Operations | Monitoring | ITSM | DevOps | Cloud

%term

Automation for the AWS platform - gain monitoring insight and automatically execute actions

As you probably know, Site24x7's AWS monitoring capabilities provide complete visibility into resource utilization and performance for key compute resources, storage, and database services powering your application in the Amazon Web Services (AWS) cloud. From here on out, you'll have the power to not only identify issues that might affect application performance, but also automatically invoke operational tasks across multiple AWS resources to resolve them quickly.

Reports

We’re excited to announce a highly requested new feature for Raygun Crash Reporting for our Business and Enterprise customers called 'Reports' This new feature allows you to construct your own custom reports based on the data and criteria that you’d like to see and segment. For example, if you release a new version of your website and would like to see a detailed view of the errors affecting end users, 'Reports' will allow you to get details quickly.

Copying RDS Snapshots Between Regions

In our previous posts, I showed you how to copy your DB and Aurora snapshots to ensure they are preserved beyond the lifetime of your RDS instance. However, those copies were simply second copies in the same region as the original. In this post, I’ll show you how to copy your RDS snapshots to a second region for extra protection. Please note that I will restrict this post to unencrypted snapshots. Copying encrypted snapshots is more involved, so I’ll show that in a separate post.

Monitive Mission Statement: "Why am I doing what I do?"

And no, it’s not summoning a few Venture Capital rounds of funding to pour them into a business, nor wasting my life on vacations or my money on gadgets. “What makes us happy?” I have to admit I’ve pursued this goal for a large part of my life. I know that some form of success is linked to happiness, and I know that success is not that esoteric feature that only the gifted among us get to possess. Success, just like happiness, is something we all have.

Encrypting an Unencrypted RDS Snapshot

RDS snapshots can be unencrypted or they can be encrypted at rest. Today, best practice is to use encryption-at-rest on your RDS instances and clusters, and to encrypt your RDS snapshots. When you create an RDS snapshot from an RDS instance or cluster, the resulting snapshot will be encrypted if the source instance or cluster is encrypted. But if the source is not encrypted, then your RDS snapshot is not encrypted. When you create an RDS snapshot, you are not given the option to encrypt it.

Let's talk about STIX, TAXII, and threat intelligence

In terms of collaboration, Structured Threat Information eXpression (STIX) and Trusted Automated eXchange of Indicator Information (TAXII) represent a revolution in the security industry. These protocols transformed the field of threat intelligence from a fragmented collection of information to a unified standard for information sharing. In this blog, I will examine this transition and how it came about.