It finally happened. At the start of DockerCon Europe and a week before KubeCon was set to take place in the U.S., researchers discovered the first major vulnerability within Kubernetes, the popular cloud container orchestration system.
To stay competitive, companies who want to run an agile business need log analysis to navigate the complex world of Big Data in search of actionable insight. However, scouring through the apparently boundless data lakes to find meaningful info means treading troubled waters when appropriate tools are not employed. Best case scenario, data amounts to terabytes (hence the name “Big Data”), if not petabytes.
In the past I used to use the right tool for the right purpose. This led me to employ a lot of tools, and with most turning out to use subscription-based billing, increasing our costs much more that I would have hoped for. So, I adopted a new strategy: Use as few tools as possible, but use them as much as possible.
Stan Lee believed in the power of strength in numbers, that a group working together can create a force so powerful it’s unstoppable; from “X-Men” to “Avengers”, these teams had a pioneering spirit, heroic work ethics, and group thinking that surpasses individual brainpower almost every time. Today marks that day when the LogDNA superhero team becomes even stronger. I’m excited to announce that we have closed our Series B round of financing.
Protecting your data, and that of your clients, should be central to all of your business practices. Customers entrust companies with often very sensitive data, and it should be used and stored safely. Cyber security should be a priority in companies of any size, but when you’re a small business without a big security budget, how do you keep yourself protected?
In case you missed it, Sensu Go is here! And, as I wrote about previously, one of the hurdles with migrating workloads from the original version of Sensu to Sensu Go are the changes in the internal event data structure. The existing handlers and mutators in the community maintained Sensu Plugins collection might not work as expected in Sensu Go because of these event data model changes. But friends, I’m here to tell you that we’ve got this problem licked.
Just as we were getting ready to launch our Data Breach Monitor, we heard the unfortunate news that fellow Yorkshire based business Vision Direct had suffered a malware attack, which resulted in the loss of financial data of around 6,600 customers. So we asked ourselves, could we have detected the same attack using our new monitor? The only way to find out was to infect a website and see what would happen…
A decade ago, an enterprise adopting DevOps was a rare event. In the last decade, some businesses dipped their toes in, others spent big money going all in. Now the question isn’t whether to make the culture shift, but how to be successful as it grows. It’s how to scale the adopted DevOps practices in the enterprise. This article is going to focus on highlighting common missteps and offer advice that can help you make decisions to handle the challenges ahead.
You've got bugs, but they're hiding inside your minified JavaScript. Source maps are the key to finding them. Unfortunately, they can be difficult to set up. Luckily, you're a flippin' Honeybadger. We've got your back with the documentation and tools you need swat those bugs.