Operations | Monitoring | ITSM | DevOps | Cloud

%term

Stay Ahead of Known Vulnerabilities with Automated Patch Management

The consequences of not patching are everywhere: remember the Log4j vulnerability that grants hackers complete access to your devices? The best way to prevent this from happening is to use a patched version of Log4j — so why did this become a catastrophic and prolific security vulnerability event? A: Because people hate, forget, or simply dismiss patching as a labor-intensive part of managing their infrastructure.

Realizing Real Value with Cisco Full-Stack Observability Solutions

Forrester Consulting conducted a Total Economic Impact (TEI) study to examine the potential return on investment (ROI) for Cisco Full-Stack Observability (FSO) customers. Speaking with Cisco FSO customers, from IT managers to DevOps professionals, Forrester Consulting concludes that Cisco FSO solutions provide real value.

How to Interactive Rebase in GitKraken Desktop #shorts

Learn how to use GitKraken Desktop's interactive rebase editor! Whether you want to pick, reword, squash, or drop a commit, this handy feature makes it quick and intuitive. Rebase commits normally, edit commit messages, combine commits, or remove them entirely! Check out our latest GitKraken Desktop tutorial to see it in action.

Oberservo AI Demo Natural Language Searchable Data Lake

In this demo first shown at Splunk.conf24, we look at the data-lake creation feature of Observo. Data is stored in the parquet format - a open columnar format. We also support searching the data-lake based on natural language search - under the hood this functionality uses LLM for text to SQL functionality. Use the rehydrate function to send any subset of data to the analytics platform of choice, on-demand. Consider keeping a smaller Splunk index, and use the lake for retention - retain more data, longer, for a lot less cost, all in a flexible format.

Guide to Monitoring Webhook Performance Using Telegraf

Monitoring webhook performance is crucial to ensure reliable and efficient communication between your software/application and external services, as delays or failures in webhook processing can lead to significant data loss or service disruptions. Additionally, performance monitoring helps identify bottlenecks and optimize the system, ensuring a smooth and responsive user experience.

Navigating Security in a Global Organization

Playing 4D Chess: The Modern IT Story Knight to E-4. Security professionals consistently make moves to fend off attackers. Unlike chess, it takes a team effort to keep up against modern cybersecurity threats and implement changes company-wide. Two pros take you through a day in the life of the security team. Hear practical use cases to help you and your organization improve your security stance. Check and mate.

Myth #3 of Apache Spark Optimization: Instance Rightsizing

In this blog series we are examining the Five Myths of Apache Spark Optimization. So far we’ve looked at Myth 1: Observability and Monitoring and Myth 2: Cluster Autoscaling. Stay tuned for the entire series! The third myth addresses another common assumption of many Spark users: Choosing the right instances will eliminate waste in a cluster.