Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Best Practices for Troubleshooting a Windows Server Upgrade

To upgrade, or not to upgrade. While that may not have been the question that Hamlet asked, it’s one you might be asking. You already made the mistake of asking Reddit, “should I do an in-place upgrade,” and, as expected, people had Big Opinions. A Windows Server Feature Update offers benefits, like performance and analytics. On the other hand, if you have problems, then your attempts can lead to business downtime and service disruption.

The Why and What of AWS Lambda Monitoring

Serverless architectures are the rental tux of computing. If you’re using AWS to manage and scale your underlying infrastructure, you’re renting compute time or storage space. Your Lambda functions are the tie or cummerbund you purchase to customize your rental. Using the AWS event-driven architecture improves business agility, allowing you to move quickly. Lambda is the on-demand compute services that runs custom code driving an event’s response.

Understanding Ubuntu Logs

Linux, Debian, and Ubuntu are the Kirk, Spock, and McCoy of modern application development. The Captain Kirk, Linux, is the open-source central code for directing and talking to hardware. Debian sits as the trio’s Spock, the original distro that can be seen as more complex to install and use. As a Debian child distro, Ubuntu is the McCoy, helping to heal the challenges that people have when trying to use Debian.

Understanding IoT Logging Formats in Azure and AWS

Internet of Things (IoT) devices are everywhere you look. From the smartwatch on your wrist to the security cameras protecting your offices, connected IoT devices transmit all kinds of data. However, these compact devices are different from the other technologies your organization uses. Unlike traditional devices, IoT devices lack a standardized set of security capabilities, making them easier for attackers to exploit.

Simplifying Your Data Node Migration with Graylog

Migrating your data infrastructure can sound daunting, especially when you’re dealing with complex systems like OpenSearch. But what if it could be easier—almost ridiculously easy? If you’re thinking, “Hey, wait a second—could this be as seamless as it sounds?” You’re in for a pleasant surprise. In this blog, we’re diving into how moving and Simplifying Your Data Node Migration with Graylog makes the process smooth, secure, and efficient.

Understanding Java Logs

Logs are the notetakers for your Java application. In a meeting, you might take notes so that you can remember important details later. Your Java logs do the same thing for your application. They document important information about the application’s ability to function and problems that keep it from working as intended. Logs give you information to help fix coding errors, but they also give your end users information that helps them monitor performance and security.

When DNS Says: Talk To The Hand!

When DNS Says: Talk to the Hand! What? This started with a post on social media, which created a discussion among us industry professionals. The following conversation happened when I got to talk to my coworkers about some interesting things regarding DNS responses. Putting us gearheads in a room always results in an interesting comment or two!

25 Linux Logs to Collect and Monitor

While “America runs on Dunkin”, IT increasingly runs on Linux. Between being open-source and highly customizable, everything from video games to enterprise servers can run on Linux. When cloud services took over the corporate IT environment, they brought Linux with them in the form of virtual servers and containers. Meanwhile, developers increasingly use Linux-based Docker to containerize applications and Kubernetes to manage the deployments.

Python Logs: What They Are and Why They Matter

Imagine living in a world without caller ID, which is easy if you grew up in the “late 1900s.” Every time someone called, you had a conversation that followed this pattern: Hi! Who’s this? It’s Jeff! Hi Jeff! How’s it going? Today, most people already know who’s calling when they answer the phone because caller ID is built into smartphones and communications apps. As a developer, your Python logging is your application’s caller ID.

Graylog Geolocation: Mapping Your Log Data

In today’s distributed work environment, understanding the geographic origin of network traffic has become more crucial than ever. As organizations adapt to remote work, IT teams face the challenge of monitoring and analyzing an expanding array of IP addresses from various locations. Graylog’s geolocation feature offers a powerful solution to this challenge, allowing teams to extract and visualize geographic information from IP addresses in their logs.