Operations | Monitoring | ITSM | DevOps | Cloud

%term

Monitorama 2019 - Portland, Oregon

A few members of the Scout team had the chance to head to Monitorama in Portland, Oregon this week. For those who do not know what Monitorama is, it is a 3-day, open-source monitoring conference with a single track. There is plenty of time during the breaks to chat with attendees, ask the speakers questions or just catch up on some email.

Custom compliance filters with Sysdig Secure

Custom compliance filters is now GA as part of the SaaS and on-prem release. With Sysdig Secure, enterprises can enforce compliance filters across the container lifecycle. Teams can automate regulatory compliance controls for PCI, NIST, CIS, for Kubernetes and container environments at scale.They also gain visibility into the performance, health, compliance, and security posture of an on-prem and/or multi-cloud environment from a single dashboard.

Automating Collection of Troubleshooting Data with Triggers: a How-To Guide

Everyone wants to be more efficient — to spend less time on the tedious things, and more time on the things that move the needle. As much as possible, if you can automate those tedious things, you should. With Honeycomb, we enable you to understand how your application behaves in production through the ability to iteratively ask questions of the system instrumentation data, no matter how granular. Honeycomb triggers enable you to be notified when specific things happen in your system.

[OpsComm May] Continuing the AIOps Momentum with the Summer 2019 Release and State of AIOps Report

May 2019 saw the announcement of our latest SaaS platform update - The OpsRamp Summer 2019 release which delivers several new AIOps innovations like OpsQ Observed mode, Topology context capabilities, out-of-the-box Kubernetes dashboards and an array of other features. We also launched our latest AIOps report - The State Of AIOps which gives deeper insights on how AIOps is being used by enterprises in IT today.

Keeping Graylog Secure

Now that you have your brand new Graylog instance up and collecting your organization’s logs, all the data is quickly searchable and available for troubleshooting any issues as they arise. Just as easy as it is for you to use, an attacker with access to the logs now has a much simpler job of understanding your environment and seeing all of your data. You need to make sure you are doing all the due diligence you can to protect the data.