Operations | Monitoring | ITSM | DevOps | Cloud

Detecting Cobalt Strike with memory signatures

At Elastic Security, we approach the challenge of threat detection with various methods. Traditionally, we have focused on machine learning models and behaviors. These two methods are powerful because they can detect never-before-seen malware. Historically, we’ve felt that signatures are too easily evaded, but we also recognize that ease of evasion is only one of many factors to consider.

Elastic named a Leader in the 2021 GigaOm Radar on Cloud Observability

We are thrilled that Elastic has been recognized as a Leader and a Fast Mover in the 2021 GigaOm Radar Report for Cloud Observability. GigaOm Radar reports offer a forward-looking view of the market and are designed to help IT decision makers evaluate solutions with an eye to the future. Their analysts consider not just where the solutions are today, but also how the market is evolving and where the solutions are headed relative to that trend.

How Microsoft Used Splunk's Ethlogger to Turn Blockchain Data Into Supply Chain Insight

The way we ‘data’ is about to change, and Splunk’s Connect for Ethereum (aka EthLogger) is helping organizations to adapt. Splunk Connect for Ethereum enables organizations of all sizes to investigate, monitor, analyze and act upon their rapidly growing blockchain data sets across multiple chains.

Getting Started with OpenTelemetry .NET and OpenTelemetry Java v1.0.0

Recently we announced in our blog post, "The OpenTelemetry Tracing Specification Reaches 1.0.0!," that OpenTelemetry tracing specifications reached v1.0.0 — offering long-term stability guarantees for the tracing portion of the OpenTelemetry clients. Today we’re excited to share that the first of the language-specific APIs and SDKs have reached v1.0.0 starting with OpenTelemetry Java and OpenTelemetry .NET.

Network Throughput vs Bandwidth and How to Measure It

Have you ever used the term bandwidth? Probably. Have you ever used the term network throughput? Maybe. Have you used them interchangeably? Most likely. So let’s see where we get these mixed up. Namely, let’s look at the key differences between network throughput and bandwidth. And while we’re at it, let’s cover the fundamentals of throughput and how to measure it, so you can keep your network flowing efficiently and cleanly.

Running an open source multi-cloud with Ubuntu, LXD, and Mist

One of the advantages that Ubuntu brings to the cloud equation is improving an organization’s ability to run in multiple clouds. Running containers on top of Ubuntu further increases portability. Mist is an open-source multi-cloud management platform that helps teams centrally manage and control their Ubuntu instances across many different cloud environments and/or bare metal. This removes some of the operational and financial barriers to running applications in multiple clouds.

5 Best Application Modernization Strategies

To keep up with today’s competitive landscape and with the new normal induced by the pandemic, organizations must modernize their ventures, instigate innovation and be more agile. However, the process of replacing legacy systems isn’t precisely as agile as one thinks it would be. It takes time, and that’s something your company doesn’t have. You need solutions that consolidate years of transformation into mere months.

From ITSM to enterprise service management

More and more organizations are embracing digital evolution to improve processes and increase productivity. The Environment Protection Authority (EPA) Victoria, a state government agency in Australia, is one such organization. EPA Victoria embarked on a large-scale digital transformation journey three years ago to reinvent its operations, its interactions with the public, and its approach to environmental protection in the state of Victoria.

Painless Kubernetes monitoring and alerting

Kubernetes is hard, but lets make monitoring and alerting for Kubernetes simple! At iLert we are creating architectures composed of microservices and serverless functions that scale massively and seamlessly to guarantee our customers uninterrupted access to our services. As many others in the industry we are relying on Kubernetes when it comes to the orchestration of our services.