Operations | Monitoring | ITSM | DevOps | Cloud

Monitor SSL TLS Certificate Expiration

Secure Socket Layer (SSL) and its successor, Transport Layer Security (TLS) are protocols designed to safeguard traffic over the internet. SSL certificates allow websites to move from HTTP to HTTPS, a more secure communication channel on a network. Starting this September, the lifespan of an SSL/TLS certificate will be limited to 398 days, a reduction from the previous maximum certificate lifetime of 825 days.

Advanced Active Directory attacks: Simulating domain controller behavior

There was a time when cyberattacks on identity and authentication infrastructures [like Active Directory (AD)] were immensely challenging to perform. A lot of forethought had to be put into devising a plan for the careful execution of attacks, and advanced technical knowledge of domains and networks was a requisite. Over time, with the advent of open-source pen testing tools, the knowledge gap and the complexities involved to carry out a full-scale cyberattack have narrowed drastically.

How to monitor istiod

Istio is a service mesh that enables teams to manage traffic in distributed workloads without modifying the workloads themselves, making it easier to implement load balancing, canarying, circuit breakers, and other design choices. Versions of Istio prior to 1.5 adopted a microservices architecture and deployed each Istio component as an independently scalable Kubernetes pod. Version 1.5 signalled a change in course, moving all of its components into a single binary, istiod.

New Microsoft partnership embeds Datadog natively in the Azure portal

We are excited to announce a new partnership with Microsoft Azure, which has enabled us to build streamlined experiences for purchasing, configuring, and managing Datadog directly inside the Azure portal. This first-of-its-kind integration of a third-party service into a public cloud provider reduces the learning curve for using Datadog to monitor the health and performance of your applications in Azure—and sets you up for a successful cloud migration or modernization.

AWS threat detection using CloudTrail and Sysdig Secure

Implementing AWS threat detection with Sysdig Secure takes just a few minutes. Discover how to improve the security of your cloud infrastructure using AWS CloudTrail and Sysdig Cloud Connector. With the rise of microservices and DevOps practices, a new level of dangerous actors threatens the cloud environment that governs all of your infrastructure. A malicious or inattentive cloud API request could have a sizable impact on availability, performance, and last but not least, billing.

VMware Management Pack Update Release (20.9.2060.0)

Our fourth update release for 2020 of OpsLogix VMware Management Pack for Operations Manager is now released. Improvements includes existing features such as Host Ram Disk monitoring and Discovery of Tagging information for Hosts and Virtual machines. Important: In our previous release we also simplified the configuration and licensing experience and moved everything under the administration pane.

Set up Let's Encrypt TLS Encryption using the HAProxy Kubernetes Ingress Controller

When it comes to TLS in Kubernetes, the first thing to appreciate when you use the HAProxy Ingress Controller is that all traffic for all services traveling to your Kubernetes cluster passes through HAProxy. Requests are then routed towards the appropriate backend services depending on metadata in the request, such as the Host header. So, by enabling TLS in your ingress controller, you’re adding secure communication to all of your services at once. HAProxy is known for its advanced support of the important performance-oriented features available in TLS.