Operations | Monitoring | ITSM | DevOps | Cloud

%term

How Does Google Handle Critical Incidents?

While there are some very good sources out there on how to manage a critical incident, Google also wrote a chapter on incident management in their book, “Site Reliability Engineering”. In this chapter, the folks at Google present their approach to a well-designed critical incident management process.

How to Monitor Activity in Your IBM Cloud with LogDNA

Cloud environments are becoming increasingly complex, with applications and even infrastructures changing constantly. Despite their dynamic nature, these environments must be monitored constantly for teams to ensure the stability, security, and performance of workloads running in them. Tracking these infrastructure changes is one of the most important—and one of the most difficult—parts of maintaining a cloud environment.

Securing a Web Application with AWS Application Load Balancer

I was recently called upon to secure an Nginx web server with HTTPS, and my goal was to set this up with a certificate obtained from AWS Certificate Manager. It took me a while to figure out how to get everything configured and working. Hopefully someone else who is attempting to do the same thing will read this and I can save you some time!

10 Ways to Protect Your eCommerce Site From Hacking and Fraud

According to the Hacked Website Report by Sucuri, the number of websites getting compromised by hackers is increasing every year. The damage related to cybercrime is expected to hit $6 trillion by the end of 2020. If you are planning to launch an eCommerce website or already running a successful one, you must have to upgrade the security of your website regularly. Here, I am sharing some useful ways to keep your eCommerce site safe from hackers and fraudsters.

Monitor IBM DB2 with Datadog

IBM DB2 is a database management system that runs on a wide range of technologies, including Linux, UNIX, Windows, mainframes, and IBM Power Systems. You can use DB2 as a managed service in the cloud or deploy it in a cluster to provide high availability, making it suitable for a wide range of enterprise and customer-facing applications.

How to Defend Your Business Against SQL Injections

One of the oldest (but often neglected) security vulnerabilities is SQL injection. One common scenario goes like this: An unsuspecting programmer writes an application that accepts input from the user which serves as a parameter to retrieve or store data from a database (e.g., a web login form). The programmer writes a dynamically populated SQL query inside the app, based on user input like username and password (see Image 1 for reference).

Gianluca Arbezzano [InfluxData] | Kubernetes Monitoring with InfluxDB 2.0 & Flux | InfluxDays London

Gianluca will dig deep into how to monitor Kubernetes with InfluxDB using lessons learned from building and running InfluxDB Cloud on Kubernetes. He will cover what metrics should be collected, when to use push and pull metric collection, and the role that Prometheus plays in any K8s monitoring environment.

Russ Savage [InfluxData] | Monitoring, Alerting, and Tasks as Code | InfluxDays London 2019

In this talk Russ will explore how to build tasks, alerting rules, and triggering events inside of InfluxDB 2.0 with the new Flux language. Russ will then showcase how to work this into a regular development flow by using command line tools for testing, source control as the source of truth, and testing against production data.