Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How to create maintainable and reusable Logstash pipelines

Logstash is an open source data processing pipeline that ingests events from one or more inputs, transforms them, and then sends each event to one or more outputs. Some Logstash implementations may have many lines of code and may process events from multiple input sources. In order to make such implementations more maintainable, I will show how to increase code reusability by creating pipelines from modular components.

Securing IaaS, PaaS, and SaaS in 2020 with a Cloud SIEM

As the cloud continues to expand with no end in sight, it’s only wise to invest in it. Infrastructure-as-a-Service, Platform-as-a-Service and Software-as-a-Service bring significant cost savings (personnel and ownership), improved performance, better reliability, freedom to scale and - above all - significant security benefits. It’s no wonder that so many businesses have already adopted all three of these models.

Connecting Ethereum

ETHDenver connects developers, technologists, cypher punks, coders, crypto-economists, designers and makers to build on Ethereum, making it the perfect place to debut Splunk Connect for Ethereum. The use cases we saw added observability to blockchains like Ethereum mainnet and sidechains in real time. As the event went on, use cases and requests continued to pop up (which you'll see below); the app was used to index not just ethereum mainnet, but also sidechains such as xDai and OST Mosaic.

Three ways to debug IIS web server failures using logs

Unresponsive and slow pages are both terrible for any website. Even with the best user interface (UI), unresponsive and slow pages negatively affect the customer experience and the brand's reputation. Research from the Nielsen Norman Group has determined that the average user will leave a site after about 10 seconds of waiting for a page to load. If your page takes longer than a few seconds to load, it's time you check your IIS server logs.

The advantages of resource-based pricing in security

Given the complexity of large enterprise environments, coupled with the diversity of the vendor landscape, there is no single, agreed-upon “best” way to buy security. The battles continue between CAPEX or OPEX, net-30 or net-90, annual or multi-year, perpetual or subscription. One thing we do know, however, is that all too often the consumer pays for something he or she does not use.

A New Integration between Sumo Logic and ARIA Cybersecurity Solutions

When thinking about many of the worst data breaches we’ve seen so far (Equifax, CapitalOne, Target, Home Depot, and more), there was one common element: The attacks were not detected while they were active on the internal networks. It’s easy to think of the internal network as what’s onsite and directly in control. However, an organizations internal network also includes what extends beyond what’s on-premises, like instances within the public cloud and off-site hosted data centers.

Stackdriver Push to Splunk

During my career (in technology), I have dealt with many clients to whom security was one of the main areas of concern. As such, there’s always room for improvement but without a shed of a doubt, communications direction and stateful firewalls are some of the very first elements to consider. When it comes to logging and audit information, as a rule of thumb, it’s good to have a log aggregator stored outside of the scope of a cloud provider. A great log correlation out there is Splunk.

OpenTracing, OpenCensus & OpenTelemetry: What is Distributed Tracing?

Software monitoring allows developers and IT professionals to observe events occurring within a monitored system. The data gathered by monitoring processes offers visibility into how the monitored entity is behaving and provides warning signs indicating that some aspect of the system deserves greater attention. More and more software is migrating to the cloud, and monolithic software is being decomposed into microservices to create distributed applications.

Azure Monitor (Part 3): Azure Monitor Logs - Solutions

In the previous post, we talked about connecting data sources to your Log Analytics workspace. While the data can be super useful, it is “unstructured” at this point – not really in the right shape to perform a specific task or enable useful monitoring of an application or a service. This is where “Solutions” come into picture (formerly called management solutions). Solutions can also leverage other services in Azure to perform many related actions, such as automation.