Operations | Monitoring | ITSM | DevOps | Cloud

How to

The Future of Observability with CEO Clint Sharp

Digital transformations, cloud migrations, and persistent security threats turned observability from a niche concern to an essential capability in today’s organizations. We’re still in the early days of observability maturity, but early stumbles point to where observability must go in the future. This talk discusses where observability is today and the three critical areas necessary for observability to deliver on its promises throughout the enterprise.

Nightmare on AWS street: mistakes we made and overcoming challenges of starting out with serverless

Tobi started building on AWS in 2018 for a big migration project for a very well-known German car manufacturer. Here's what he's learned from his mistakes from first starting out, which of his assumptions about building on serverless held true, and what came as a complete surprise? Learn more about building on serverless on our blog.

How to use metrics scopes in Cloud Monitoring

You've got Cloud Monitoring all set up in your project - but what do you do if you need to manage multiple projects and unify monitoring across them? In this episode of Engineering for Reliability, we look at Cloud Monitoring metrics scopes and show you how to use them to monitor multiple Cloud projects. Watch to learn how to use the Cloud Console to manage Metrics Scopes, view metrics from resources in multiple projects, and automate configurations using the API!

Application Whitelisting | How to whitelist applications with ManageEngine Application Control Plus

Application whitelisting is the process of limiting the applications running in the network to only what is absolutely trusted. It follows the Default Deny strategy where all applications other than the trusted ones get blocked automatically. ManageEngine Application Control Plus seamlessly acts as an application whitelisting solution that leverages the rule-based policies offered to facilitate easy list building and maintenance. The rules offered by this application whitelisting tool can be based on trusted vendors, product name, file hash, verified executables, store apps and folder path.