Operations | Monitoring | ITSM | DevOps | Cloud

%term

How to Monitor AWS Lambda with CloudWatch

Since Amazon released Lambda in late 2014, the notion of serverless applications and function-as-a-service has steadily gained steam. Being able to focus on application code and simplifying infrastructure management is alluring, but traditional monitoring methods are no longer applicable. With less visibility, it becomes even more important to take advantage of the available monitoring methods. In this post, we discuss those monitoring methods, CloudWatch Metrics and CloudWatch Logs.

Product management tips for high-growth environments: How to tame fires

As a product manager in a high-growth environment, I have come to accept that at any given time, something is on fire. Or, at the very least, smoldering. Five or so years ago, the team at Raygun, was just five people. Now, we’re building software products for businesses like Nordstrom. With this growth also comes many learning opportunities for a product manager like myself.

Conquer it with correlation-Part 1: The advanced persistent threat (APT)

Among all the pesky attacks that keep security administrators working late, advanced persistent threats (APTs) are possibly the most lethal. An APT is a long-term, targeted attack which involves stealthily spying on an organization’s network activity or siphoning off sensitive data, as opposed to openly damaging or locking down network resources.

Dogged by downtime? Four experts weigh in

Downtime happens. That’s a fact, and it’s nearly impossible to predict. But there are some days when the chances of downtime are higher. Maybe it’s higher-than-normal website traffic, or increased app sign-ups. When planned high-traffic days are on the horizon, it’s a good idea to spend some extra time preparing for the worst.