With the increasing popularity and adoption of native cloud and serverless systems organizations are starting to demand that DevOps better understand - and manage - cloud costs. This shouldn’t come as a surprise.
We have talked about reviews of legendary software in the area of monitoring, such as the colossus IBM® Tivoli® Netcool®. With equal pleasure, and at the request of the editorial team of this blog, today we bring up the second legendary software. That time we directly compared Pandora FMS with that giant, but this time we only refer to common features, because the HP Operations Manager is not currently on sale…
The area of alerting has very much matured over the past 10 years and there is now a number of specialized vendors in both mass notifications and operational alerting. It can be very difficult to make the right choice for a specific business need. However, it is possible to identify these two main segments and to categorize alerting solutions accordingly for a better decision on fitness for purpose.
Do you need better insight into the overall state of your network security? Take a step back and look through the larger lens of the SIEM solution. Security information and event management (SIEM) is an approach to security management that combines two aspects...
Don’t be that person. “That’s not my job.”
Since the inception of Falco, we’ve seen users write custom rules covering a number of different use cases. Because Falco is behavioral monitoring with a syntax that leverages system calls, you can write a rule for just about anything: opening a file, becoming root, or making a network connection.
Recently the Ecto library released a major update - Version 3.0. As part of the changes, some of the hooks that Scout relied on to capture data have changed. No longer can we hook into Ecto's logging system to extract information about queries being run, and instead we have a proper Telemetry event to listen to.