Operations | Monitoring | ITSM | DevOps | Cloud

How to build a facial recognition system using Elasticsearch and Python

Have you ever tried to search for objects in images? Elasticsearch can help you store, analyze, and search for objects in images or videos. In this quick tutorial, we’ll show you how to build a system for facial recognition with Python. Learn more about how to detect and encode facial information — and find matches in search.

The great serverless cost debate (Serverless = Costless)

If you’re worried that switching to serverless infrastructure is too expensive for your business, you’re not alone. Total spending on cloud services will top $284 billion by 2024. The good news is there are many ways to track and lower your serverless operation costs without slowing down your business. Lambda and how can it help your business? Find out more by reading these Lambda frequently asked questions.

Taking Automation Beyond the SOC With Advanced Network Access Control

Security orchestration, automation and response (SOAR) tools are most commonly known for automating manual security operations processes in order to expedite security investigations or cyber response. For instance, Splunk’s SOAR technology, Splunk Phantom, is most commonly used to automate alert triage, phishing investigation and response, threat hunting and vulnerability management.

Tail your logs with Tailing Sidecar Operator

When migrating to Kubernetes and re-architecting your applications into containers, logging is a critical piece to consider. The twelve-factor app methodology has a section dedicated to logging and outlines the importance of not worrying about routing and storage of your logs. As a best practice, applications running in containers should rely 100% on standard output (STDOUT). Unfortunately, getting logs from applications that do not write to STDOUT is non-trivial and has many things to consider.

3 Smart Alternatives to Hot-Desking Your IT Team Should Try

After more than a year spent working from home, plenty of employees are actually excited to return to the office and see their colleagues face-to-face. But that excitement will quickly fade when they realize they have no place to sit. While some businesses will be staying fully-remote after the pandemic, others are preparing for a new era of hybrid work, where staff will split time between home and the office.

Kubernetes 1.21 available from Canonical

Today, Canonical announces full enterprise support for Kubernetes 1.21, from cloud to edge. Canonical Kubernetes support covers MicroK8s, Charmed Kubernetes and kubeadm. Starting with 1.21, moving forward Canonical commits to supporting N-2 releases as well as providing extended security maintenance (ESM) and patching for N-4 releases in the stable release channel.

Visualizing CloudFormation templates

As your infrastructure grows, getting a handle on all your AWS resources can be overwhelming. While that’s probably an understatement, help could be right around the corner. We’ll cover a few CloudFormation visualizer tools that can help, but let’s level set first. AWS CloudFormation is an established Infrastructure-as-Code solution that allows you to define, provision, organize, manage and update your AWS resources from a text-file template.

AI in the enterprise: Avoid hitting the infrastructure performance wall

“It’s nearly impossible to manage the growing complexity for corporate on-prem and Cloud infrastructure,” says Tim Conley, Principal at The ATS Group & Galileo Suite. “Most IT teams use a mix of tools to monitor and measure the health of their environment. However, this delays incident resolution, contributes to silos within an IT organization, and slows down your business.”