Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Introduction to security monitoring

Security Information Monitoring or Security Event Monitoring is part of Security Information Management. Yes, I acknowledge they are flashy names and that even experts have their differences about concept and scope. Here in Pandora FMS, flexibility is part of our name, so, hereby, I will abbreviate it as Security Monitoring. As you can see, it is short and manageable!

Enabling DevSecOps with the Elastic Stack

Software development and delivery is an ever-changing landscape. Writing software was once an art form all its own, where you could write and deploy machine code with singleness of purpose and no concern for things like connecting to other computers. But as the world and the variety of systems that software supports became more complex, so did the ecosystem supporting software development.

Machine learning in cybersecurity: Detecting DGA activity in network data

In Part 1 of this blog series, we took a look at how we could use Elastic Stack machine learning to train a supervised classification model to detect malicious domains. In this second part, we will see how we can use the model we trained to enrich network data with classifications at ingest time. This will be useful for anyone who wants to detect potential DGA activity in their packetbeat data.

Distributed Tracing & Logging - Better Together

Monitoring requires a multi-faceted approach if DevOps teams want end-to-end visibility and deep insight into issues. This is especially true in the case of modern microservices applications, which are essentially collections of distributed services that talk to each other over a service mesh. With monolithic applications, requests can be tracked easily from the client to the server and back, but with modern applications, every request passes through numerous services before completion.

Why should an Enterprise Invest in Containerization of Applications Instead of Lift-and-Shift

In our series of blog posts based on Automated Containerization, here is another quick read on why Enterprises should invest in containerization of applications instead of Lift-and-Shift approach. Legacy applications can be slow and expensive to maintain. If you use the Lift-and-Shift approach to migrate applications to cloud is relatively inexpensive, but ongoing operating costs can be exactly the opposite. The contention is that applications perform and evolve relative to their environments.

Monitoring 101: Collecting the Right Data

When it comes to business, data is everything. Whether it’s sales, supply, marketing, or your I.T. systems, every day is a constant stream of decisions to be made. To make the right decisions, you need enough knowledge. To have enough knowledge, you need the right data. What’s the best way to collect all this data? In the information age, there’s so much data out there, all the time.

Upgrading Kubernetes the Easy Way with Tanzu Kubernetes Grid Service for vSphere

Lifecycle management is one of the most complicated components of Kubernetes. In a past article, we showed how to modify a cluster to change the type and size of its nodes. In this post, we will explain how to upgrade the Kubernetes version of a Tanzu Kubernetes cluster when there is a new release. And the best part is that it’s all done in just a few easy steps using the Tanzu Kubernetes Grid Service for vSphere.