Operations | Monitoring | ITSM | DevOps | Cloud

How to Build a Monitoring Application in Less Than 10 Minutes

This talk shows how to use Tasks, Flux, dashboards and monitoring and alerting in InfluxDB Cloud to create an external service or website monitor. This video is a simple example for everyone to use as a template for their own custom monitoring applications built on top of InfluxDB Cloud.

DevSecOps is a Practice. Make it visible.

While DevSecOps feels like just another industry term, engineering teams everywhere are feeling greater and greater accountability for the security and stability of applications they build. DevSecOps is a practice, not a product. The practice consists of three primary use cases. For enterprises to be successfully implementing DevSecOps practices they need to focus on visibility, consistent communication, and data-driven incident response.

Database Cloud Migration Done Right - SolarWinds Lab Episode #95

The global pandemic has accelerated corporate planning for cloud computing and digital transformation by 2-4 years on average. But database migration, the process of moving a database from one place to another, is no walk in the park. Obstacles abound. Setbacks are common.

CI/CD and Security Testing Automation with CircleCI and NeuraLegion

Join CircleCI and NeuraLegion for a hands-on workshop around automating CI/CD and Dynamic Application Security Testing (DAST). Benefits of CI/CD Benefits of shifting AppSec left What is Developer Focused DAST? How to automate DAST and CI/CD We'll utilize CircleCI orbs during a 50 minute hands-on workshop to integrate a NexPloit engine into a CircleCI pipeline. We'll cover tips for pipeline failure, recommit, and rescan. Lastly, we’ll review results in NeuraLegion's dashboard.

ITOps In 2 Minutes | AIOps vs MLOps | Jay Menon

The OpsRamp IT operations management (ITOM) platform allows you to see everything in your hybrid IT environment, take the right action faster with integrated event and incident management and automate with confidence with AIOps. Learn more about our service-centric AIOps platform. With OpsRamp, you can detect and resolve incidents faster, understand resource dependencies and avoid costly performance issues that result in lost revenue and productivity.

Honeypods: Applying a Traditional Blue Team Technique to Kubernetes

The use of honeypots in an IT network is a well-known technique to detect bad actors within your network and gain insight into what they are doing. By exposing simulated or intentionally vulnerable applications in your network and monitoring for access, they act as a canary to notify the blue team of the intrusion and stall the attacker’s progress from reaching actual sensitive applications and data.