Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Linux Security Guide: How to Investigate Suspected Break-in Attempts in Linux

Scenario Linux has a number of built-in tools, commands and files which can track and store information about every user activity. These tools are common in most Linux distributions and can be used to investigate suspicious logins or failed login attempts into the system. In this article, we will talk about some of the initial methods to identify possible security breaches. We will use an Amazon EC2 instance to show these commands.

Global Serverless Apps with AWS Lambda & API Gateway

Serverless technologies are lowering the barrier to entry for global deployments with on-demand pricing and scaling. AWS’ serverless offerings are now supported in 16 regions, and with the help of Up Pro’s latest v1.2.0 release we’re going to take a look at setting up a globally distributed app to decrease latency for your customers.

.NET monitoring with Datadog APM and distributed tracing

Since it was first introduced in 2002, Microsoft’s .NET Framework has garnered a robust user base that includes organizations like UPS, Stack Overflow, and Jet.com. And now, thanks to the rise of the .NET Core runtime, this high-performance framework also supports cross-platform development. To provide deeper visibility into all of these environments, we are pleased to announce that Datadog APM and distributed tracing are generally available for .NET Framework and .NET Core applications.

What Your Kubernetes Security Checklist Might Be Missing

New technologies often require changes in security practices. What is remarkable about containers and Kubernetes, is that they also provide the potential for enhancing and improve existing security practices. In this post, I will share a model that we use at Nirmata to help customers understand security concerns and plan Kubernetes implementations that are secure.

Key metrics for Amazon EKS monitoring

Amazon Elastic Container Service for Kubernetes, or Amazon EKS, is a hosted Kubernetes platform that is managed by AWS. Put another way, EKS is Kubernetes-as-a-service, with AWS hosting and managing the infrastructure needed to make your cluster highly available across multiple availability zones. EKS is distinct from Amazon Elastic Container Service (ECS), which is Amazon’s proprietary container orchestration service for running and managing Docker containers.