Operations | Monitoring | ITSM | DevOps | Cloud

Alerting

What Is Microsoft Azure Sentinel and Why Is It Important?

Microsoft Azure Sentinel is an intelligent, next-generation security information and event management (SIEM) solution designed to detect threat anomalies. Azure Sentinel is also categorized as a security orchestration automated response (SOAR) service that expedites the incident detection and event response process for cybersecurity teams. Azure Sentinel provides an extra layer of security to protect critical resources across an organization.

Webhooks for Raygun Alerting - Create custom third-party integrations

Since the introduction of Alerting to Raygun in late 2021, development teams have had more visibility into emerging issues than ever before. While the initial solution enabled you to get alert notifications by email, we knew that the next step was to give you more control over where you receive alerts.

Server Monitoring and Alerting

Server and IT infrastructure monitoring are critical to ensuring the performance and longevity of your client systems. Even more so, remote monitoring technology, in particular, has helped define the entire modern IT industry. In this post, we’re going to discuss several of the main monitoring concepts, including metrics, alerting, and monitoring, and why they are important.

Three communications best practices for incident handlers

The importance of well-managed communications when handling IT and security incidents cannot be overstated. If updates are not communicated in a timely and accurate manner, misunderstandings, misalignment, and costly errors will occur. Not to mention, resolution will be prolonged. And if highly sensitive information is communicated to those who should not be privy to such, then the risk of legal ramifications is high, as would be the damage.

Customizing Error Pages (Nginx Ingress Controller)

The most common way to do it, which is part of the offical solution is to create a Docker image server capable of responding to any request with 404 content, except /healthz and /metrics. This could be an Nginx instance. /healthz should return 200 /metrics is optional, but it should return data that is readable by Prometheus in case you are using it for k8s metrics. Note: Nginx can provide some basic data that Prometheus can read. /returns a 404 with your custom HTML content.

Why Self-hosting Might not be a Good Choice for your Status Page

We all remember when Facebook, WhatsApp, and Instagram shut down in April of last year for a whole day. And while it was terrible for their company—it’s an educational moment for the rest of us to learn from. Facebook’s status page is self-hosted, and that puts their status pages at risk of the exact issue it’s designed to tell you about.

Can Endpoint Protection Keep up With Modern Threats?

Endpoint protection is a security approach that focuses on monitoring and securing endpoints, such as desktops, mobile devices, laptops, and tablets. It involves deploying security solutions on endpoints to monitor and protect these devices against cyber threats. The goal is to establish protection regardless of the endpoint’s location, inside or outside the network.

SNMP Traps: The 90's Want Their Monitoring Technology Back

How do you monitor your network? There are a myriad of technologies and tools out there, each providing different benefits and challenges. Today we are going to focus on one specific area, Simple Network Management Protocol (SNMP) Traps. That’s right, we are going narrow here, not just focusing on SNMP but on one specific portion of the protocol: namely the ability of devices that support SNMP to send alert information to collectors.