Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Docker scanning for Jenkins CI/CD security with the Sysdig Secure plugin.

In this blog post we’ll cover how to implement Docker Scanning for Jenkins with the Sysdig Secure Jenkins plugin. The plugin can be used in both freestyle and pipeline jobs to scan images and fail the build if the image fails a policy evaluation.

Key metrics for AWS monitoring

Since 2006, Amazon Web Services (AWS) has spurred organizations to embrace Infrastructure-as-a-Service (IaaS) to build, automate, and scale their systems. Over the years, AWS has expanded beyond basic compute resources (such as EC2 and S3), to include tools like CloudWatch for AWS monitoring, and managed infrastructure services like Amazon RDS for database management.

Real User Monitoring (RUM) vs. Synthetic Monitoring Comparison

When you spend a long time building an app or website just to have users complain about latency issues, it sucks. You don’t know where the problem lies, nor do you know the environment in which it occurred. So it gets ignored, and performance issues keep lingering. This not only wreaks havoc on the end users, but your bottom line suffers as well.

A Small Leak Can Sink a Great Ship

Small and slow leaks sink ships – by analogy, slow and small leaks can also cause significant losses for any business if not detected and fixed early. Are small leaks interesting? Suppose an eCommerce business sees a decline of 50% of purchases in the last day – the entire company would be called in – from the CEO all the way to R&D, Support, to figure why it happened as quickly as possible.

Announcing Incident Command Center Enhancements

The Incident Command Center (ICC) empowers your organization to command, control, and coordinate incident response without having to leave the OpsGenie app. With the ever-expanding demand for always-on services, increasing uptime is just as critical. Streamlining incident response leads to faster resolution of issues and less headaches for your customer.

CloudReady Single Sign-On SAML Integration

Exoprise recently released support for Security Assertion Markup Language (SAML) 2.0 integration to enable CloudReady Single Sign-On (SSO) for user access to CloudReady. Exoprise always supported testing and monitoring web-based SSO like ADFS, Ping, & Okta but had not gotten around to finishing our integrated SAML support – well wait no longer – its here! No more letting users manage passwords in CloudReady unless you want to.

Simple mind

Simple mind. Thinks anytime, anything. But what does a simple mind really thinks when faced with a down website? Imagine yourself, you are sitting down at home after a long long day at work. You have had your coffee with you and you just can't wait to plan this calming vacation after waiting for months and months. Don't get too excited, there is a surprise waiting for you on the other side of the screen. Apparently, you can't reach the website you were supposed to book everything from.

Simplifying security auditing, Part 4: Securing web servers

Web servers are front-end facing applications that are vital for the daily operations of businesses. They are subject to attacks such as SQL injection, malicious URL requests, and the age-old classic, denial of service (DoS) attacks. While there are specialized web application security solutions that you can (and should) deploy, auditing web server logs is just as important for ensuring your web servers are secure and always up and running.

The downside to using email to manage your on call team

There are a number of reasons why email is predominately used to manage an incident. Everyone usually has access to email and the email technology has already been “paid for”. Therefore it’s easy to think of email as being a cheap resource that’s easy for MSPs to use. But easy isn’t always best…or even appropriate.