Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Amazon EKS monitoring and security with Sysdig.

Amazon Elastic Container Service for Kubernetes (Amazon EKS) provides Kubernetes as a managed service on AWS. It helps make it easier to deploy, manage and scale containerized applications on Kubernetes. Sysdig cloud-native intelligence solutions – Sysdig Monitor, and Sysdig Secure – provide Amazon EKS monitoring and security from a single agent and unified platform. Sysdig helps AWS customers see more, secure more, and save time in troubleshooting deployed microservices.

3 Reasons to Disable JavaScript Source Fetching in Sentry

When you’re using the Sentry JavaScript SDK, the source code and source maps are automatically fetched by scraping the URLs within the stack trace. While this is the default setting, the ability to disable JavaScript source fetching on a project-by-project basis has always been available. In our continued push to improve configuration accessibility and security, Sentry now allows you to control this feature organization-wide.

Mattermost 5.1: New GIF selector, auto-linking plugin, subpath support and more

Mattermost 5.1 has new features that will help your team accomplish even more: GIF selector – express yourself more clearly by adding the perfect GIFs for the occasion without leaving the Mattermost interface, Auto-linking plugin – link messages to other content automatically to increase productivity and empower workers to easily find information they need.

5 questions on the latest ITSM trends

Last month, Atlassian attended SITS 2018, The Service Desk and IT Show. We staffed a busy booth, demoing our software and learning about challenges facing the support managers, analysts, IT directors, and CTOs in attendance. Our own Principal Solutions Engineer, Paul Buffington, also spoke to an overflowing crowd about best practices for incident management. We sat down with Paul to get his thoughts on some of the most noteworthy ITSM trends.

Docker image scanning - How to implement open source container security (part 2).

In this article we will cover Docker image scanning with open source container security / image scanning tools. We will explain how to to deploy and setup Docker image scanning: both on private Docker repositories, and as a CI/CD pipeline validation step. We will also explore ways of integrating image scanning with CI/CD tools like Jenkins, Kubernetes runtime configuration features and runtime security tools like Falco.