Operations | Monitoring | ITSM | DevOps | Cloud

Improve Elasticsearch Query Performance with Profiling and Slow Logs

If our end users end up too long for a query to return results due to Elasticsearch query performance issues, it can often lead to frustration. Slow queries can affect the search performance of an ecommerce site or a Business Intelligence dashboard – either way, this could lead to negative business consequences. So it’s important to know how to monitor the speed of search queries, diagnose and debug to improve search performance.

15 Tips for Moving Data Between Web Monitoring Providers and Uptime.com

Migrations carry a setup cost and engineers don’t work for free. Even under the most ideal conditions, it’s possible moving data between web monitoring providers will result in some missing feature or differing functionality. That’s just life. If you’re facing a migration you sometimes have to make do with the cards you’re dealt. But it’s not all doom and gloom! We hope this checklist will help you play like you’ve got pocket aces.

HAProxy and HTTP Strict Transport Security (HSTS)

HAProxy provides an easy and straightforward way to add HTTPS to your website. As a load balancer positioned in front of your web servers, it can handle all of the encryption and decryption duties, offloading those tasks from your upstream servers. That’s good because in today’s age of privacy awareness, the consensus is that every website must implement HTTPS, regardless of whether sensitive or private information is being exchanged.

Comparing the best infrastructure monitoring tools

A lot of engineers think a project is done once the code is live. In a perfect world, that could be true—alas, commits are rarely free of problems. For companies that have a lot of focus on dev but little on ops, this can quickly turn into a nightmare. Fortunately, there are a lot of infrastructure monitoring tools out there that can help marry DevOps and keep your apps, websites, and processes running smoothly.

Writing Effective Snort Rules with Examples [Best Practices]

This post will help you write effective Snort Rules to materially improve your security posture. We’ll begin with a breakdown of how a Rule is constructed and then explore best practices with examples in order to capture as many malicious activities as possible while using as few rules as possible. Snort is an open-source network intrusion detection system (NIDS) that provides real-time packet analysis and is part of the Coralogix STA solution.

Azure Logic Apps 101 - Developer tools: what are my options (Part I)

In this three-part blog postseason, we will describe the different development tools that are available or the different development approaches that we can use to create how Logic Apps. And for each approach/tool, we will describe: First of all, and rephrase Microsoft description: Azure Logic Apps is a cloud service that automates the execution of your business processes or workflows (sequence of tasks that produce a specific outcome).

Server Monitoring 101 - A Detailed Insight

It makes it easier to validate any server’s status without flipping between program and tools if you have one platform to track the servers. Besides, every server with remote server monitoring from a single application viewing window is provided with an accurate and real-time status. You will have the option of simplicity to decide what sort of services you want to track on each server. For instance, only a network storage server used for data backups could control a drive storage area.

VictorOps and Relay for Incident Response

VictorOps is an incident response tool whose mission is straightforward: “To make being on call suck less.” It enables teams to quickly detect and respond to problems like a service degredation or outage. VictorOps supports a wide range of external integrations to extend its capabilities by connecting different parts of your DevOps toolchain.