Adding uptime capacity for our mates down under
Last week we finished adding more uptime monitoring capacity for our users that are working out of Australia, to provide faster uptime monitoring.
Last week we finished adding more uptime monitoring capacity for our users that are working out of Australia, to provide faster uptime monitoring.
In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the final post of this series, we’ll talk about cryptojacking, a type of attack that can severely affect your network’s integrity, and how you can combat it with event correlation.
Retune AB manages a variety of Ubiquiti devices -- wireless data communication products for enterprise and wireless broadband providers. Naturally, we wanted to bring these in under monitoring. However, Ubiquiti does not expose real-time CPU or memory metrics through SNMP in a way that we found reliable and these are some of the key values needed to verify the health of the device.
To many IT software teams, the mantra currently in vogue for team practice is “shift-left.” That refers to moving certain activities, such as code integration, build, and testing, earlier in the software development and delivery process. By shifting them to the left, the team knows more about code quality and performance earlier, allowing for corrective action and making them nimbler in response.
Amazon Web Services (AWS) is one of the most popular public cloud providers today. Over the years, AWS’ services have expanded from cloud computing to application development and security. To retain the reliability, availability, and performance of your AWS instances, an AWS cloud monitoring solution is a must. It’s critical for AWS monitoring tools to collect data from all parts of your AWS service, so that multi-point failure can be easily debugged.
At Sysdig, we have built a cloud-native intelligence platform to create a single, more effective way to monitor and secure your critical applications. We want to empower our users to quickly identify critical events and focus on events that need the most attention from you.
Jenkins is an extremely popular, open-source, continuous integration tool used for running tests, building code, and subsequently pushing to staging and then production. In a previous post, I outlined instructions for collecting, analyzing and visualizing Jenkins system logs.