Operations | Monitoring | ITSM | DevOps | Cloud

%term

Developer's Guide to Cognito with Stackery

Cognito is AWS’s cloud solution for authentication – if you’re building an app that handles users with passwords, you can use AWS to handle the tricky high-risk security issues related to storing login credentials. No need to go it alone! Pricing is based on your number of monthly active users, and the first 50k users are free. For apps I’ve worked on, we would have been very pleased to grow out of that free tier.

How to collect, customize, and centralize Python logs

Python’s built-in logging module is designed to give you critical visibility into your applications with minimal setup. Whether you’re just getting started or already using Python’s logging module, this guide will show you how to configure this module to log all the data you need, route it to your desired destinations, and centralize your logs to get deeper insights into your Python applications.

How to Infect Your Organization With Humane Ops

Join PagerDuty DevOps Evangelist Matt Stratton to learn how the very DNA of an organization can evolve through the use of actionable communications from all levels - management, strategy, and practitioners. The “virus” of humane ops will infect your organization, providing a more sustainable approach to on-call, incident resolution, post-mortems, and more.

The Top 5 Open-Source NIDS Solutions

In a hyper-connected world, the threat landscape is undoubtedly evolving. Ensuring the security of your enterprise networks on a daily basis is essential to protect your business, no matter how big (or small) it is. According to SophosLabs’ 2019 threat report, one dangerous ransomware called SamSam cost companies $6.5 million ($10K to $50K per ransom).

What the US Government Can Teach You About Securing SolarWinds

SolarWinds has many customers who require a monitoring solution that's robust, reliable, and safe, but probably none as much as the many areas of the U.S. Federal Government who use our tools. That said, we know that security is EVERYONE'S concern these days, and the Systems Engineers who work with our Federal customers have a lot to teach organizations of all shapes, sizes, industries, and even nationalities.

Introducing Event Analysis in Zenoss Cloud

Does it seem like every day we’re doing the same quick fixes? Deleting temporary files to free up space in a file system, bouncing a server, restarting a queue. Over and over. Whether automating these simple tasks or not, you’re responding to incidents that have already affected someone instead of making changes to prevent them from ever happening again.

Common Sentry Settings Roadblocks and How to Overcome Them

Sentry helps developers monitor and fix crashes in real-time. Of course, finding and fixing bugs with Sentry is easier when Sentry itself is set up in a way that minimizes disruption. Our help center and documentation can help with that. We’ve also put together a list of the most common issues our Support team works on with Sentry customers that you’ll find useful (or, at least we hope you do).