Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Splunk Edge Hub: Physical Data, Sensing and Monitoring on the Edge

Splunk Edge Hub device is a multi-component solution that includes a hardware device coupled with the Splunk platform and solutions that our partners build on top of both. It is a powerful tool that can help collect, distribute and act on data from edge devices and sensors, making it easier to capture and act on data that can be difficult to access physically or digitally.

C-suite insights on the transformative power of generative AI

Generative AI is revolutionizing the way businesses operate, from improving operational resilience to mitigating security risks and enhancing customer experiences. In a recent roundup of c-suite insights from three IT leaders — Matt Minetola, CIO, Mandy Andress, CISO, and Rick Laner, chief customer officer — we gain a comprehensive understanding of how generative AI is being used to improve business outcomes across organizations.

SIEM Implementation Guide: A How-To Guide

In an era where cybersecurity threats are not just frequent but increasingly sophisticated (and becoming more costly), the need for robust defense mechanisms has never been more critical. Security Information and Event Management (SIEM) emerges as a cornerstone in this complex data environment. It’s not just another tool in your cybersecurity toolkit; it’s a solution designed to elevate your organization’s security posture.

The Leading Jaeger Dashboard Examples

Unlocking the full potential of observability and tracing in modern software ecosystems has become imperative for businesses striving to deliver improved reliability and user experience. In this comprehensive roundup, we will dive into the world of Jaeger-incorporated observability and tracing dashboards, offering a curated selection of the best use cases that empower DevOps teams, engineers, and developers to gain unparalleled insights into the inner workings of their applications.

Active vs. Passive Monitoring: What's The Difference?

Today, it’s perfectly normal for businesses to continuously monitor software applications and IT infrastructure to ensure uninterrupted customer service. Active and passive monitoring are the two popular methods enterprises use for infrastructure and application performance monitoring (APM). As the names indicate, these two approaches to monitoring are very different.

Mastering Firewall Logs - Part 1

A firewall is a network security device or software that is used to monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewall Logs contain valuable information about network and security events. These logs are essential for security and infrastructure monitoring for enterprises. While this data is critical to securing enterprise networks, they are also one of the most voluminous data types security teams use to monitor and secure their networks.

Deployment Frequency (DF) Explained

Technical teams use various metrics and indicators to track performance and success. For DevOps teams, among the most important metrics is deployment frequency. Deployment frequency can help you evaluate the software delivery performance of teams that develop software and apps. In this article, I’ll look at using this metric to calculate deployment rate, the importance and best practices for improving your deployment rate and setting your DevOps team up for success.

Announcing the Splunk Add-on for OpenTelemetry Collector

The Splunk Add-on for OpenTelemetry Collector is a variation of the Splunk Distribution of the OpenTelemetry Collector that simplifies metrics and traces data collection, configuration and management. Since it is an add-on, users can deploy it alongside Universal Forwarders using tools like Deployment Server to start collecting high-fidelity metrics and traces from 1000s of their hosts easily. We’re happy to announce that the Add-On is now generally available in Splunkbase.

5 Elasticsearch Disadvantages You Should Know

Since its initial release in 2010, Elasticsearch has grown into the most popular enterprise search engine with use cases that range from web crawling and website search to application performance monitoring and security log analytics. But despite its widespread adoption and success, Elasticsearch does have some notable disadvantages that you should consider - especially if you’re envisioning a high-scale deployment with a large amount of daily ingestion.

Recapping KubeCon North America 2023

If you missed KubeCon North America 2023 in Chicago, or you were there and spent more time in the “hallway tracks,” you may have missed some of the big news that came out of the show. We covered the big happenings in the open source cloud native and observability realm in the latest episode of OpenObservability Talks!