Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Improving IoT security with log management

The Internet of Things (IoT) revolution has set the beginning of a new age of data transfer. Each day, a massive number of new devices get added to all kinds of network infrastructures, transferring gargantuan amounts of data back and forth. In the next decade, we expect the number of IoTs to grow to a staggering 80 billion connected devices – practically outnumbering the human population tenfold.

re:Invent Serverless Talks - Serverless SaaS Deep Dive

Have you ever have that dream where you’re in a class on Classical Tibetan Algebra? And you haven’t done any homework all semester? AND it’s the final? That was me in this session: I was WAY in over my head with this one. Tod Golding’s material was so high-level that I got a nose bleed. Seriously. My nose started gushing 10 minutes in. This Portland dewdrop is NOT used to the dry desert and casino AC air.

Monitor AWS IAM Access Analyzer findings with Datadog

As you monitor the health and performance of your infrastructure and applications, you also need to be able to identify potential threats to the security of those components. To help address this challenge, we’re pleased to announce that Datadog now integrates with AWS Identity and Access Management (IAM) Access Analyzer, a new IAM feature that helps administrators ensure that they have securely configured access to their resources.

Where is the enterprise network market heading in 2020?

The networking field is changing quickly with the emergence of new technologies. This change, along with the onset of digital transformation and increasing cloud-adoption, highlights how businesses have realized the importance of the third platform, as it interconnects mobile computing, cloud computing, social media, and information analytics. 2019 has been the year of edge computing and the dawn of the SD-WAN.

[PromCon Recap] A Look at TSDB, One Year In

This is a writeup of the talk I gave at PromCon 2019. TSDB is the storage engine of Prometheus 2.x. Based on the Gorilla compression, it started out in an independent repo, which eventually attracted 60+ contributors and 771 stars. There were 500+ commits after the Prometheus 2.0 release. The repo was archived in August 2019, and now it’s a part of the Prometheus repo, inside the tsdb directory. Here are some highlights of the development over the past year.

How to Troubleshoot Poor Session Performance within your Citrix or VMware Horizon Environments

When end-user experience is plagued by poor performing Citrix or VMware Horizon environments IT needs to move fast to resolve. Or better yet, head off the issue before it ever becomes a problem for end-users. But how? Hint: you need end-to-end visibility for faster troubleshooting.

5 Reasons Why IT Asset Management Is Key to Your Business

The holiday season is always a good time to slow down, meditate, and be grateful for family, friends, and the blessings you have in your life. And believe it or not, I think this is a good practice to do in IT as well. You’re fighting the good fight day after day, extinguishing fires, battling resource and budget constraints, and dealing with more than enough on your Christmas dinner plate.

Alternative to Splunk: Pandora FMS as a monitoring tool

The American magazine “Fortune” specializes in global banking, business and finance… What does it have to do with monitoring? Well, in one of its annual lists, the Fortune 100 (the largest companies on the planet), 92 companies use Splunk software… If we compare by volume of money, yes, Splunk would be the best software and that’s where this article would end.