Operations | Monitoring | ITSM | DevOps | Cloud

Don't Let Cybersecurity Threat Actors Ruin Your Halloween!

It’s the scariest time of year. But forget about ghosts and goblins and zombies. If you really want to be as scary as possible this spooky season, we know exactly what your costume should be and how you should decorate your yard. Here are some hints: What are they? Cybersecurity threat actors. *Cue terrifying music.* Before you roll your eyes, stick with us. This is worth a quick read.

Co-Existence: Using Legacy VPN with Neurons for Zero Trust Access through the Neurons for Secure Access Platform

There are three aspects of co-existence to discuss. The gateway deployment co-existence, the end user workflow co-existence, and the administrative management co-existence. We will walk through all three of these aspects.

Kubernetes Monitoring Resources

Heaven knows we all could use some luck these days, and observability may be just the thing we need. But observability isn’t luck, and it isn’t really new either. A few people even know that observability is an aspect of control theory, which dates back to the 1800s! In this blog post, I’ll cover some of the history of observability vs.

What Is AWS Anomaly Detection? (And Is There A Better Option?)

To explain how cost anomaly detection works in AWS, let’s first look at an analogy. Imagine you strategically propagate, cultivate, harvest, and replenish trees for a thriving forest products company. In keeping with your eco-friendly policy, you only harvest the trees with straight and tall trunks. You leave irregularly shaped trees alone. Your company doesn’t harvest trees you won't use.

Will Serverless computing reshape big data and data science?

Serverless development has been turning heads in the market for quite some time now. But it has yet to be accepted by the majority in the development community. With AWS Lambda, Azure Functions, and IBM’s Open Whisk, the market is poised to take a different route in this field. Most of these organizations are spending a lot of money to make the market accept this new paradigm using serverless computing.

Splunking Netflow with Splunk Stream - Part 2: Basic Netflow Analytics

Hi there, I guess that if you are here, you've already read the first part of this series and want some help to quickly get value from your NetFlow data, building trend analysis and advanced analytics with long term data (i.e months), in addition to playing with real-time data. You can take advantage of Splunk’s super flexible schema on read architecture to exploit your real-time data from the very first moment you get the data in.

Site Reliability Engineer (SRE) Roles and Responsibilities

Software development is getting faster and more complex – frustrating IT operations teams more than ever. So, DevOps gained popularity in order to combat siloed workflows, decreased collaboration and a lack of visibility. While establishing a culture of DevOps has helped teams collaborate better and deliver reliable software faster, DevOps teams don’t necessarily have someone specifically dedicated to developing systems that increase site reliability and performance.

An Overview of Microsoft Azure Services

Microsoft Azure is the public cloud computing platform by Microsoft which offers software as a service (SaaS), platform as a service (PaaS) and infrastructure as a service (IaaS). It comprises more than 600 cloud services and supports varied operating systems, databases, and developer tools. And, even better, Splunk On-Call integrates with Microsoft Azure to help on-call teams improve incident response for Azure-based environments.

Common DevOps Roles and Responsibilities

DevOps-oriented engineers live at the intersection of IT operations and software development – understanding much of what it takes to maintain IT infrastructure while also being able to write code and deploy new services. DevOps-minded teams not only create services – but they also maintain them. A DevOps structure forces teams to take accountability for their applications and infrastructure instead of allowing developers to throw code over the proverbial wall to IT operations.