Operations | Monitoring | ITSM | DevOps | Cloud

Alerting

Anodot Webinar: Best Practices for Building a Stable Data Pipeline in Telecom

As telcos make key strategic pivots this year in the areas of fixed broadband, 5G, and virtualization/ cloudification of the network, a common unifying initiative is the automation of the network. There are many competing definitions and visions of how we can understand this, but the fundamental, immutable fact is that automation depends on good quality real-time data. Stable, reliable, and cost-effective data pipelines are now an absolute prerequisite for real-time automation tasks like anomaly detection, forecasting, recommendation, remediation, etc.

What Is Microsoft Azure Sentinel and Why Is It Important?

Microsoft Azure Sentinel is an intelligent, next-generation security information and event management (SIEM) solution designed to detect threat anomalies. Azure Sentinel is also categorized as a security orchestration automated response (SOAR) service that expedites the incident detection and event response process for cybersecurity teams. Azure Sentinel provides an extra layer of security to protect critical resources across an organization.

Webhooks for Raygun Alerting - Create custom third-party integrations

Since the introduction of Alerting to Raygun in late 2021, development teams have had more visibility into emerging issues than ever before. While the initial solution enabled you to get alert notifications by email, we knew that the next step was to give you more control over where you receive alerts.

Server Monitoring and Alerting

Server and IT infrastructure monitoring are critical to ensuring the performance and longevity of your client systems. Even more so, remote monitoring technology, in particular, has helped define the entire modern IT industry. In this post, we’re going to discuss several of the main monitoring concepts, including metrics, alerting, and monitoring, and why they are important.

Three communications best practices for incident handlers

The importance of well-managed communications when handling IT and security incidents cannot be overstated. If updates are not communicated in a timely and accurate manner, misunderstandings, misalignment, and costly errors will occur. Not to mention, resolution will be prolonged. And if highly sensitive information is communicated to those who should not be privy to such, then the risk of legal ramifications is high, as would be the damage.

Customizing Error Pages (Nginx Ingress Controller)

The most common way to do it, which is part of the offical solution is to create a Docker image server capable of responding to any request with 404 content, except /healthz and /metrics. This could be an Nginx instance. /healthz should return 200 /metrics is optional, but it should return data that is readable by Prometheus in case you are using it for k8s metrics. Note: Nginx can provide some basic data that Prometheus can read. /returns a 404 with your custom HTML content.

Why Self-hosting Might not be a Good Choice for your Status Page

We all remember when Facebook, WhatsApp, and Instagram shut down in April of last year for a whole day. And while it was terrible for their company—it’s an educational moment for the rest of us to learn from. Facebook’s status page is self-hosted, and that puts their status pages at risk of the exact issue it’s designed to tell you about.

Can Endpoint Protection Keep up With Modern Threats?

Endpoint protection is a security approach that focuses on monitoring and securing endpoints, such as desktops, mobile devices, laptops, and tablets. It involves deploying security solutions on endpoints to monitor and protect these devices against cyber threats. The goal is to establish protection regardless of the endpoint’s location, inside or outside the network.