Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Securing a New Way of Working: Monitoring Those Endpoints

With more and more endpoints accessing your network remotely, you should expect rapid increases in VPN connections and usage, as well as exponential usage of cloud-based services. There are numerous Splunk apps that can help you increase the monitoring of remote endpoints but let’s showcase Splunk Security Essentials (SSE).

Monitoring Kubernetes with Grafana and InfluxDB

Most software architects and developers know that they need to monitor their systems. What often prevents them from implementing an effective monitoring solution is the plethora of choices they face. To set up a monitoring solution, you first have to decide what you want to monitor and how you want to monitor it. Then you have to settle for a collection and storage method. Next, you have to implement the interesting metrics in your system and start collecting them.

Hybrid Cloud Challenges: How to optimize monitoring and analytics for IT Ops

Let’s start with a simple picture and a question. You are involved in the day-to-day running of a complex and hybrid cloud of IT systems and applications. These systems, technologies, applications, processes and other platforms perform a number of critical business functions.

4 Ways to Prepare Your Application for Remote Workers

Companies all across the world are responding to the COVID-19 crisis by taking every precaution to limit its impact on the lives of employees and customers. The virus has created a ripple effect impacting everything from a visit to the local grocery store to countless conference cancellations. And the world became aware of this crisis only a little over a month ago. Tech companies have responded by asking, and even requiring, employees to work remotely.

Transparent, resource-based pricing with Elastic Enterprise Search

Until now, standard search solution pricing has been based on models that are difficult to understand, expensive to scale, and/or beneficial to only the search vendor. At Elastic, we’re taking a different approach based on the principles of transparency, fairness, and scalability, and have introduced resource-based pricing for our products running on Elastic Cloud. And we believe that this pricing approach will revolutionize Enterprise Search buying and ownership.

CASB vs Cloud SIEM for SaaS Security

Today’s businesses spend more money on SaaS tools than on laptops. On average, today’s employees use a minimum of eight different SaaS tools. The security implications of this robust cloud landscape cannot be neglected and we trust you are fully aware of it already. As an IT leader, you are responsible for keeping your company’s cloud infrastructure secure, but with the multitude of cloud apps businesses use on a daily basis, you have less and less control of that security landscape.

Europe regions are complete on Elastic Maps Service

At Elastic, we are adding data layers to our Maps Service on a regular basis. We are proud to announce that we have recently finished adding a number of layers that complete the European continent for all second level national boundaries. The list of new layers are Albania, Andorra, Bosnia and Herzegovina, Bulgaria, Czechia, Greece, Greenland, Iceland, Latvia, Liechtenstein, Lithuania, North Macedonia, Moldova, Montenegro, Romania, Serbia, and Ukraine.

In A Fast Changing World, Peer Benchmarks Are A GPS

As businesses transform their traditional business models into new digital ones, and aggressively compete for turf within the digital economy, their constant pursuit of competitive edge drives technology, process, and architectural innovations. As a result, it seems that every 18 months a technology paradigm shift comes about that enables better agility, lower cost, improved quality of service, better intelligence and more.

Dynamic alerts

The power and value that’s embedded in logs are reflected by the status and behavior of our applications and infrastructure. Many times we would like to be alerted when the application or its components show abnormal behavior. This behavior can be reflected by the application sending some logs at a higher than usual volume. Figuring out exactly what ‘higher than usual’ means, or in other words, setting the threshold value at which the alert should trigger can be a daunting task.