Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Intrusion detection techniques: monitor and react to unusual activity

Security monitoring is a constantly changing area; the threats can appear at any moment; when there are so called 0-day threats, there are quite few techniques available to efficiently prevent an unknown yet type of problem. However, there are typical behavior patterns that can be detected using well-known pieces of software and monitor types. Most techniques mentioned below are related to Unix-like systems; however, exactly the same approaches can be used for every operating system.

Why a Unified DevOps Platform Matters

In today’s enterprises, DevOps isn’t one process, but many thinly connected tasks. A stack of DevOps tools that need to work together to operate as a single system, each one requiring its own integration and maintenance. The JFrog DevOps Platform unifies our industry-leading products because DevOps has a single goal: to speed releases from code to production. It takes several tools to build DevOps, but DevOps tools need to function as one.

(Fish) Farm-to-Table Produce With PagerDuty

Most of us are familiar with the traditional farms that have existed since humans learned to sow and harvest crops—these farms have provided us with food for centuries. And for a long time, due to the lack of refrigeration and other technology, humans lived near their food sources. But industrialization has also led to centralization of farming systems, with farms getting larger and further from consumers and with distributors depending on preservatives or refrigeration to extend shelf life.

They Aren't Pillars, They're Lenses

To have Observability is to have the ability to understand your system’s internal state based on signals and externally-visible output. Honeycomb’s approach to Observability is to strive toward this: every feature of the product attempts to move closer to a unified vision of figuring out what your system did, and how it got there.

How to create maintainable and reusable Logstash pipelines

Logstash is an open source data processing pipeline that ingests events from one or more inputs, transforms them, and then sends each event to one or more outputs. Some Logstash implementations may have many lines of code and may process events from multiple input sources. In order to make such implementations more maintainable, I will show how to increase code reusability by creating pipelines from modular components.

This is the Single Most Important Business KPI You Probably Aren't Even Monitoring

Having spoken with many companies, I’ve learned that while they all monitor their application performance, infrastructure, product usage, conversion rates and a variety of other user experience parameters, very few monitor the actual transactions from their payment provider.

OpsQ Recommend Mode: Building Trust When Machines Call The Shots

Learn about OpsQ Recommend Mode, a new feature delivering auto-suggestions for alert escalation policies with OpsRamp’s machine learning algorithms. Recommend Mode builds upon Observed Mode by enabling one-click automation of suggested actions for alert escalation management. You can follow two approaches to use OpsQ Recommend Mode: First-Response and Alert Escalation.

Securing IaaS, PaaS, and SaaS in 2020 with a Cloud SIEM

As the cloud continues to expand with no end in sight, it’s only wise to invest in it. Infrastructure-as-a-Service, Platform-as-a-Service and Software-as-a-Service bring significant cost savings (personnel and ownership), improved performance, better reliability, freedom to scale and - above all - significant security benefits. It’s no wonder that so many businesses have already adopted all three of these models.