Operations | Monitoring | ITSM | DevOps | Cloud

Using Grafana, academics created a next-level dashboard tracking the impact of Covid-19 in Romania

When Covid-19 hit Romania, it was difficult for ordinary citizens to get good information about the pandemic and its escalating impact on the country. The government, presiding over one of the least developed healthcare infrastructures in the European Union, was releasing bulletins via PDF and text that were neither timely nor all that accurate. Into the breach stepped a team of six volunteers—five economists and a data scientist—operating out of Babes-Bolyai University.

Dashboards on Cloud Monitoring made easier with samples

Setting up Cloud Monitoring dashboards for your team can be time consuming because every team's needs are different. Picking the right metrics, using the right visualizations to represent these metrics, deciding what metrics can go on the same chart, and determining the right pre-processing steps for metrics requires background and experience that may not yet exist among your development and operations teams.

Gain peace of mind and leave backup complexity behind

Fast, reliable recovery is the whole reason we do backups in the first place. But the complexity of managing multiple backup products, juggling ever-growing local storage, keeping backup chains error free, and coordinating off-site backup storage can have a negative impact on the reliability that brings peace of mind. The more staff, people, and vendors are involved, the less likely your process will be consistent and error-free.

Sins of Data Management

Every company needs data for various reasons, but hoarding too much data can be a dangerous habit. An overload of data can turn the average IT pro into a hoarder and lead them to obtain too much redundant, outdated, and trivial information, also known as ROT. The lust for big data can be tempting, but it’s also more damaging than companies may think. Five sins may be great threats to security: lust, gluttony, greed, slothfulness, and pride.

Investigating the Scene of an Incident: Using a Time-Traveling Topology to Create Escalation Graphs

Yes, time travel is possible...through data. My ability to time travel began when I started coding at age 10. Back then, all of my code ran on my own little computer. Like many ten-year-olds, I coded to create and play games. I also coded cool graphics to accompany music to impress my friends and utilities for copying. I launched my first commercial website in 1996 and made 25 guilders, which was good money for a 15-year old. Life was so easy.

Invisible Security at the Speed of Cloud

Security teams have the tough job of monitoring and securing every single workload in each cloud and for workloads in the development pipeline. Inevitably, these processes wind up being a bottleneck from the developer’s perspective, and developers get frustrated. Understandably, developers feel like security is simply making their jobs harder. But, on the other hand, security teams feel like they’re powerless to provide full coverage.

Ingesting threat data with the Threat Intel Filebeat module

The ability for security teams to integrate threat data into their operations substantially helps their organization identify potentially malicious endpoint and network events using indicators identified by other threat research teams. In this blog, we’ll cover how to ingest threat data with the Threat Intel Filebeat module. In future blog posts, we'll cover enriching threat data with the Threat ECS fieldset and operationalizing threat data with Elastic Security.

API Monitoring Best Practices

Though invisible to most users, APIs are the backbone of modern web applications. Developers love them because they facilitate complex integrations between systems and services. The business loves them because integrating disparate systems to create new products and services drives innovation and growth. The challenge with this transformative connectivity is the dependencies that exist between systems. API failure can result in performance degradation, data anomalies, or even system-wide outages.

Chapter Eight: In Which James Embarks on a Service Desk Migration to Improve Incident Management with AIOps

It’s been a month since Dinesh and I humbly high-fived leaving the meeting with Charlie and Lucia and they gave us the green light to roll Moogsoft out across the whole of C&Js and I’m feeling a little weary. Change is hard. I’ve also made it harder on myself by persuading Charlie we should also migrate our service desk solution.