Operations | Monitoring | ITSM | DevOps | Cloud

A CSI Approach to Relationship-Based Observability

We recently ran a quick poll where we asked the audience, “When an IT incident occurs at your company, what TV show does it most resemble?” Twenty-three percent of respondents told us that CSI: Crime Scene Investigation resembled them the most. We needed to dig into that a little deeper. Let’s walk through the typical steps of figuring out the root cause, in CSI fashion: Photographs are critical in the world of CSI.

Icinga 2 Config Sync: DIY Edition

Two weeks ago, Icinga 2 Config Sync: Behind the Scenes explained how the config sync in Icinga 2 works and how you can look behind the scenes. Today, we will put our knowledge from that post to the test and try to manually replicate the config sync. The most important takeaways will be recapped in this post, but if you are interested and have the time, the other post is also worth a read.

The New Age of Cloud Cost Management: Cloud Cost Intelligence (And 8 Best Practices)

As companies are increasingly built in the cloud, cost management has become a major issue for many engineering teams. While cloud providers like AWS offer flexibility and easy scaling, cloud costs can be opaque and difficult to track. As a result, many companies that rely on the cloud are adopting cloud cost management strategies to understand and manage the charges associated with their cloud-based technology, and maximize cloud usage and efficiency.

Personalizing Elastic App Search with results based on search history

With Elastic App Search, you can add scalable, relevant search experiences to all your apps and websites. It offers a host of search result personalization options out of the box, such as weights and boosts and curations. You could also add a these documents might interest you feature, which would surface additional content for users, similar to documents they’ve previously searched for. This post walks you through the process of creating this capability using the robust App Search APIs.

Kelsey Hightower and Shipa for Kubernetes: A Fireside Chat

On October 22, 2020, Shipa launched a new web series called “Coffee & Containers.” C&C was conceived as a place for practitioners and IT leaders to learn and collaborate on all things microservices, cloud-native, containers, Kubernetes, etc. We were very proud to launch this series with Kelsey Hightower, Thought Leader and Developer Advocate at Google Cloud Platform, and Bruno Andrade, Founder and CEO of Shipa.io.

OpsRamp Gives a Boost to Netflow and UC Monitoring

The modern enterprise network is akin to the transcontinental railroad system in the United States in the early 20th century: it was far-reaching and commerce depended upon the reliability of the rail service connecting crucial goods with Americans in every town and city. Likewise, networks today are intrinsic to commerce (and daily life) yet they are entangled and multi-layered.

Splunk SOAR Playbooks: Finding and Disabling Inactive Users on AWS

Every organization that uses AWS has a set of user accounts that grant access to resources and data. The Identity and Access Management (IAM) service is the part of AWS that keeps track of all the users, groups, roles and policies that provide that access. Because it controls permissions for all other services, IAM is probably the single most important service in AWS to focus on from a security perspective.

Running InfluxDB 2.0 and Telegraf Using Docker

While the Docker buzz has faded a bit, replaced by new words like “Kubernetes” and “Serverless”, there is no arguing that Docker is the default toolchain for developers looking to get started with Linux containers, as it is fairly ubiquitous and tightly integrated with a variety of platforms.

Why Use Active Directory Security to Improve Your Server Security?

How do you secure your network servers, laptops, desktops, and workstations? A good starting point is to have a checklist of how to enable security features on these devices. You also need to enable a server monitoring service to track specific events and generate event logs. Yet, your security tasks are never done. You can get a false sense of security if you merely go through your checklist of security items and stop.