Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Healthcare IoT: Monitoring Diabetes with Logz.io

Before I hop right in, it’s important to understand a bit about diabetes. Diabetes is what happens when your body cannot produce (type 1) or respond (type 2) to insulin effectively. The impact on the body is frequently quite severe — people who have difficulty controlling their blood sugar levels run the risk of losing feeling in their fingers and/or toes or even going into a coma if their blood sugar is either too high or too low.

Distrusted Symantec Certificates are Added to SSL Monitoring

Google had announced that Chrome would begin distrusting certificates issued by Symantec Corporation’s PKI and the decision is followed by other major browsers. These are the certificates by Thawte, VeriSign, Equifax, GeoTrust, and RapidSSL that are issued before 1st of December 2017.

Upgrading Your AWS Kubernetes Cluster By Replacing It

With the recent panic over the zero-day Kubernetes vulnerability CVE-2018-1002105, Kubernetes administrators are scrambling to ensure their Kubernetes clusters are upgraded to a version that is patched for the vulnerability. As of this writing, the minimum versions that have the patch are 1.10.11, 1.11.5, 1.12.3, and 1.13.0-rc.1.

2018 Website Outages: Key Lessons from Popular Website Downtime

Now that companies depend on the cloud for access to key services and business operations, downtime has a larger impact on productivity. Uptime is just as critical to small businesses as it is to major ecommerce retailers on Black Friday. Even the public relies on various services like Alexa and email to be available throughout the day. Looking at major outages over the past year provides insight into how companies prepare to handle these events.

Why MSPs Need Application Availability Monitoring

I’ve lived in the virtualization and cloud world for a really long time. During that time, I’ve also seen the impacts on users when you don’t have a good performance monitoring and troubleshooting system in place. That said, what if you have managed services? Do you understand what challenges managed services providers (MSPs) face when working without a monitoring and troubleshooting tool? How are you effectively resolving common VDI performance as well as connectivity issues?

CloudReady Dashboards Tips & Tricks Part #3

This is the third part of a series on the CloudReady dashboards and visualizations. The first part covered basics like Overviews, Refresh, and Layout settings. The second part covered more advanced dashboard usage like layout pinning, capture and embedding. In this third part we’ll cover key widgets, their usage and settings.

Part II: Anomaly detection within monitoring: how can you get started?

In a previous post we introduced anomaly detection as a group of techniques used to identify unusual behavior that does not comply with expected data pattern. In this article we will find out how we can apply anomaly detection within monitoring.

Detecting Data Breaches by Example - Vision Direct

Just as we were getting ready to launch our Data Breach Monitor, we heard the unfortunate news that fellow Yorkshire based business Vision Direct had suffered a malware attack, which resulted in the loss of financial data of around 6,600 customers. So we asked ourselves, could we have detected the same attack using our new monitor? The only way to find out was to infect a website and see what would happen…

Scaling DevOps for the Enterprise

A decade ago, an enterprise adopting DevOps was a rare event. In the last decade, some businesses dipped their toes in, others spent big money going all in. Now the question isn’t whether to make the culture shift, but how to be successful as it grows. It’s how to scale the adopted DevOps practices in the enterprise. This article is going to focus on highlighting common missteps and offer advice that can help you make decisions to handle the challenges ahead.