Monitoring | ITSM | DevOps | Cloud

%term

Conquer it with correlation-Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the final post of this series, we’ll talk about cryptojacking, a type of attack that can severely affect your network’s integrity, and how you can combat it with event correlation.

How to Monitor CPU and Memory on Ubiquiti Unifi Devices

Retune AB manages a variety of Ubiquiti devices -- wireless data communication products for enterprise and wireless broadband providers. Naturally, we wanted to bring these in under monitoring. However, Ubiquiti does not expose real-time CPU or memory metrics through SNMP in a way that we found reliable and these are some of the key values needed to verify the health of the device.

Why Shift-Right is Essential for SaaS Applications

To many IT software teams, the mantra currently in vogue for team practice is “shift-left.” That refers to moving certain activities, such as code integration, build, and testing, earlier in the software development and delivery process. By shifting them to the left, the team knows more about code quality and performance earlier, allowing for corrective action and making them nimbler in response.

AWS monitoring 101: Metrics to watch out for

Amazon Web Services (AWS) is one of the most popular public cloud providers today. Over the years, AWS’ services have expanded from cloud computing to application development and security. To retain the reliability, availability, and performance of your AWS instances, an AWS cloud monitoring solution is a must. It’s critical for AWS monitoring tools to collect data from all parts of your AWS service, so that multi-point failure can be easily debugged.

The Key to Keeping Stakeholders Informed during Incident Management

Keeping stakeholders informed and engaged during a service disruption is a critical part of incident management. Now with free stakeholder licenses from Opsgenie, all of the key people in your organization can view service status pages and receive communications for incidents that affect them.

Generating Word Embeddings with Gensim's word2vec

During our Activate presentation, we talked about how to do query expansion by dynamically generating synonyms. Instead of statically defining synonyms lists, we showed a demo of how you could use word2vec to derive synonyms from a dataset. Before we start, check out a useful Solr Cheat Sheets to guide you through Solr and help boost your productivity and save time.

How to Make Kubernetes Work for Everyone

Kubernetes is the de-facto container orchestration standard, used to manage Docker containers in production. With every cloud provider offering Kubernetes services, it is also shaping up to be a standard form of computing infrastructure. At Rancher Labs, we build products and technologies that drive the mass market adoption of Kubernetes.