Operations | Monitoring | ITSM | DevOps | Cloud

FIPS certification and CIS compliance with Ubuntu

There are few Linux distributions that undergo the FIPS certification process, and even fewer with certified images available for production use in multi-cloud environments. Canonical has built integrated services to easily enable FIPS certified or compliant modules for Ubuntu 18.04 and 16.04 LTS releases, as well as tooling to assist in hardening and auditing Ubuntu instances to meet CIS compliance benchmarks. These certified components enable operating environments under compliance regimes like FedRAMP, HIPAA, PCI and ISO.

How to Establish a Culture of Secure DevOps

We’re constantly told to “Shift Left” and that Secure DevOps is the only way to have confidence in your cloud native applications. But speaking to end-users and industry colleagues, it’s clear that there are some major challenges in adopting Secure DevOps. If we read our history books, we know that DevOps wasn’t successfully adopted by buying tools, and a true cultural movement towards DevOps wasn’t established by having a small dedicated team of DevOps specialists.

Tips for Choosing the Right CI/CD Tools

CI/CD enables DevOps teams to go from development to production while tackling unexpected glitches. But, choosing the right CI/CD tool is always a challenge. In this blog, we have covered the tips that will help you select the right CI/CD tool for your team. A few years ago, it was nearly impossible to find a software development shop that wasn't deploying their code using some sort of Continuous Integration and Continuous Delivery (CI/CD) tool.

How to visualize your business performance with cohort tables using Grafana and BigQuery

Grafana presents some of the most versatile tools for visualizing and understanding the real-time performance and reliability of systems, regardless of where your data lives. But one question our customers frequently ask is, “Can I use Grafana to understand the health and performance of my business?” More often than not, our answer is yes.

Monitoring Outliers vs. Unbalanced Services

LogicMonitor currently provides a solution for monitoring groups of nodes with the same functionality, which we call services. With companies moving towards more auto-scalable and transient architecture, LogicMonitor is able to continually monitor these services, which are always changing. We also needed a way of determining if these nodes are being used effectively. It can become an unnecessary cost if there are multiple underutilized nodes.

Engineering solutions to security issues

Software engineering teams have always looked for ways to increase code creation efficiency, reduce code vulnerabilities, and improve security processes. Many are now shifting security left, establishing security controls and testing — specifically integration testing — at an earlier phase in the software development lifecycle (SDLC).

Business Automation Workflow (How To Implement)

Have you established a business automation workflow? If you’re committed to running an efficient operation that fires on all cylinders, you should be embracing automation at every level of your workflow. Automation is no longer the future - it’s here now. Failing to make use of workflow automation tools will leave your business running at a disadvantage. The inefficiencies of not utilizing a business automation workflow are costing organizations 20-30% of their annual revenue.