Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Garbage Collection Settings for Elasticsearch Master Nodes

Elasticsearch comes with good out-of-the-box Garbage Collection settings. So good in fact that the Definitive Guide recommends not changing them. While we agree that most use-cases wouldn’t benefit from GC tuning, especially when it turns out there simply isn’t enough heap, there are exceptions. We found that G1 GC, for example, works well on big heaps. This allows you to have less, bigger nodes, which in turn means less network traffic in a large cluster.

Incident Response: 6 Best Practices for the Modern Enterprise

Modern organizations today are managing increasingly complex technology portfolios and pressured to deliver on innovation—all while facing far higher stakes than ever before when it comes to maintaining service performance and reliability. While these demands may seem like a paradox, many organizations have been successful in implementing processes that enable them to balance both agility and risk.

Why Your Client's Firewall May Not Be Up to the Task of Network Security

In this edition of News That Makes the Channel Cringe, a new Sophos report reveals IT pros can’t identify almost half (45%) of the traffic flowing through their networks. The Dirty Secrets of Network Firewalls study, which included the responses of 2,700 mid-size business IT leaders, goes on to say 25% can’t identify over 70% of total network traffic. That’s a massive blind spot, especially with mounting concerns over cybersecurity. The network is what keeps your clients connected.

Start AppStream Fleets Action

Today, we’re adding support for another AWS service to Skeddly: Amazon AppStream 2.0. Amazon AppStream is a service provided by Amazon Web Services that allows you to stream desktop applications through a web browser. Applications run on the Amazon servers, and you interact with the applications through your web browser. Amazon AppStream is often forgotten when it comes to cost-saving strategies.

15 Things Online Businesses Need to Know About Web Security

Web security for online businesses is an area not very well understood by many. Influx of content managing systems has led to a lot of online presence that is basically confused on how online security works. Some of the people who use these CMS do not know what web security is and how to implement it.

Monitor and resolve CPU Steal

Your virtual machine shares resources with other virtual machines on a hypervisor (the server that is hosting the virtual machines). CPU Steal is the amount of time your virtual CPU has to wait for a real CPU from the hypervisor. This happens when a neighbour VM is using up all the real CPU of the hypervisor. CPU Steal is an important metric to monitor in case you're using virtualized servers. It can have significant impact on the performance of your machine.

Sumo Logic Announces Search Templates to Improve the Customer Experience with Better, Faster Application Insights

Providing the ultimate customer experience is the goal of every modern company, and to do that they need complete visibility into every aspect of their business. At Sumo Logic, we make it our mission to democratize machine data and make it available for everyone, which allows organizations to gain the required visibility at each step. That’s why today, we are excited to announce the availability of Search Templates to our customers.