Operations | Monitoring | ITSM | DevOps | Cloud

3 Key Features Every Service Desk Needs

Modern enterprises must work to ensure their organization is focused on making employees feel heard and valued, and a key way to do this is through strong IT service management. We’ve said it before, but it bears repeating—today’s employees expect a similar service experience in the workplace that they encounter in their daily lives.

Creating a Business Process and adding it to Dashboard

In this blogpost I will introduce, how to create a business process from monitored hosts and services and how to add them to dashboards. Business Process module is an interesting module in Icinga Web 2. It allows you to visualise and monitor hierarchical business processes based on any or all objects monitored by Icinga. We can create custom business process and trigger notifications at process or sub-process level.

Adding free and open Elastic APM as part of your Elastic Observability deployment

In a recent post we showed you how to get started with the free and open tier of Elastic Observability. Today we'll walk through what you need to do to expand your deployment so you can start gathering metrics from application performance monitoring (APM), or "tracing" data in your observability cluster, for free.

Perspectives from the federal public sector: Enable mission success with Elastic

After a year of accelerated change in the federal industry, the Federal Public Sector event focused on the progress you’ve made, the trends demanding your attention, and the Elastic capabilities that continue to guide federal agencies, offices, and departments towards a search-enabled future. With a theme of Accelerate the mission.

How we built a serverless "Stonks" checker API for Wall Street Bets

A while ago, a merry bunch on Reddit at the subreddit r/WallStreetsBets (WSB) took on Wall Street. Ironically, through an app called Robinhood. As Alanis Morisette would say, “A little too ironic, don’t ya think?” You had to be in there and in the know at the right time to benefit from the situation. That’s why we built a serverless API to keep track of all the hot and trending stock chats on WSB, that will notify you when the next GME is about to blow up.

The Top Networking Certifications Guide for 2021

The technology industry is predicted to reach a $5 trillion valuation in 2021, an additional 4% growth over 2020. This steady growth of the industry has, unsurprisingly, led to an increase in the number of jobs in networking and IT. As the last year has shown, when an enterprise is forced to switch work models to a remote or distributed approach, they need network specialists to set up and maintain the necessary infrastructure.

8 Best Tools to Write Robots.txt File Successfully

Robots.txt file is one of several text files. Website owners develop this to instruct Google and other search engines about how they will crawl on their website pages. This file tells the search engine not where to and where to not go on a website. Google describes robots.txt as being primarily used to manage crawler traffic into a website and keep a website page away from Google, although this will depend on the type of file that it is.

Sponsored Post

Supporting Remote Workers During a Pandemic

Working from home is no longer an option but a necessity. Millions of Americans are now part of this "work from home" experiment triggered by Covid-19. There may be no turning back as employees and businesses choose this new emerging model. Remote workers are likely here to stay. According to a Gartner 2020 survey, 82% of business leaders surveyed plan to allow their employees to work remotely for part of the time and half of them intend to allow their employees to work remotely in the future.

Securing AWS Fargate workloads: Meeting File Integrity Monitoring (FIM) requirements

Securing AWS Fargate serverless workloads can be tricky as AWS does not provide much detail about the internal workings. After all… it’s not your business, AWS manages the scaling of underlying resources for you. :) While the security and stability of Fargate’s system is an inherent feature, Fargate follows a shared responsibility model, where you still have to take care of securing those parts specific to your application..