Operations | Monitoring | ITSM | DevOps | Cloud

Automate EKS Node Rotation for AMI Releases

In the daily life of a Site Reliability Engineer, the main goal is to reduce all the work we call toil. But what is toil? Toil is the kind of work tied to running a production service that tends to be manual, repetitive, automatable, tactical, devoid of enduring value, and scales linearly as a service grows. This blog post describes our journey to automate our nodes rotation process when we have a new AMI release and the open source tools we built on this.

Fighting Ransomware: Using Ivanti's Platform to Build a Resilient Zero Trust Security Defense

Ransomware is a strain of malware that blocks users (or a company) from accessing their personal data or apps on infected iOS, iPadOS, and Android mobile devices, macOS laptops, Windows personal computers and servers, and Linux servers. Then the exploit demands cryptocurrency as payment to unblock the locked or encrypted data and apps. This form of cyber extortion has been increasing in frequency and ferocity over the past several years.

Citrix Issues and Problems

A few days ago, we hosted a very well received webinar presented by Barry Schiffer (CTP) from eG’s Benelux team and George Spiers, CTP and real-world Citrix Administrator. They covered key questions and workflows, such as: A colleague and I were answering questions during the live webinar, and we received a lot of questions. One of the best things about participating in these webinars is the high quality and breadth of questions that we receive from the attendees.

Our plan for world domination: take down the internet

We have been warning for a long time: Pandora FMS will control the world. We have given time to world governments to prepare, to North American villagers to prepare their bunker, for sects to draw their banners with “THE END IS NEAR”. And it is, it is indeed. Today, in our blog we reveal the secret plans of this company to overthrow the institutions and rule the world, then you will say that we did not warn you.

Limitless XDR defined: Ingest, retain, and analyze security data freely

Elastic Security's newest features define the potential of XDR for cybersecurity teams. Our single platform brings together SIEM and endpoint security, allowing users to ingest and retain large volumes of data from diverse sources, store and search data for longer, and augment threat hunting with detections and machine learning. Security vendors are using the term “XDR” with increasing frequency, applying varied definitions to suit their respective technologies.

Save 10% disk space on your logging datasets with match_only_text

Elasticsearch 7.14 introduces match_only_text, a new field type that can be used as a drop-in replacement for the text field type in logging use cases with a much lower disk footprint, leading to lower costs. Elasticsearch is attractive for log analysis thanks to its ability to index log messages. Want to count how many log messages contain access denied in the last 24 hours?

Webinar Recap: Lessons learned from T-mobile Netherlands' road to zero touch

How close can CSPs come to realizing the zero touch network vision, and what are the best next steps for getting there? To discuss this question Anodot brought together a panel of experts, including Kim Larsen, CTIO of T-Mobile Netherlands; Ira Cohen, co-founder of Anodot and the company’s chief data scientist; Fernando Elizalde, analyst at GSMA Intelligence; and moderator Justin Springham.

Curb network incidents fast with cross-domain correlation analysis

For many CSPs, increasingly complex networks and immature technological solutions result in a typically long time to the detection and resolution of incidents that impact the customer experience, the brand’s reputation, and the bottom line. With RAN, Mobile and IP core, transport and applications and dozens of other integrated components, the network is one of the most complex areas to monitor.

AppOps - Defining a new category

Virtualization and cloud have forced the need for automation. In the “old” days, it would take weeks for a new physical server to arrive. There was little pressure to install and configure the operating system on it rapidly. We would insert a disc into the drive and then follow our checklist. A few days later, it would be ready to use. But the ability to spin up new virtual machines (VMs) in minutes required us to get better at automating this process.