Operations | Monitoring | ITSM | DevOps | Cloud

Secure Networking for Openshift

The Kubernetes network model defines a flat network in which pod connectivity is unimpeded, with no restrictions on what traffic is allowed to or from each pod. To make a cluster production ready you need to make this networking secure. Network Policy is the primary tool for doing this and is essential to understand before considering moving a cluster to production.

Avoiding Disaster with AIOps

There’s a growing acceptance that artificial intelligence for IT operations (AIOps) is critical to maintain uptime and service levels as infrastructure has become more complex and users more demanding. AI-enhanced tools can filter and manage data from systems efficiently, and discover patterns that can solve issues faster and even prevent them. But as with any new technology there are risks that threaten ROI and adoption.

SLA Management

In this tutorial, we will show you how to use the Dotcom-Monitor platform to to track a service provider's adherence to SLA requirements. The SLA Report is a special reporting group where you can review and track adherence to SLA requirements, through a single reporting interface, from monitoring locations throughout the world. Learn more about SLA Reporting and other reports and dashboards that are available through Dotcom-Monitor.

Webinar: Achieve comprehensive observability with Sensu and Elasticsearch

The Elasticsearch data platform is ideal for analyzing monitoring and observability data. But if your multi-cloud journey has led you to multiple monitoring and observability tools, you may face challenges getting all that data into Elasticsearch. In this webinar, Sensu Developer Advocate Todd Campbell shows you how to get the most out of your Elasticsearch investment — and achieve deeper visibility — with the Sensu observability pipeline.

Onboarding Best Practices: JFrog Pipelines

JFrog Pipelines empowers software teams to ship updates faster by automating DevOps processes in a continuously streamlined and secure way across all their teams and tools. Encompassing continuous integration (CI), continuous delivery (CD), infrastructure and more, it automates everything from code to production. Pipelines is natively integrated with the JFrog Platform and is available with both cloud (software-as-a-service) and on-prem subscriptions.

Shift-left And Scale Security With The Power Of JFrog And Google

What does it mean to “shift left”? How can you scale security effectively as you do? These are growing questions corporations and developers are facing in a distributed, global economy. In this webinar you will learn how the amazing combination of GCP and JFrog allows dynamic workflows and automated quarantine processes, continuous scanning of production artifacts, integration with the broader business, and how you can scale all of these solutions rapidly in your fast-paced environment.

Detecting DGA Activity in Network Data with Elastic ML - Oct 1, 2020 Elastic Stockholm Meetup

After infecting a target machine, many malicious programs need to communicate with a command & control server ( C & C) that is controlled by the malware author. In order to avoid detection and subvert defensive measures, malware authors employ domain generation algorithms (DGA), which enable the malware to generate hundreds or thousands of new domains, one of which is then registered by the malware author as the location of the C&C server.