Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Automate all the things: Terraform + Ansible + Elastic Cloud Enterprise

A sequel to our first post, Automating the installation of Elastic Cloud Enterprise with Ansible, this blog shows how to extend automation to cloud provisioning with Terraform. In the first post, we detailed how to deploy and configure Elastic Cloud Enterprise (ECE) across three availability zones in AWS using Ansible. However, the provisioning of the underlying EC2 instances and configuration of the security groups was all manual.

Elastic Common Schema .NET library and integrations released

The Elastic Common Schema (ECS) defines a common set of fields for ingesting data into Elasticsearch. A common schema helps you correlate data from sources like logs and metrics or IT operations analytics and security analytics. Further information on ECS can be found in the official Elastic documentation, GitHub repository, or the Introducing Elastic Common Schema article.

Network Monitoring with OpsRamp

Network availability is critical for the health and performance of business-critical applications and IT infrastructure. Given that network resources like routers, switches, firewalls, load balancers, VoIP/UC, and wireless LAN controllers are the backbone of today’s digital infrastructure, how does IT gain the right levels of visibility to troubleshoot network issues?

Securing your SaaS apps in 2020: 3 pillars you can't neglect

In 2010, cloud computing just started to lead the IT revolution. It’s 2020 and the cloud is already mainstream. If you’re not running your business in virtual yet, you’re missing out on huge profit opportunities and capabilities that the cloud has to offer. Adopting a cloud strategy brings better security, increased stability and overall greater flexibility for your organization.

Serverless Has Evolved in 2020

Come January, pretty much any current tech keyword you type into Google News will result in hundreds of prediction op-eds and roundups. The fact that it’s an entirely new decade has amplified this phenomenon and serverless is no exception. As the CEO of a company dedicated to helping software teams build, manage, and deliver serverless applications, it’s a joy to read these posts by some of the brightest minds in the industry.

Endpoint security: The key to protecting your enterprise

To operate efficiently, businesses today use numerous devices such as laptops, desktop computers, and mobile devices. Securing all these devices—collectively called endpoints—significantly improves the overall security of your enterprise’s IT network. This blog can help you get started with endpoint security. To begin with, let’s define endpoint security.