October 2020


Detecting Ryuk Using Splunk Attack Range

Cybersecurity Infrastructure Security Agency (CISA) released Alert (AA20-302A) on October 28th called “Ransomware Activity Targeting the Healthcare and Public Health Sector.” This alert details TTPs associated with ongoing and possible imminent attacks against the Healthcare sector, and is a joint advisory in coordination with other U.S. Government agencies.


Ryuk and Splunk Detections

Several weeks ago, my good friend Katie Nickels (Director of Intelligence at Red Canary extraordinaire) and I were chatting about Ransomware. She was super interested and passionate about some new uses of a ransomware variant named “Ryuk” (first detected in 2018 and named after a manga/anime character) [1]. I was, to be honest, much less interested. It turns out, as usual, Katie was right; this was a big deal (although as you will see, I’m right too… still dull stuff!).


Leverage AI and predictive analysis to cut costs and eliminate downtime

With the promise of unprecedented potential, artificial intelligence (AI) and predictive analytics have permeated into every field of business. Due to their ability to help retail staff serve customers better, personalize video recommendations based on users’ preferences, reduce employee churn, and detect fraud and security threats, AI and predictive analysis are rapidly being adapted across industry verticals.


Expand your Sleuth monitoring reach with Datadog

Sleuth is a deployment tracking tool that gives you a deeper level of insight into your CI/CD workflows by tracking all of your team’s deployment tools from a single dashboard. Sleuth integrates with different components of your deployment pipeline and develops an understanding of your development processes. It can then automatically alert you as to when code is shipping, when manual approvals are needed, and when failures occur.


Want to Have a Log Management System that is Secure and Yet Efficient?

Across the technology and IT infrastructure domain, log files are recognized as often time-stamped files that can virtually record all critical information about events occurring within the purview of your IT network, OS, or other software applications. Some log files are humanly interpretable, while others are largely meant for machines to consume.


Why People, Processes, and Technology Cannot Change in Isolation

Since 2004, October has been designated by the National Cybersecurity Alliance as National Cybersecurity Awareness Month (NCSAM). Immediately, the mind wanders to supercomputers creating unbreakable algorithms against adversaries with unlimited compute power. This virtual landscape is happening today, and the arms race on both sides is something we’ll have to grapple with for the foreseeable future.

pandora fms

Black Friday is here! Would you like your eCommerce to survive it? Monitor it!

If you are reading this article, we assume it is because you have an eCommerce, a digital business you have put all your effort in (and all your money). Or maybe you’re a service provider offering services to eCommerce clients. Black Friday is coming! The official day of going crazy shopping and consuming, when Christmas shopping season is inaugurated and many retail stores and department stores take the chance to celebrate a day of sales that consumers have engraved on their shopping calendar.


The Fintech Sector is Under Cyber Attack - Here's How Companies Are Protecting their Data

Fintech companies – those that offer technology to support the banking and personal finance industry – are increasingly at risk of cyberattack. After healthcare, fintech is the second most frequently attacked industry, according to Alissa Abdullah, senior vice president of cybersecurity technology at Mastercard. Fintech News found that 27% of attacks target banks or healthcare.


Webinar Wrap-up: Driving rich customer experience through intelligent catalog management

Let’s get one thing straight – E-commerce product catalog management is hard! Presenting accurate product information on your website or mobile app for hundreds of products in different categories, each with its unique serial number, vendor, seller, pricing, and dimensions is not easy. There is no room for error. One misstep, and you could lose your customer.


Triaging Log Management Through SIEMS

While all cybersecurity professionals agree that log management is integral for robust proactive and reactive security, managing the enormous amount of data logs can be a challenge. While you might be tempted to collect all logs generated from your systems, software, network devices, and users, this “fear of missing out” on an important notification ultimately leads to so much noise that your security analysts and threat hunters cannot find the most important information.


Oracle Functional Monitoring

All databases provide a place to run applications. Monitoring an infrastructure is usually based on its technical components which goes on to extrapolate the health of its applications and programs. However, wouldn’t it be more efficient to monitor the application’s functionality itself? So imagine you have an Order application that consists of a Web UI frontend, Web API backend, business service and an Oracle Database.


Introducing etrace - a multi-purpose application profiling tool

These days, the internal workings of Linux applications involve many different moving parts. Sometimes, it can be rather difficult to debug them when things go wrong or run slower than expected. Tracing an application’s execution is one way of understanding potential issues without diving into the source code. To this end, we wrote an app-tracing tool called etrace, designed to detect performance bottlenecks and runtime issues in snaps.


Announcing Splunk Data Stream Processor 1.2

As data continues to explode across the enterprise, we are finding that it is becoming increasingly challenging for organizations to keep up. A recent Splunk report, "The Data Age is Here," found that 57% of companies interviewed expressed that the volume of data is growing faster than they can manage, with 47% bluntly saying they will fall behind when faced with rapid data volume growth.

vmware tanzu

Harbor to the Rescue-Operating a Secure Registry Without Restrictive Pull Policies

On November 1, 2020, Docker Hub will begin limiting anonymous and free account image pulls. While some may be upset about the change, it reflects a larger reality that takes into consideration the risks associated with consuming public content—most public repositories have some level of rate limiting to prevent denial-of-service attacks and customer metering—in addition to the cost of hosting public content.

squared up

Add context to your dashboards from SQL data sources New SQL tile: Line graph

Monitoring information that matters to you will often come from disparate sources – whether you are a server engineer, a SQL database administrator, or an application owner wanting a 360 view of your applications’ health. For example, you may want to visualise your server metrics from SCOM alongside historical trends from the SCOM Data Warehouse.


Automated App Re-Platforming from Windows to Linux using CloudHedge

Did the recent Windows 2008 and Windows 2008 R2 support withdrawal from Microsoft affecting your business? More than support, are the licensing costs of Windows Server causing a huge dent in your budgets? In every board meeting, is your CTO saying that we need to containerize apps but you don’t know where and how to start? Do these questions sound familiar? Then I guess, it’s time to modernize your applications and jump on the automated containerization bandwagon.


Three Most Common Printer-Management Problems Limiting Your Warehouse Productivity

Recently, I’ve had many discussions with supply chain operations managers about the status of their barcode printers. I observed that there is a big gap between how most people want their printer management to be and how it actually is—it all comes down to perception vs. reality. I heard about challenges such as entire printer systems breaking down during peak times, operations workforces ordering duplicate or unnecessary supplies, and admins not knowing what’s in their inventory.


Timeline and List View of Tasks in a Task Board

As mentioned in our Revamped Project Management blog discussing the launch of Task and Event Chat, Samepage's primary focus has been documents and the team collaboration around them. We understand the importance of tasks and events surrounding a project or process, but we felt the need to do more. Something was still missing. We needed to put more of our efforts towards expanding the capabilities and usefulness of task management and events in Samepage, something beyond just chats.

Introducing composite charts and Metric Correlations

We're really excited about supercharging Netdata Cloud's infrastructure monitoring experience with composite charts. These charts look just like the ones you're familiar with, but feature real-time, per-second aggregated metrics from any number of distributed nodes from across your infrastructure. You can still pan, zoom, and highlight to your heart's content while also changing the aggregate function, filtering nodes, or jumping straight into single-node dashboards for root cause analysis.

The Downfall of DOM and the Rise of UI Testing

In this session, CEO Fred and Engineer AJ review the pitfalls of DOM-based testing. At Rainforest, we believe the standard tools of the QA industry have fallen short of providing developers intuitive and easy-to-use tools that test their applications in a realistic way. In order to deliver a product that can bridge the gap between testing and reality, we’ve built our own virtual machine infrastructure that allows our automation to be run on any browser or operating system.

ObservabilityCON Day 4 recap: a panel discussion on observability (and its future), the benefits of Chaos Engineering, and an observability demo showcase

Over the past four days, Grafana Labs' ObservabilityCON 2020 brought together the Grafana community for talks dedicated to observability. We hope you enjoyed all of the sessions, which are available on demand now. (Link to them from the schedule on the event page). The conference wrapped up with predictions and advice from observability experts, lessons in failure, and Grafana Labs team members showcasing ways Grafana and other tools fit into an observability workflow.


Exploring Five Types of COVID-19 Workforce Safety Software Solutions

If your COVID-19 reopening plans have gone through more phases than you can count, you’re not alone. What was once planned for October has pushed to January or June or maybe never. Even the companies that have managed to get back onsite or into the office often live in constant vigilance, knowing that a single positive COVID-19 test could send them into lockdown.


What is Customer Experience Management?

Aligning customer experience ideals with available resources within your organization can be tough. As consumers react to lifestyle changes with shifted priorities, the service strategies that appeal to them change as well. Tapping into these important changes as they occur and pivoting to please your clientele can keep your business on the right track in any market, but it’s easier said than done.

JFrog & HashiCorp - Scale Your Developer's Talent

Join JFrog’s Baruch Sadogursky and HashiCorp’s Taylor Dolezal as they walk you through best practices for helping to enhance your team’s artifact experiences. Together HashiCorp and JFrog enable you to automate your application infrastructure end-to-end. While HashiCorp technologies implement Infrastructure as Code, the JFrog Platform manages all of the binaries, artifacts and dependencies for each build, and automates the software composition analysis, build information and deployment.

How to Monitor & Troubleshoot Clinician Experiences

Learn how Goliath has helped our health system clients reduce barriers to patient care by anticipating performance issues before end-users are even impacted, troubleshooting poor performance quickly when issues do arise, and documenting end-user performance trends to foster collaboration among other IT teams, vendors, management and end-users.
super monitoring

Improve Your Website's SEO with Ahrefs Webmaster Tools

Today SEO is much more than just finding high converting keywords for better ranking. Most marketers and content writers nowadays rely on different strategies to stay in the game. Imagine handling such intricate tasks manually or shuffling through several tools daily to get this done. Sounds hectic, right? But what if we told you, there’s a single package out there to make your work easier.


Best Software Testing Methods

Software testing methods are essential in building software. It helps developers deal with different types of bugs. As we all know, these bugs may range from a missing semicolon to a critical business requirement. Thus, software testing becomes an essential part of a test driven development environment. We are in the era of process automation. Today, businesses are dependent on one or more software products. Therefore, software quality becomes crucial.


Ivanti Neurons for Patch Intelligence: Research, Prioritize, and Receive Improved Risk-Based Insights

Vulnerability remediation is still an ongoing struggle for organizations. A simple mistake could cause no issues, or it could set off a wide-scale, devastating, corporate breach. Why is this? There are many reasons. Security and Ops talk past one another. No one wants to be the one that broke something. Speed is hindered by ineffective testing.


Infrastructure monitoring consolidation for achieving agile IT management

Managing large-scale deployments efficiently and resolving issues in a timely manner can be an easy task. What you need is a reliable and agile set of infrastructure monitoring tools for your enterprise IT infrastructure that possesses all the needed features for simple and stress-free management.


Lessons Learned in CI/CD Transformation

Continuous integration/continuous delivery (CI/CD) is a methodology which helps technology teams deliver higher-quality software faster through automation. At OpsRamp, we have embarked on the journey of CI/CD transformation and have seen tremendous change in the way we build and release our products. Michael Fisher, Group Product Manager, OpsRamp explained the journey and lessons learned in this process during a recent webinar.

api fortress

What Is API Testing?

API testing reduces the risk of functional, performance, and end-to-end API issues reaching production, allowing developers to shorten production cycles and increase iterations. Although API testing has been around for a while, its importance has increased dramatically as developers and testers embrace new software development processes such as agile development and CI/CD that depend on API testing.


10 Best Practices Every Snowflake Admin Can Do to Optimize Resources

As we covered in part 1 of this blog series, Snowflake’s platform is architecturally different from almost every traditional database system and cloud data warehouse. Snowflake has completely separate compute and storage, and both tiers of the platform are near instantly elastic. The need to do advanced resource planning, agonize over workload schedules, and prevent new workloads on the system due to the fear of disk and CPU limitations just go away with Snowflake.


Docker Hub rate limits in Bitbucket Pipelines

Docker recently announced that, starting November 1 2020, pull rate limits will apply to anonymous image pulls from Docker Hub. For anonymous (unauthenticated) users, pull rates are limited based on the individual IP address, and therefore some service disruption was expected for Docker Hub users. Bitbucket is working with Docker to ensure that Bitbucket Pipelines users can continue transparently using Docker Hub without rate limits nor any configuration.

The Concept of Inventory in opCharts Interview

Join Dan Carter from Opmantek's Gold Coast Lab as he interviews Nick Day, Senior APAC Engineer, to discuss the real-life business problems that brought this opCharts Inventory feature to life, how it is best applied and what this means for your organization. Nick explains how one of our MSP's saved an enormous amount of time using our Live Inventory Data and how you can get on top of your warranty states in seconds for every device and part on your network.

Kubernetes Horror Stories

Kubernetes is a complex system but not a complicated one. Its layered architecture is open to creating disasters caused by networking, security, configuration, and cloud provider limitations. Learning from others' mistakes is the new reality of succeeding for cloud applications. This perfectly applies to Kubernetes-based software architectures and your software, too. If you don't understand how other people will fail, it's more likely that you'll fail at some point.

Multi-Cluster & Multi-Cloud Service Mesh With CNCF's Kuma and Envoy

In this eBook, Kong Co-Founder and CTO Marco Palladino breaks down how Kuma now supports every cloud vendor, every architecture and every platform together in a multi-mesh control plane. When deployed in a multi-zone deployment, Kuma abstracts away both the synchronization of the service mesh policies across multiple zones and the service connectivity (and service discovery) across those zones.

Is IT security under attack?

From credential theft to network vulnerability exploitation and ransomware incidents on highly secure organizations, the year 2020 has been surprisingly rough on IT security. In the wake of the COVID-19 pandemic, companies around the world are reporting more cyberattacks than ever before, and although the techniques used or the method of attack may be new, the vectors of attack over the years remain unchanged.


Resolve errors faster with Lightstep and Rollbar

Every day developers wade through a growing number of error alerts emerging from changes and issues across their interdependent systems. But identifying the critical errors and mapping them to the root cause and resolution involves too much unproductive, time-consuming guesswork. At Lightstep we’re always on the look for ways to make Observability best practices easier for any developer to adopt. Recently we’ve combined efforts with Rollbar, a platform for error monitoring and analysis.

Hybrid Cloud Monitoring

A cloud is a cloud is a cloud. In this session of Dissecting DevOps, Dave and Chris explore the flavors of cloud, and how the considerations around monitoring and observability change for hybrid cloud environments. We understand tech-enabled enterprises have to support legacy and modern infrastructures. Having the right approach streamlines that effort and makes sure data is not inhibited by cloud boundaries.

Azure Logic Apps 101 - Developer tools: what are my options (Part II)

In the first part of this article, we mention that at the moment, you have three options for you to start developing your Logic Apps: And we analyze the advantages, disadvantages, and how to start developing Logic Apps by using the Azure Portal. Today we are going to address. Today we are going to do the same but this time using Visual Studio 2019.


Best Practices of Serverless at Scale

Share A serverless application in its infancy looks and runs vastly different to one at scale. When there are more components to manage, the key to operational excellence is rooted in serverless best practices. Dashbird was created with the mission to help developers succeed with modern cloud environments, no matter their size. As experienced developers ourselves, we’ve faced and understand the challenges found in the functionality of at-scale serverless architecture.


ObservabilityCON Day 3 recap: What's new in Loki 2.0, tracing made easy with Tempo, observability at the Financial Times, and a Minecraft NOC

Today is the last day of ObservabilityCON 2020! We hope you’ve had the chance to catch the talks so far, and will tune in live for today’s sessions. View the full schedule on the event page, and for additional information on viewing, participate in Q&As, and more, check out our quick guide to getting the most out of ObservabilityCON. If you aren’t up-to-date on the presentations so far, here’s a recap of day three of the conference.


Decision making between Jaeger and Zipkin

There’s always something that we can do to repair an old car, right? We all learn what can go wrong and signals we get from it are pretty straightforward about telling the problem (the smoke coming from the engine tells you, you should stop). On the other hand, these newer more digital cars are so complicated that you can’t understand what’s going wrong when they signal about they need to be repaired.


How COVID-19 Made IT Experience a Board Level Concern

For the digital workplace team at ABN AMRO, it wasn’t just the COVID-19 crisis itself that was unexpected. If you’d have told us in January 2020 that – within a few months – our tooling and capability would be the subject of direct and regular attention by the board at our company, we would have had trouble believing that, too. ABN AMRO has long had quite a special focus on employee experience in general.


Data Lakes vs. Data Warehouses vs. Data Marts

Let’s precisely define the different kinds of data repositories to understand which ones meet your business needs. October 29, 2020 A data repository serves as a centralized location to combine data from a variety of sources and provides users with a platform to perform analytical tasks. There are several kinds of data repositories, each with distinct characteristics and intended use cases. Let’s discuss the peculiarities and uses of data warehouses, data marts and data lakes.


Migrating to TimescaleDB

Here at MetricFire we’re moving some huge rocks to get more benefits for our customers. Our tech team is migrating our Graphite backend from a Riak database to TimescaleDB. This will drive huge benefits for our customers stemming from the new ability to access their database through PostgreSQL querying. Simultaneously, we’ll be migrating our cloud provider from Hetzner to AWS. This drives further benefits surrounding latency, uptime and security requirements for our customers.


The Top Paid, Free & Open Source Business intelligence (BI) Tools For 2021

Business Intelligence (BI) tools allow businesses to gather, process and analyse large amounts of data so that they are able to make decisions and see opportunities as well as visualise and report on key metrics for Stakeholders. The range of Business Intelligence tools available to use is an ever-expanding list with newcomers to the market appearing every year.


What is data quality, why does it matter, and how can you improve it?

We’ve all heard the war stories born out of wrong data: These stories don’t just make you and your company look like fools, they also cause great economic damages. And the more your enterprise relies on data, the greater the potential for harm. Here, we take a look at what data quality is and how the entire data quality management process can be improved.

Best Practices and Pitfalls for Monitoring Azure Environments with Open Source Tools

Cloud Solution Architect Idan Shahar and Open Source Lead Adir Ron, from Microsoft, join Logz.io product evangelist Dotan Horovits to share how access to the most popular open source tools in a single platform maximizes your DevOps team productivity when they’re monitoring Microsoft Azure environment for production issues.

How to Analyze Logs Using Artificial Intelligence

As your tech stack increases, every new device (network devices, servers, applications) creates a large amount of distributed log data. This forms part of what is called “machine data”, which is growing 50x faster than traditional business data. In fact, everything in your stack is continuously writing new events to your log files, including error logs that contain a record of critical errors encountered by a running application, operating system, or server.


The KPIs of improved reliability

Reliability can be a tricky subject for service providers. Building reliable systems and applications are necessary for serving customers and generating revenue, but teams often delay reliability programs in favor of other initiatives. For businesses to understand the importance of reliability, we need to tie the benefits back to business-level metrics and demonstrate how it contributes to revenue, growth, costs, and customer satisfaction.


5 Service Desk Tickets Sure to Keep You Awake at Night

It’s the witching hour and the night is cold. Something feels eerie—it seems calm, but you’re not sold. You turn your computer on and to your despair, Through the garishness of the screen It was sitting there. That service desk ticket. The one you thought was finally resolved But it’s back, and with a vengeance Ready to wreak havoc on all involved. This is just the beginning of your nightmare And the scariest part, you haven’t even read.


How Expedia modernized operations on one of the world's most fastest-moving IT stacks

It’s not everyday we are given a chance to get a first-hand look at how one of today’s leading and most advanced enterprises operates its IT stack. That’s why we were very excited when three senior IT executives from Expedia accepted our invitation to participate in a webinar discussing the company’s IT modernization journey.


Kubernetes Threat Vectors: Part 2 - Execution

Welcome to our second blog post on the Kubernetes threat vectors series. We are covering different tactics on the Kubernetes attack matrix, published by Microsoft and originally based on the MITRE ATT&CK framework. On the first blog we reviewed the Initial access tactic and its techniques and today, we are moving on to Execution. Let’s get started. What is Execution?


Continuous npm-audit: Keep your code safe and stay sane

With npm@6, support was added to protect your code from vulnerabilities in packages that you use. You may have noticed output identifying vulnerabilities when you run npm. The npm project now maintains advisories, which are used by npm audit to sniff out known vulnerabilities for you. It also provides fixes, if available. This is an impressive feature to help us all keep code as safe as we can in a world of seemingly innumerable package dependencies.


Benchmarking and sizing your Elasticsearch cluster for logs and metrics

With Elasticsearch, it's easy to hit the ground running. When I built my first Elasticsearch cluster, it was ready for indexing and search within a matter of minutes. And while I was pleasantly surprised at how quickly I was able to deploy it, my mind was already racing towards next steps. But then I remembered I needed to slow down (we all need that reminder sometimes!) and answer a few questions before I got ahead of myself.


DEJ names Humio a leader in 8 key areas shaping IT performance

As IT environments grow increasingly dynamic and complex, managing IT performance grows increasingly difficult. Traditional tools simply can’t keep up with these ephemeral environments and their exploding log volumes. That’s exactly what Humio was built to do, and it's evident in the latest report by DEJ, which names Humio a leader in 8 key areas shaping IT performance.


Managed autoscaling for all types of container workloads

A flexible architecture is critical for dynamic containerized applications but managing different infrastructure configurations to support different applications is a heavy lift, requiring significant time and effort. The major cloud providers do offer customers core capabilities to deploy, manage and scale cloud infrastructure through AWS Auto Scaling Groups (ASGs), GCP Instance groups and Azure Scale sets.


Java NullPointerException:One Tiny Thing That's Killing Your Chances of Solving It

What are some of the biggest obstacles with Java exception handling? Warning: the following string of characters is known to induce stress responses in certain individuals of the human species: “java.lang.NullPointerException”. If you’ve ever been frustrated with an exception, you’ve reached the right place! In this post, we highlight the shortcomings of relying on stack traces alone for investigating Java NullPointerExceptions.


How to Debug a Kotlin Multiplatform Mobile App From Scratch

Kotlin Multiplatform apps are a great option for big projects. They allow us to unify the business logic under a Kotlin module while using the latest perks of each platform’s individual UI, significantly reducing development costs. Debugging in Kotlin Multiplatform is easy, as you can use typical tools like adding breakpoints and printing logs in the console – and in Bugfender. Continue reading for a full tutorial. KMM stands for Kotlin Multiplatform Mobile.


CDP Data Visualization: Self-Service Data Visualization For The Full Data Lifecycle

With the massive explosion of data across the enterprise — both structured and unstructured from existing sources and new innovations such as streaming and IoT — businesses have needed to find creative ways of managing their increasingly complex data lifecycle to speed time to insight.


A Guide to Software Understandability: Why It's Essential To Every Developer

‍As most developers know, their code doesn’t always behave as they expect it to and they’re not quite sure why. This is most apparent when it comes to debugging their software. In order to figure out what the problem is, developer teams must go through a very long process in order to get the data they need to understand the problem. This can involve unnecessary wait times, unproductive hours, and a lot of wasted resources.


Modernization Starts With Infrastructure

Today, every company is a software company and digital business is a core strategy for many organizations. To gain the much-needed agility and efficient scalability, companies in all verticals are modernizing their infrastructure by moving to hybrid, multicloud and cloud-native environments. Realizing that modern applications run on modern infrastructure, IT leaders are prioritizing infrastructure modernization initiatives.


The Future of Ops Careers

Have you seen Lambda: A Serverless Musical? If not, you really have to. I love Hamilton, I love serverless, and I’m not trying to be a crank or a killjoy or police people’s language. BUT, unfortunately, the chorus chose to double-down on one of the stupidest and most dangerous tendencies the serverless movement has had from day one: misunderstanding and trash-talking operations.

power admin

What Are the Pros and Cons of File Sharing?

File sharing is a method used by some organizations where multiple employees have access to the same files. How the files are accessed does vary depending on the user environment. The files could be shared between two computers, where the files are stored on one computer and another user accesses them from their workstation. The files might be stored on a network file server instead of on a local workstation.


How to Monitor MongoDB Logs

MongoDB is a leading NoSQL database that has proven itself through time as a stable and easy-to-use system of great flexibility. There are numerous tutorials and real-world success stories that show how MongoDB has helped with supporting the database needs of certain organizations and projects. It’s fair to say that using MongoDB proves to be a solid choice for integrating with web-based applications and microservices serving as a database system or even as a monitoring aggregator itself.

squared up

Azure Lighthouse jumpstart

We are delighted to have a guest blog from Microsoft MVP Martin Ehrnst! Read on for Martin's expert advice on how best to use Azure Lighthouse. Afterwards, head over here to see how you can get a true single pane of glass for all your Azure tenants using SquaredUp's new Lighthouse features. Azure Lighthouse provides a unified management experience across all your customers (and internal) Azure resources. Depending on your background, you might not know why this is so big.


Solving critical Windows services restart during Puppet agent upgrades

In this blog we’ll share the journey we went on to solve a not-so-easy customer problem: a critical Windows services restart during Puppet agent upgrades. As with most software fixes, it starts with a customer ticket: component DHCP Server service restarts after an upgrade. This troubleshooting journey goes from analyzing Windows installer logs, to using undocumented Windows API calls, and back to the Windows installer logs, until we eventually found a solution.


Grafana 7.3 released: Support for the Grafana Tempo tracing system, new color palettes, live updates for dashboard viewers, and more

Grafana v7.3 has been released! With Grafana 7.0, we rounded out our observability story by making tracing a first-class citizen in Grafana alongside metrics and logs. That release included integrations with Jaeger and Zipkin, and earlier this month, we announced our integration with AWS X-Ray. At ObservabilityCON on Monday, we announced Grafana Tempo, our new open source distributed tracing system. Tempo is massively scalable, cost-effective, and easy to operate.


Let's start a revolution: Analytics in Action

At ServiceNow, we define analytics as using data to make better, faster decisions to run the company. We use analytics to not only spotlight every corner of our operations, but we also to spark growth, by giving our employees data-driven decision-making capabilities. That means they can take action every single day by using data and digital workflows. In order to drive data-driven decisions, we created a user-centric analytics program based on five major elements, which are listed below. 1.


New installation options coming for Ubuntu on WSL

The experience of installing Ubuntu on Windows Subsystem for Linux (WSL) just keeps getting better. Beginning in Windows 10 Insiders Preview build 20246, released today by Microsoft, users can enable a complete WSL experience. This will enable WSL 2, download and install the latest WSL 2 Linux kernel, and then download and install the most recent Ubuntu LTS on WSL.


Qovery is now part of the CNCF

Qovery is excited to announce that we are now a silver member of the Cloud Native Computing Foundation (CNCF) and Linux Foundation (LF). As a CNCF silver member, we are looking forward to contributing to CNCF projects and playing an active role in developing the cloud-native ecosystem. Qovery also recently makes is deployment engine open-source, an abstraction layer library that turns easy apps deployment on AWS, GCP, Azure, and other Cloud providers. ‍


Implementing GitOps on Kubernetes Using K3s, Rancher, Vault and ArgoCD

As Kubernetes continues to establish itself as the industry standard for container orchestration, finding effective ways to use a declarative model for your applications and tools is critical to success. In this blog, we’ll set up a K3s Kubernetes cluster in AWS, then implement secure GitOps using ArgoCD and Vault. Check out the source for the infrastructure and the Kubernetes umbrella application here.

Lightstep + Rollbar

At Lightstep we’re always on the look for ways to make Observability best practices easier for any developer to adopt. Recently we’ve combined efforts with Rollbar, a platform for error monitoring and analysis. In connecting our collective expertise, we’ve created workflows to remove the guesswork and improve error resolution in pre-production and production software.

Announcing the LogDNA Terraform Provider Beta

We’re excited to announce the public beta of the LogDNA Terraform Provider, allowing organizations to manage Views and Alerts programmatically via Terraform. Today, more teams than ever are adopting Infrastructure as Code (IaC) to reduce human error and create efficiently scaled workflows for their infrastructure. Additionally, teams are looking to bring the same benefits of scalability and predictability into their SaaS-based observability stack.

Chaos Engineering: How to create an automated Chaos Gauntlet with Gremlin and Jenkins on AWS

In this video, we will demonstrate how to use Gremlin and Jenkins to create an automated Chaos Gauntlet. This will be done using Jenkins Pipelines and Stages to inject a controlled amount of failure with the Gremlin API. We then add a final stage that allows you to optionally halt the attack from the pipeline, rather than having to wait for the full duration of the attack.

Tutorial: Using Helm Hooks in Your Codefresh Pipeline

When getting started with Kubernetes and Helm, the process across the release life cycle can feel like a black-box; having to follow debugging processes to understand what is going on behind the scenes. Helm hooks can help with that. This post provides an overview of: If you are new to Helm, we suggest to check-out our previous tutorial first and then come back to learn more about Helm hooks. Hooks perform a single action at a specified point during the release life cycle.


Active Directory Monitoring Essential Guide

An effective active directory monitoring system is essential to a secure directory design. There is a wide variety of security issues and loopholes that can be identified early if the users on the network are following the active directory monitoring guidelines. The lack of such monitoring can lead to a multitude of security threats which can result in financial and reputational damage along with data loss.


Continuous Network Monitoring for Proactive Troubleshooting

While many IT pros and everyday users may turn to network monitoring tools to find and fix network problems in emergency situations, that real long-term benefit of network monitoring happens when you continuously and proactively monitor network performance. In this article, we’ll be talking about continuous monitoring for proactive troubleshooting.


Yury Niño Roa Shares her Insights on Chaos Engineering and SRE

Blameless recently had the pleasure of interviewing Yury Niño Roa, Site Reliability Engineer, Solutions Architect and Chaos Engineering Advocate at ADL Digital Labs. She’s worked in roles ranging from solutions architect, to software engineering professor, to DevOps engineer, to SRE. Additionally, Yury is an avid blogger and conference speaker who regularly presents at events such as Chaos Conf, DevOpsDays Bogotá, and more.


How to download an Azure VM

If you require a way to download your Azure Virtual Machine to either your on premise VMware or Hyper-V environment, perhaps because the cost of running that Azure VM is too high, or even for some compliance reason this blog will show you how to quickly download your Azure VM easily with Carbon. No need to download your Azure VM via powershell, or even downloading the VHD from the Azure portal. Carbon will download and convert your Azure VM to your hypervisor of choice with just a few clicks.


Monitoring Kubernetes with Hosted Graphite by MetricFire

In this article we will be looking into Kubernetes monitoring with Graphite and Grafana. Specifically, we will look at how your whole Kubernetes set up can be centrally monitored through Hosted Graphite and Hosted Grafana. This will allow Kubernetes Administrators to centrally manage all of their Kubernetes clusters without setting up any additional infrastructure for monitoring.

DevOps Transformation with Serverless and Observability

There's a misconception around serverless that it will remove the Ops people from organizations. Serverless removes undifferentiated heavy lifting but makes the Ops people even more valuable for the teams because they are experienced about the failures of a software. Using extensive observability, Ops folks can adapt themselves into serverless and provide more value for their company. In this video, we discuss serverless adaptation for DevOps teams and how Thundra can help.

ObservabilityCON Day 2 recap: The latest Grafana Cloud tools for Prometheus to improve alerting, debugging, and scaling. Plus why continuous monitoring matters now

ObservabilityCON 2020 is live! This week Grafana Labs is bringing together the Grafana community for talks dedicated to observability. We hope you’re able to catch the great sessions we have planned. You can find the full schedule on the event page, and for additional information on viewing, participating in Q&As, and more, check out our quick guide to getting the most out of ObservabilityCON. Day 2 was dedicated to all things Prometheus — featuring new solutions and in-depth case studies.

pandora fms

Pandora FMS port monitoring

The ancient Roman Empire used to call what is now the Mediterranean Sea as Mare Nostrum (Nostrum Mare), stating what is now the port city of Barcelona as the entry point to Hispania (today the Iberian Peninsula) from the city of Miseno, located in the south of what is now Italy. For ancient Romans, port monitoring was crucial, and for us now too. “How?” you may wonder. Let’s see! Roman trireme model https://commons.wikimedia.org/wiki/File:Trireme_1.jpg


Netdata's dashboard: open by default and secure by design

Let’s talk through a scenario: You have a Linux-based VM running on DigitalOcean (aka a Droplet), and you install Netdata on it using our recommended kickstart script. As the installation process winds down, the Droplet starts up the Netdata Agent’s web server and serves the local Agent web dashboard on port 19999.


Scaling Puppeteer & Playwright on Checkly with Terraform

Managing large numbers of checks by hand quickly becomes cumbersome. Luckily, Checkly's REST API allows us to automate most of the repetitive steps. Building on that API, the Checkly Terraform Provider takes automation one step further, enabling users to specify their active monitoring setup as code. In this article, we will be building on top of John Arundel's great intro from a few months back and showing how to manage multiple checks using groups and shared code snippets.


Listening to the Customer in the 21st Century: It's All About Data

The customer has never been more right. Across industries, customers have become conditioned to demand not only near-instant responses to their needs but that their needs be anticipated in advance. Financial institutions are not given a pass, despite a competitive landscape flooded with regulation and privacy considerations. The customer still has expectations for a personalized, timely, and relevant experience.


Phishing Emails - Less Ocean, More Aquarium

Here at Splunk, when we discuss Splunk Phantom with customers we end up talking about phishing pretty frequently because it’s something like Olivia outlined in a recent blog post, "Between Two Alerts: Phishing Emails — Don’t Get Reeled In!", customers both encounter and talk to us about all the time. It makes a lot of sense — phishing is a super common issue that almost everyone deals with ad nauseum and it’s annoying to investigate.


Display a Persistent Banner Message with the New Global Banner

For years, Splunk has provided the ability to display dismissible Bulletin Messages. But what if you need to show a non-dismissible, highly-visible message across all your product pages? Now you can, with the new Global Banner! One of our top-voted Customer Ideas, the Global Banner allows an admin to display a one-line message, with optional hyperlink, at the top of their product pages.


Splunk On-Call: New Name, New Features to Improve On-Call For Your Teams

Today, more than ever, mobilizing remote teams to triage and resolve outages separates is separating enterprises able to accelerate their digital initiatives from those who don’t. Observability has elevated our ability to quickly detect problems and ask questions in our system to triage and reduce “time to clue” — an increasingly important metric.

Taylor Brown and George Fraser, Co-Founders of Fivetran, keynote the Modern Data Stack Conference

Throughout time data has improved the way we approach problems, find new discoveries, and make decisions. The technology that powers the creation and analysis of data hasn't always been reliable or simple to use, leaving some organizations ahead of others. This is disparity between the haves and have nots of data is changing due to the modern data stack. In this session, Taylor will give us a warm welcome and George will explain the impact of the modern data stack for analytic teams and how it is becoming as simple and reliable as electricity.

The Perfect World (Without Outages)

Heaven on Earth would be a world with no outages. No slow load times. No failed switches or routers. No bandwidth issues. Just peace and quiet. But if nothing were to go wrong on a daily basis, what would IT pros spend their time doing? Outages make up a large part of an IT pro’s job. Monitoring networks and finding the source of outages can be time-consuming and take away effort from other tasks.


Kubeflow operators: lifecycle management for the ML stack

Canonical, the publisher of Ubuntu, releases Charmed Kubeflow, a set of charm operators to deliver the 20+ applications that make up the latest version of Kubeflow, for easy consumption anywhere, from workstations to on-prem, public cloud, and edge. > Visit Charmed-kubeflow.io to learn more. Kubeflow provides the cloud-native interface between Kubernetes, the industry standard for software delivery and operations at scale, and data science tools: libraries, frameworks, pipelines, and notebooks.


Samurais Do NOT Use UIs: Using CLI To Configure Codefresh And Create And Manage Kubernetes Pipelines

Are you a ninja? It’s a silly question. I know that you are most likely not a real ninja. But you might be considering yourself a ninja of software engineering. “What does Viktor mean by that?” I’m glad you asked. Ninjas appear, perform the mission, and disappear without leaving a trace behind. “Why is Viktor talking nonsense? What does that have to do with software engineering?” Again, I’m glad you asked.


Infrastructure Monitoring With Amazon CloudWatch and OnPage Integration

Digitalization of business has transformed the world and its industries. Software that upkeep digital initiatives are no longer categorized as a support function. Rather, they are integral to every business process. Modern organizations require infrastructure monitoring tools to detect anomalies and alerting systems to automate remediation processes.

Using CLI To Configure Codefresh And Create And Manage Kubernetes Pipelines

Have you tried using Codefresh CLI to configure and operate Codefresh? UIs are great as a learning experience, but using them is slow, prone to errors, hard to reproduce, and results in hard-to-document processes. Writing code and scripts to accomplish the same results is a sign of maturity and experience. It is proof that we are capable of working in a team while also being an expert. Let's see how we can use everything-as-code and CLI to configure, create, and observe a fully operational Kubernetes pipeline in Codefresh.

The New Face of Secure Data Collaboration: Transforming Government with the Data Cloud

The push to embrace cloud-based technologies has undoubtedly transformed IT infrastructures at every level of government. Federal, state, and local agencies have made significant strides in modernizing how data is collected, stored, and analyzed, all in service of their mission and in fulfillment of strategic IT mandates.


Deployment Patterns for API Gateways Within a DMZ

A DMZ – Demilitarized Zone – is a military term, roughly summarized, as an area between two adversaries established as a buffer in order to reduce, or eliminate, the possibility of further conflict. In networking, the term usually refers to an area that acts as a buffer between two segregated networks. Here is a simplified visualization.

Modern Monitoring

"Observability" - don't roll your eyes just yet. As application architectures change, and the relationship between applications and the infrastructure they run on is blurred, tech-enabled enterprises have to consider new practices for supporting them. Observability gives us an opportunity to embrace the new set of challenges and offer better approaches and strategies. In this episode, we talk about how the complexity of modern apps impacts the changes needed on the management plane.

Scaling Kubernetes Deployments with InfluxDB & Flux

This article was written by InfluxDB Community member and InfluxAce David McKay. Eighteen hours ago, I was meeting with some colleagues to discuss our Kubernetes initiatives and grand plan for improving the integrations and support for InfluxDB running on Kubernetes. During this meeting, I laid out what I felt was missing for InfluxDB to really shine on Kubernetes.


Is your infrastructure a transformation enabler or a roadblock?

According to research from McKinsey, only 16% of digital transformation efforts have successfully improved performance and equipped the organizations to sustain changes in the long term. That’s a shockingly low number. Why is this happening? And how can you prevent this from derailing your own digital transformation journey and putting your business models, revenue, and profitability at risk?


Build Organizational Trust With PagerDuty Business Response

Imagine the following scenario: A large retailer experiences a major IT incident that impacts their point-of-sale systems. Their on-call engineers are alerted to the issue and begin their work to resolve it immediately. Behind the scenes, teams are collaborating on a fix, but in the storefront, frustration and tension are growing. Customers are complaining about not being able to check out, and in-store personnel have no good answers as to why the outage happened—or when it will be resolved.


Monitoring Cloud-Native Applications with AIOps from Broadcom

If there’s anything to glean from the odd times we’re living in, it’s that being connected digitally is more important than ever before. The lifeline of these connections, of course, are applications. Applications are more than just toys on a smartphone. They are the lifeline of business in this digital-first world. This was already true before 2020, and those needs have only grown.


10 Tips for Implementing AIOps

With more and more people working from home and the ever-increasing complexity of IT infrastructure, it’s important to understand the best way to leverage Machine Learning (ML) and Artificial Intelligence (AI) to improve IT operations. ML and AI have promised to bring disruptive changes to IT operations, and many organizations have already decided to adopt Artificial Intelligence for IT Operations (AIOps) or to do it soon. Yet, implementing and deploying AIOps is still very challenging.


Hiring and Managing IT During a Crisis

Martha Heller is CEO of Heller Search Associates, an IT leadership executive recruiting firm. Martha is a frequent keynote speaker at IT industry events and author of two books: The CIO Paradox: Battling the Contradictions of IT Leadership, and Be the Business: CIOs in the New Era of IT. She spoke about IT career trends on a recent webinar.


Top 10 Log Monitoring Reports You Must Have

Log monitoring can be a tedious process. When you have logs, you generate numerous log files in the log database that you need to track. Though a log file parser can help you search through multiple or large logs easily, it’s typically one of those processes which we only look at once it stops working. The windows system logs contain operating system logs as well as logs from applications such as Internet Information Services (IIS) and SQL server.


Performance Improvements, Reliability, and Feature Flag Mishaps

Last October, I published a blog post describing the efforts we've committed to on the Bitbucket Cloud engineering team to achieve world-class reliability. A lot has happened in the past year (understatement of the year)! What the team has accomplished is tremendous, but we've also learned a thing or two that we can work further to improve.

squared up

How to automatically map your applications and easily fix server issues

When troubleshooting a SQL Server issue, you don’t need all of those single-use dashboards in the SCOM console. You really only need one interactive diagram to help you identify the root cause in a few clicks – and SquaredUp’s Visual Application Discovery and Analysis (VADA) tool is just that. With this tool, you can also quickly and easily look at all of the servers that make up an application.


Monitor serverless configuration changes with Datadog Deployment Tracking

Serverless architectures remove the need to provision and maintain infrastructure components like servers and containers, so developers can focus on writing and deploying code. However, serverless architectures also introduce new challenges to monitoring and observability. Teams building serverless applications can iterate quickly and deploy frequent code and configuration changes, making it difficult to track what impact these changes have on your applications.


Better Together: Microsoft Teams CQD and Exoprise Monitoring

Maintaining call quality with Microsoft Teams is a process, not a one time event. Network engineers and Microsoft Teams application owners need to be vigilant in preserving optimal call quality to ensure audio, video, and screen-sharing always remain satisfactory for end-users. And vigilance is just as important before the pandemic as it is during the pandemic no matter where your users are working from. In some ways its more important today when working from home.


ObservabilityCON Day 1 recap: Loki 2.0 and Grafana Tempo announced, real-time observability with Redis, Grafana demos, a tester's perspective, and more

ObservabilityCON 2020 is live! Over the next few days, Grafana Labs is bringing together the Grafana community for talks dedicated to observability. Day 1 was filled with several new announcements about exciting projects and feature enhancements we’ve been working on for our customers and community. And there will be a lot more to learn about this week, like the session on Loki 2.0 on Wednesday.


Announcing Grafana Tempo, a massively scalable distributed tracing system

Grafana Labs is proud to announce an easy-to-operate, high-scale, and cost-effective distributed tracing system: Tempo. Tempo is designed to be a robust trace id lookup store whose only dependency is object storage (GCS/S3). Join us in the Grafana Slack #tempo channel or the tempo-users google group to get involved today!


Here are 4 Ways SRE Helps New Employees Onboard

Onboarding is an essential yet challenging part of the hiring process. As your organization matures, more of its processes become unique. This makes it harder for new employees to get up to speed. Investing in custom processes and tooling to achieve your specific goals is a valuable practice. But, you must balance this with an investment in onboarding.


Kong Gateway 2.2 released!

We are happy to announce release 2.2 of our flagship open source API gateway! Those were some busy three months since the release of Kong Gateway 2.1! We have pushed a number of patch releases in the 2.1 series, we’ve had our first fully-digital Kong Summit, and of course, we’ve been very busy building new features that are now shipping in Kong Gateway 2.2!


Adopting Observability to Pull Yourself Out of the Pits of Serverless Anti-Patterns

Serverless offers opportunities that are transforming how we think about building in the cloud. The days of worrying about complex and brittle cloud infrastructure on which sits your entire business logic are soon coming to an end. All of these responsibilities are increasingly now delegated to a cloud vendor, allowing you to focus primarily on your business logic. However, due to a large amount of the underlying architecture being delegated, serverless results in an unintended disadvantage.


Yellowfin 9.3 Release Highlights

Broadcasting is now available in this release for both dashboards and presentations. Just like reports, you can now enable scheduled delivery of these analytic content to different audiences. We have also included additional options for schedules — making it more granular for specific frequencies. For example, for fortnightly broadcasts I can now set the delivery to be on the second Monday. Or for monthly broadcasts, to have deliveries happen on the fifth day every month.


All in on APM

It’s been just over six months since Splunk disrupted the Application Performance Monitoring (APM) market with the launched SignalFx Microservices APM, combining the technologies of SignalFx and Omnition. We have pushed ourselves harder and continued to invest in creating more value for our customers by making it easier for them to ingest ALL data and providing ever more powerful analytics on top of that data.


Splunk > Clara-fication: Job Inspector

Do you SPL? Well, if you do, you probably either already know about the job inspector, or you’re about to. Either way, you probably don’t know enough. Don’t worry though, that’s all about to change. There are a few different aspects of the job inspector that everyone should be familiar with. These include the execution costs, the search job properties, and the search.log. I’m going to walk us through these areas, and some others, and their importance.


SOC 2 compliance for containers and Kubernetes security

This article contains useful tips to implement SOC 2 compliance for containers and Kubernetes. The Service Organization Controls (SOC) reports are the primary way that service organizations provide evidence of how effective their controls are for finance (SOC 1) or securing customer data (SOC 2, SOC 3). These reports are issued by the American Institute of Certified Public Accountants (AICPA).

Automating IT Management | Netreo On-Demand Webinars

In this webinar, you’ll explore real world examples the easiest ways to automate your IT management and processes. We’ll also show you the state of the art in remote and on-premise management, and how to achieve a comprehensive single view into your entire IT environment – without a huge administrative burden. You’ll also learn the best ways to manage proactively and get ahead of problems before they affect users, instead of spending all your time firefighting.

Introducing Netreo Version 12 | Netreo On-Demand Webinars

Today’s IT organizations are faced with the challenge of integrating new technology into their infrastructure while continuing to support all of their legacy needs. Building upon the host of features already present in our flagship product, we’re proud to announce the release of Netreo v12. The enhancements found in this latest release greatly furthers an administrator’s ability to get deep insight into resources across their entire IT landscape.

Managing IT at Scale | Netreo On-Demand Webinars

Every IT environment faces the challenge of scaling operations efficiently and seamlessly, even as the demands of the business change and complexity increases. Maintaining visibility while preserving security and enabling rapid NOC response can be a difficult challenge to solve. View this webinar to learn the best ways to leverage distributed collection and monitoring to seamlessly manage your global IT operations, get better visibility into secure network segments and datacenters, and improve your service-levels, all without adding additional labor burden.

8 Service Desk Processes to Start Automating Today

Automation has evolved from being a management consultant’s go-to-advice to being a central part of every organization’s strategic plan. The biggest misconception about automation is that it is exercised in areas where the company wants to reduce human capital. Contradictorily, automation standardizes mundane processes and frees employees to focus on more value-producing activities that require their unique skills and knowledge.


Triggers in AppSignal: Already Powerful - Now Easy To Set Up

Setting up triggers within AppSignal is a powerful way to discover that the bits started hitting the fan. You can use triggers to get an alert if an error rate is higher than 1%, your server runs out of memory, or even if your hourly login drops to zero. Our latest update makes the creation of triggers much easier.


OctoPerf V12 - Scheduler, Slack Integration and UI Upgrade

It’s been some time since our latest major release, in fact OctoPerf v12 is probably our biggest/longest coming release to date. There’s of course been a couple of minor versions this summer and we’ll also cover them but first let’s focus on the new killer features: the scheduler, alerting through slack/mail and a better UI for the menus. The scheduler is the first item left on our original roadmap (back when OctoPerf was still called jellly.io).


5 application security risks telcos should look out for

The telco industry is ripe with application security risks—find out why. The telecommunications industry has seen its fair share of cyberattacks over the years, and these are only going to grow in frequency and sophistication. Without a robust cybersecurity strategy in place, these vulnerabilities will persist. This is why security should be an ongoing effort in any telecom organization, and vulnerabilities must be systematically addressed to ensure protection.


Top 5 AIOps use cases to enhance IT operations

In today’s competitive landscape, enterprises must constantly improve and speed up their IT operations to stay ahead. Data plays a critical role in process optimization and enhancing the efficiency of IT operations. However, monitoring diverse live data from multiple sources is challenging. Significant delays in identifying and resolving IT issues can cause a loss of business and even a crisis. It is critical to monitor data and detect application glitches in real-time.


5 Reasons to Add Network Monitoring to Your 2021 IT Budget

For many companies, the beginning of October is also the beginning of the fourth and final quarter of the fiscal year. In IT, it’s a time to prepare for the new year by defining our priorities and setting our budget. COVID-19 threw a wrench into all of our 2020 plans from last year and a lot has changed since then. But one thing that hasn’t changed is the need for a network monitoring system in your software stack.


Top 5 Benefits of CloudRadar Server Monitoring for Service Providers

For Service providers, infrastructure monitoring is essential. It ensures that customer systems perform reliably and warn about developing issues before they become serious problems. Unfortunately, most monitoring tools proved to be annoyingly complex, cumbersome, and expensive. Providers end up having to spend a considerable amount of time managing the tool rather than monitoring the system. CloudRadar offers a server monitoring solution that eliminates those headaches and frustrations.


Introducing Predictive Rebalancing: An application-driven approach for reliably utilizing spot instances

Here at Spot by NetApp we’re continuously innovating our machine learning models used for identifying and predicting spot capacity usage and interruptions for all major public clouds (AWS, Azure and GCP). These proprietary algorithms expand the ability to utilize spot capacity for production and mission-critical workloads, allowing our customers to enjoy up to 90% cloud compute cost reduction with SLAs and SLOs that guarantee availability.


How to Reduce Your AWS Costs

Amazon Web Services (AWS) is a comprehensive cloud computing platform, providing an array of services to manage a business’s data infrastructure to help it grow and expand. With the wide range of services provided, it has multiple options to provide you with an elastic approach to optimize your costs. However, many users struggle with controlling their expenditure due to a variety of factors. Getting a complete understanding of how to reduce your AWS operational costs may be a daunting task.


How to collect Prometheus metrics and store them anywhere (with Sensu!)

As my co-founder Caleb Hailey likes to say, collecting monitoring and observability data is essentially a solved problem. The only remaining challenges are related to getting that data where you want it to go. When dealing with different formats — say, collecting Prometheus metrics and storing them in Elasticsearch — this can be a non-trivial problem. Put simply, it’s like trying to put a square peg into a round hole.


New Applied ML Research: Meta-Learning & Structural Time Series

At Cloudera Fast Forward we work to make the recently possible useful. Our goal is to take the incredible data science and machine learning research developments we see emerging from academia and large industrial labs, and bridge the gap to products and processes that are useful to practitioners working across industries.


Shipping Terraform Logs with the Logz.io Provider & API

Logz.io has deepened its partnership with Hashicorp over the last few months. Recently, we announced our integration with their service mesh, Hashicorp Consul. Simultaneously, we have worked on and completed an integration with their infrastructure orchestrator (a.k.a, infrastructure-as-code or IAC), Terraform. IACs take manual configurations and treats them as, well, code (along with procedures, build guides, run books, etc.).


Handle Unruly Outliers with Log Scale Heatmaps

We often say that Honeycomb helps you find a needle in your haystack. But how exactly is that done? This post walks you through when and how to visualize your data with heatmaps, creating a log scale to surface data you might otherwise miss, and using BubbleUp to quickly discover the patterns behind why certain data points are different.


Cybersecurity Awareness Month: Four Things We've Learned In 2020

The huge shift to remote work this year has presented many new challenges for IT teams—not least of which is the issue of securing the organization when large numbers of employees are now working at home. At PagerDuty, around a fifth of our employees were already based remotely, but the impact of COVID-19 meant that hundreds of other Dutonians had an almost-overnight switch to working away from the office.


Introducing: Automated Cost per Customer for SaaS Companies

If you’re a SaaS business — especially B2B — you know that your profitability can vary significantly from customer to customer. We all have a sense of our “expensive customers,” who use the product heavily and push things to the limit. That also means there are more profitable customers. Who are they? And how do they use the product?


#NeotysPAC - Automate Test Analysis with a Custom Keptn SLI Provider

Keptn is an event-driven open source project that orchestrates the process of artifact or configuration change delivery, functional or performance testing, deployment & test validation, artifact & change promotion as well as auto-remediation. One of the most popular automation processes is around deployment and test validation through Keptn’s SLI/SLO-based Quality Gate capability.

LogicTalks - How Logicalis Intelligently Monitors and Services it's Global Customer Base

In this episode of LogicTalks, Mark Banfield, Chief Revenue Officer at LogicMonitor, sits down with Justin Cawood, Director of International Managed Services Operations at Logicalis Group, to discuss how Logicalis, a managed services provider, has evolved the way they monitor their customer's infrastructures around the globe with LogicMonitor. Justin explains how LogicMonitor has allowed them to quickly discover and onboard new clients and infrastructures, consolidate tools and learnings across the global organization, and help Logicalis' customers to transition to cloud and hybrid environments and excel while working from home.

New Product Updates What Does it Mean to Observe and Debug in 'Hi Res'

A number of Honeycomb features have been released throughout spring 2019 that, collectively, we like to say deliver “hi-res” across the Engineering and DevOps lifecycle. What do we mean? First, hi-res with Honeycomb means you get clearer visibility about how your production is behaving in real time, as you release new code. Secondly, it means once you have those insights (thanks to granular event data stored in Honeycomb), you can debug and resolve more efficiently. So, how do we do it?

Eaze into Observability

On-call teams use Honeycomb’s analytics to discover exactly what is happening with code in production. While incident response is a key reason engineers rely on Honeycomb, observability also delivers unique value during the development process. Eaze takes observability a step further and uses Honeycomb to prioritize what’s needed to stabilize their existing service while informing how they build their new Go and Node.js microservices platform all at the same time.

Why Is Designing an Effective Application Logging Strategy Important?

Observability is made up of metrics, logs, and traces. These pillars help us understand the behavior of applications under normal execution, which further accelerates identifying anomalies in case of application failure or deviation from normal execution. Logging is not about tracing each and every operation, it is about sensible, consistent, and machine-readable log messages that expose the application behavior.


The 9 Most Popular PHP Frameworks for Developers

Web development before the age of web frameworks is difficult to imagine. Setting up a robust, dependable web app from scratch is a daunting task that requires years of knowledge and experience. Nowadays, however, with the help of effective, easy to use web frameworks, it doesn’t take more than a few minutes to get going.


Commit Code Confidently with the Nightfall DLP CircleCI Orb

Nightfall Data Loss Prevention (DLP) is now available as a CircleCI orb. CircleCI orbs are reusable snippets of code that help automate repeated processes, speed up project setup, and make it easy to integrate with third-party tools. With the Nightfall DLP orb, you can scan for sensitive items and prevent developers from accidentally committing sensitive information. We’re excited to announce our launch with CircleCI and share what you can do with the Nightfall DLP orb.


Case Study: Armor Trusts Panopta to Monitor their Customer Deployments

A global cybersecurity software company, Armor provides 1000+ customers with data and application protection in their private, public, or hybrid clouds. In addition, they help their customers comply with major regulatory frameworks and controls. With a large IT team that’s just under 100 employees, Armor’s support team leverages Panopta to prevent outages and issues for their customers. Panopta is their single source of data on the health and performance of their systems.


How to Become a Successful Software Asset Manager

As part of a challenge, I read Ulysses by James Joyce. 😬 Never again. At almost 1,000 pages (although about 250 of those pages were just explanatory notes), it was tough going. Especially when some bits of it were written in Latin, Irish, and Hungarian. I may have skimmed parts. At 42 pages, the Microsoft SQL Server 2019 Licensing Guide is no Ulysses, and it does have the benefit of being written in a single language. But it’s still not an easy read for us mere mortals.

RegTech Factory - Digital, fully integrated and automated "reporting factory"

Supervisory authorities around the world are now working on establishing data management platforms for the entire banking sector. Because of this trend, factory platforms are becoming more and more attractive for banks and financial institutions. With our RegTech Factory, we offer a digital, fully integrated, and automated "reporting factory" that helps to achieve significant savings in the technical and functional operation of the reporting system for participating banks and financial service providers.

Leveraging Tracing in Kubernetes and Containerized Environments | Kubernetes Virtual Summit

Presented by: Ron Yishai, Director of Cloud Engineering at Epsagon. Microservices systems running on Kubernetes and containerized environments are complex and hard to monitor and troubleshoot. Join us as we discuss the growth in adoption of K8s and containers and the challenges that they have presented us all, focusing on why standard metrics by themselves are leaving gaps in your observability strategy.

Understand Your Microservices: Observability in Modern Applications | DevOps Experience

Presented by: Chris Harding, Solution Engineer at Epsagon. Microservices have many benefits but are also complex and hard to monitor and troubleshoot. Join us as we discuss the growth in adoption of these environments, including Kubernetes and containers, and the challenges that they have presented us all, focusing on why standard metrics and logs by themselves are leaving gaps in your observability strategy.

Independent Analyst Research Firm Evaluates Aternity and 10 Other End-User Experience Management Vendors

On October 27, 2020 Forrester published The Forrester New Wave™: End-User Experience Management, Q4 2020 report. Aternity joined ten other select companies that Forrester invited to participate in its evaluation. Aternity was cited as a Strong Performer in the End-User Experience Management market. You can review the detailed analysis of Aternity and the other vendors by obtaining a complimentary copy of the report via a registration page on our website.

Appian Workforce Safety

Appian Workforce Safety is designed to help your organization deliver a safe onsite work experience in the wake of the COVID-19 pandemic. See how this solution provides contact tracing, capacity management, health status reporting, and return-to-workplace certification. Plus, built on Appian's low-code automation platform, and available in our HIPAA-compliant and HITRUST-certified cloud, you can trust your organization's information is secure.

OpsRamp Using OpsRamp for Saas Ops Excellence

Like many of its customers, OpsRamp needs to ensure 24 x 7 availability and performance for key services and applications. Challenges include how to effectively manage multiple pods across different geographies, how to control access and security, and how to ease alert management and improve metrics such as response and resolution times. In this live video discussion, OpsRamp’s director of cloud operations, PVV Raju, shares best practices and tips from our internal use of OpsRamp.

Replicate Artifactory Configuration with Terraform Provider Plugin

It takes a large team to manage enterprise DevOps, and it can take a large team of binary repository managers, too. It’s vital to get all team members going the same way, and quickly. A growing developer organization will have many instances of Artifactory to help them scale, on multiple nodes for high availability and multi-site repository replication. Configuring them all precisely, with the same set of repositories, users, and permissions, can’t be done effectively one at a time.


How Log Management Underpins The Internet of Things (IoT)

The Internet of Things (IoT) is a term for the ever growing number of internet connected devices that fall beyond the realm of your typical laptop, desktop computer or smartphone. Many of us already own and use IoT devices on a daily basis, these could be anything from "smart" versions of appliances like refrigerators, thermostats and coffee machines through to your expected IoT devices such as Amazon’s Alexa & Google’s home speakers.


Getting Started With Helm 3 Using React and Codefresh

Helm is an application package manager for Kubernetes. Using Kubernetes can often be overwhelming to maintain resources. Since Kubernetes is configured by YAML files, the more complex your application becomes, the more difficult it will be to navigate and make changes to the respective files; think about lots and lots of repetitive YAML files. A scenario that makes every developer cringe. Helm can help you solve this.


How to perform incident management with ServiceNow and Elasticsearch

Welcome back! In the last blog we set up bidirectional communication between ServiceNow and Elasticsearch. We spent most of our time in ServiceNow, but from here on, we will be working in Elasticsearch and Kibana. By the end of this post, you'll have these two powerful applications working together to make incident management a breeze. Or at least a lot easier than you may be used to!


Instana's Automatic Lambda Tracing: Why Instana Doesn't Use the New Lambda Extensions

Earlier this month, AWS launched the preview of the Lambda extensions framework. Some players in the Observability space announced their own extensions. In contrast, Instana did not make such a move. I thought I would explain why we didn’t launch our own extension, why we currently have no plans to do so (despite being kindly offered the opportunity) and — most importantly — why Instana users will miss nothing by NOT having an Instana Lambda extension.


Infrastructure Monitoring vs. Management: Key Differences

Infrastructure monitoring is often equated to infrastructure management, which can blur the line between two very distinct jobs. While they are different, it’s safe to say that both infrastructure monitoring and management have the same end goals, i.e., to maintain the integrity of the network, secure the server, and optimize performance. Infrastructure management (IM) has many use cases, and one of those uses cases is infrastructure monitoring.

#NeotysPAC 2020 - Andreas Grabner

Learn how to build your own SLI provider to let Keptn automate your Test Result Analysis. Keptn is an event driven open source project that includes automated SLI validation. While Keptn already provides SLI support for Prometheus, Dynatrace and Neotys we want to show you how you can extend Keptn by implementing your own SLI provider for your performance result store, e.g: Elastic, Splunk, CloudWatch, …

Machine Learning with Jupyter: Solving the Workflow Management Problem using Open-platforms

The infamous data science workflow with interconnected circles of data acquisition, wrangling, analysis, and reporting understates the multi-connectivity and non-linearity of these components. The same is true for machine learning and deep learning workflows. I understand the need for oversimplification is expedient in presentations and executive summaries. However, it may paint unrealistic pictures, hide the intricacies of ML development and conceal the realities of the mess.

Unified Big Data Integration

In today's increasingly fast-paced business environment, organizations need to use more specialized and fitfor-purpose applications to accelerate deployment of functionality and data availability to meet rapidly changing requirements and voluminous data growth. They also need to ensure the coexistence of these applications across heterogeneous data warehouse platforms and clusters of distributed computing systems, while guaranteeing the ability to share data between all applications and systems.

Modern Data Integration

Advances in technology continue to accelerate the pace and competitive environment of business. Those organizations that are able to utilize information to analyze activities and trends, and create new insights are leading their industries. Business leaders rely on fact based decision-making and information analysis for their competitive advantage. Innovations in technology ranging from automation of manual activities to the interconnectivity of devices for the Internet of Things are contributing to theoverwhelming amounts of data.

How Dashbird Atlas Accelerates Serverless Observability

Share When it comes to serverless applications, their distributed nature of exponential scalability and use of potentially thousands of resources automatically begs the need for observability. Using the mass data output of an application to understand and optimize the internal states is a game-changing strategy, but only if used well. Dashbird Atlas takes serverless observability to a new level, reducing excessive noise through simple visualization of your application.

pandora fms

10 Reasons Network Monitor Software is a Must

Ever since the 1980s, network monitoring systems have been in place for companies that rely on computer networks to perform their daily operations. Since their implementation, they’ve undergone drastic changes and now, provide IT teams with incredible tools to ensure best practices for everything from servers to application performance.


Monitoring and Tracing GraphQL AWS AppSync Applications

Creating applications or even platforms that can scale up to the amount of traffic you receive–no matter what that means–is not as easy as slapping a few microservices together and hoping for the best. There are several practices and complementary activities you need to perform to have a successfully scalable architecture. In this article, we’ll cover one of these activities: the monitoring and tracing of AWS AppSync APIs that serve content from multiple data sources.


This is How Blameless Integrates with JIRA

Atlassian JIRA, one of the most popular ticketing systems, allows teams to catalogue incidents, follow-up actions, bugs, stories, and more. As a common tool in any DevOps/SRE operation’s toolchain, JIRA is a key integration at Blameless. Blameless’ integration with JIRA allows teams to automatically generate a ticket within both Blameless and JIRA. This integration also allows teams to track follow-up actions via Blameless’ postmortem tool.


How to build a risk-informed business

At the advent of the pandemic, how prepared was your organization to support customers and employees? Or to continue delivering critical products and services? How adaptable and effective was its technology, workforce, and supply chain? As the COVID era has shown, resilience can’t be summoned overnight. It requires business and technology transformation.


ServiceNow Introduces New Operational Risk and Resilience Capabilities for the Enterprise

In today’s environment, organizations face increasing risk amid the pandemic and continued economic, geopolitical, and climate change-driven disruption. As a trusted partner to companies as they focus on mitigating operational risk, ServiceNow is pleased to announce new Operational Risk Management and resilience capabilities for the enterprise that will help companies manage operational disruption.


Scaling data in construction with Emery Sapp & Sons

Emery Sapp & Sons is an employee-owned heavy civil engineering company based in Columbia, Missouri. We focus on complex private and public sector projects ranging from excavation, grading, underground utilities, and bridge construction to asphalt and concrete paving. Since our founding in 1972, we’ve grown to over 1,400 employee-owners, due to organic growth as well as acquisitions.


Accelerate Your APIs by Using the HAProxy Cache

The age of rendering most of a web page’s contents on the server and then delivering it as a colossal HTML file is fading into the past. Modern web frameworks like Angular, React, and Vue push towards creating components instead—individual elements on the page that fetch their data in the background and poll for asynchronous updates—which can be reused across your site.


Choosing observability tools to maximize value

Application performance management (APM) like Instana and log management tools like Humio can deliver value beyond the IT department. In a recent Humio webinar, SRE professional Hunter Madison offers insights on how Decisiv, a service relationship management provider, uses observability tools to deliver value across the company and even extend savings to customers.


Protecting data in Snowflake is easy with Nightfall's API platform

Ever since Snowflake burst onto the scene in 2014, the company and the software has been massively influential in how we all think of storing and accessing data. Snowflake reached new heights in September when they launched their IPO — at 28 million shares and $3.4 billion raised, it’s the largest software IPO in history. The higher financial profile and cash influx means Snowflake can expand its reach even further.


Introducing Spot Storage: Simple, Optimized, Integrated Storage for Cloud Applications

As Spot has grown over the last few years, our commitment to our customers has been to help them optimize their cloud infrastructure and simplify the day-to-day management of it. All the features and capabilities we’ve added into Spot products help us deliver on that promise through our application-driven approach to infrastructure management. In this paradigm, application workload patterns and requirements determine infrastructure.


The future of cloud infrastructure: serverless meets storageless

Over the past 15 years, application architectures have evolved dramatically, from bare metal servers to virtualization technology, to elastic compute, auto scaling and containers. Recently, we’ve seen another shift to the serverless paradigm, where even the operating system is abstracted from developers and ops teams. Customers want fully-managed compute, but still want to use their existing application development tools and pipelines.


How to find Azure BLOB files that haven't been accessed

Azure storage has provided companies with a way to store almost limitless amount of data. But just like kids in a candy store this can get out of hand, and expensive. Being able to store as much data as you want is great, however it is something that can grow to a point where you are spending more on storage than you actually need.


StatsD: What Is It and How To Monitor It

StatsD is among the most popular monitoring solutions used to instrument code with the help of custom metrics. It has become very popular over the course of the last few years and emerged as the industry standard for open source inside-the-app monitoring. It has a host of advantageous features that makes it perfect for application performance measurements.


Data security vs usability: you can have it all

Growing up, were you ever told you can’t have it all? That you can’t eat all the snacks in one sitting? That you can’t watch the complete Back to the Future trilogy as well as study for your science exam in one evening? Over time, we learn to set priorities, make a decision for one thing over the other, and compromise. Just like when it comes to data access in business.


Tips for Updating Your Cybersecurity Plan

Every year brings new opportunities for federal IT professionals to reduce risk by addressing threats—both existing and emerging—with new tools, technologies, and tactics. This year has proven to be a little different, with the emergence of COVID-19 forcing federal agencies to make the jump to remote work. Although the world at large is currently working from home, bad actors from criminals to nation-state actors are still working, too.


Digital Retail Tips: Reduce Downtime on Black Friday (and Cyber Monday)

Black Friday is one of the biggest days of the year for online consumers and retailers alike. This year, the coronavirus (COVID-19) pandemic is reshaping Black Friday shopping — and digital consumers and retailers must plan accordingly. The coronavirus pandemic will likely cause Black Friday shopping to decline this year. As such, many digital retailers are launching early Black Friday sales, so they can capture consumers’ interest ahead of the competition.


The Best Tools for Building Progressive Web Apps

The year 2015 was marked by a new paradigm shift in web development. Google introduced Progressive Web Applications and JavaScript libraries and frameworks, such as React.js, Angular.js or Vue.js, created new development methodologies. By 2020, the web environment is flooded with PWAs based on reactive programming and built with cutting-edge frameworks.


Announcing Kong's AWS DevOps Competency

Kong Enterprise is a service connectivity platform that provides technology teams with the architectural freedom to build, operate, observe, and secure APIs and services anywhere. From Kong’s inception, we’ve been aligned with Amazon Web Services (AWS), enabling our customers to quickly and efficiently deploy Kong on their AWS accounts. As companies move from monolithic to microservice applications and beyond, Kong helps teams manage this transition.


Splunk Mobile Update: MDM Support for Microsoft Intune

In May, we announced new updates across the Splunk Connected Experiences portfolio, including support for many popular mobile device management (MDM) providers. With support for MDM capabilities, our customers can securely deploy Splunk Mobile at scale. Today, we are excited to share that Splunk Mobile now supports another popular Mobile Device Management (MDM) provider: Microsoft Intune. You can manage Splunk Mobile on both iOS and Android devices through Microsoft Intune.


Manage Splunk On-Call Using Terraform

HashiCorp’s Terraform has emerged as a powerful tool for managing infrastructure as code. Teams can fully describe an application’s infrastructure needs such as physical machines, VMs, containers and more using configuration files. This allows the application infrastructure to be version controlled, reducing human errors during deployments.

power admin

PA Server Monitor Basics & Getting Started Guide

PA Server Monitor is our flagship product that was designed with the end-user in mind. It is the easiest server monitoring solution to install and use. Once installed, our PA Server Monitor is designed to provide agentless server monitoring to track and monitor various server aspects. The software application includes features that allow you to customize and configure alerts via email or text messaging.


How PagerDuty and Slack Empower the "Work Where You Are" Mindset

Our reliance on digital services continues to be heightened by the ongoing COVID-19 pandemic. For work, school, and play, digital remains the primary channel. This puts huge pressure on ITOps and DevOps teams, making it critical that they can collaborate easily to resolve incidents rapidly. Many modern ITOps and DevOps teams rely on one of PagerDuty’s key integration partners, Slack, to meet this need.


What is a Webhook?

A webhook provides a decoupled means for an application to provide real-time updates to other applications. A great example of webhook integration is Slack, which can automate the publication of messages to channels and users. Configured inside the Slack administration panel, a Slack webhook is identified by a unique URL, such as https://hooks.slack.com/services/12345/qwert/.

Survey Says! Kubernetes Ain't Easy - Corbin Pacheco (D2iQ)

D2iQ recently conducted an independent survey of 300 IT leaders and DevOps practitioners to gather insights on Kubernetes in the Enterprise. Corbin Pacheco, Sr. Director of Product Marketing will give a sneak peek in to some of the key metrics that describe Kubernetes adoption in 2020, the evolving challenges as cloud-native technology and the landscape improve, as well as some of the impact that Covid-19 has had on Digital Transformation efforts.

Top 10 Considerations for Selecting Data Protection for Your Kubernetes Applications

Prashanto Kochavara - Trilio Are you a DevOps Engineer, Application Developer or IT Admin who needs backup and recovery, migration, DR or application mobility for Kubernetes-based applications? The extraordinary performance, scale and mobility challenges in these dynamic container environments demand a purpose-built platform that can support any public-, private- and/or multi-cloud deployment. This session covers the 10 essential things you need (and why) when choosing the right data protection solution for your cloud-native environment.

AI Chihuahua: Why Machine Learning is Dogged by Failure and Delays - Ian Hellström (D2iQ)

AI is everywhere. Except in many enterprises. Going from a prototype to production is perilous when it comes to machine learning: most initiatives fail, and for the few that are ever deployed, it takes many months to do so. While AI has the potential to transform and boost businesses, the reality for many companies is that machine learning only ever drips red ink on the balance sheet.

Honeycomb Learn Ep 1 Instrument Better for a Happy Debugging Team

Nathan LeClaire, Sales Engineer @honeycombio knows first-hand that the key to instrumenting code is to start with baby steps. With Honeycomb, a little instrumentation will give vast insights as soon as you ingest your data. With Honeycomb Beelines, we take the heavy lifting out of instrumenting. Listen to learn: See Honeycomb in action, hear best practices, and learn how fast and painless instrumentation can be.

Honeycomb Learn Ep. 2: De-stress Debugging -Triggers, Feature Flags, & Fast Query

This episode in our Honeycomb Learn series looks at how to cut stress levels when debugging issues in production. Starting with a hypothesis, run fast queries, and then navigate to the code where the problem lies. Be proactive and set triggers to let you know if something needs attention. When engineering is about to ship a new release, set a feature flag to watch how production behaves in real-time. Curtail performance issues and reduce customer impact with the right tools to better understand production systems, right now.

Honeycomb Learn Ep. 3: See The Trace? Discover Errors, Latency & More across Distributed Systems

Distributed systems bring complexity for developer and ops teams. When incidents occur in production, expected and unexpected, you want to pinpoint which part of the service is giving problems. Distributed tracing illuminates distributed systems, making your logs easier to navigate. Quickly identify where there are errors or latency in your code or service, even within 3rd party services you use. Instrumentation is the key to the best tracing experience possible.

Honeycomb Learn Ep. 4: Bubble-Up to Spot Outliers in Production

The power of Honeycomb lies in the way you analyze production data using different interactive views. See what's happening across many dimensions (fields) in your system with BubbleUp. Pick the timeframe, breakdown by any field, such as customer name or ID, then filter by a specific dataset or where any errors occur. The query results are heatmap that highlight events over the baseline, over time. Use BubbleUp to select outliers on the heatmap and drill down to all related fields in that data. It will help you understand which part of the code is misbehaving.

Honeycomb Learn Ep 5 Never Alone On Call

In this webinar, we’ll discuss and show how: Honeycomb's query history gives rich meaningful context, Honeycomb’ers dogfood and learn from each others' compound wisdom, benefits span engineering cycles and use-cases when debugging and maintaining, & to build a culture of observability and why you should do it now.

Understanding and mitigating CVE-2020-8566: Ceph cluster admin credentials leaks in kube-controller-manager log

While auditing the Kubernetes source code, I recently discovered an issue (CVE-2020-8566) in Kubernetes that may cause sensitive data leakage. You would be affected by CVE-2020-8566 if you created a Kubernetes cluster using ceph cluster as storage class, with logging level set to four or above in kube-controller-manager. In that case, your ceph user credentials will be leaked in the cloud-controller-manager‘s log.


3 secrets of professional hackers your software team needs to know about

“My job here at Atlassian is to commit crimes and then write very, very detailed confession letters – metaphorically speaking.” Meet Alex: an engineer on our security intelligence team with a wry wit and a penchant for pop-color hair. Less metaphorically speaking, the team’s job (our red team, in particular) is to hack Atlassian’s systems exactly as real attackers would.


What You Need to Know About Serverless Security

Developers at Airbnb, BBC, Netflix, and Nike all share something in common: They’re using serverless computing to ship new products and features faster than ever. And they represent a growing trend. As businesses compete to quickly deliver customer value, a whopping 60% of enterprises have already adopted, or are planning to use, serverless architectures.


FTP and SFTP: What's The Difference?

In the Information Age, data is currency. Controlling the flow of information and more importantly, protecting it has increasingly become a focal point for companies who want to remain competitive in modern markets. Improving data efficiency, integrity, and security is often how companies separate themselves from their peers. We present two of the most common methods for data transfers: FTP and SFTP.

#NeotysPAC 2020 - Harinder Seera

In the name of agility and moving to left, more emphasis is placed on the use of performance test tools rather than how to conduct performance testing (& what is involved). A trend that anyone who knows how to script can pickup a performance test tool and run a test. As if that is all there is to performance testing in their eyes. Little to No performance test training is provided to them to do their work properly.

#NeotysPAC 2020 - Hemalatha Murugesan

Over the last 7-8 months, everyone’s life has completely changed including our very own outlook towards business, risks, consumption of services, purchase power, networking, and above all view on life and health. With pandemic continuing amidst lot of uncertainty on the vaccines, IT – more specifically Digitalization and its adoption is expected to undergo significant changes with everyone embracing it. The topic will cover briefly the shift in business and client needs, change in operations/delivery models, etc. and how a performance tester would need to adapt to these changes including skills that is a must.

#NeotysPAC 2020 - Stijn Schepers

Raw Data provides insights required to keep your business apps healthy in optimal conditions. Like granola is described as a superfood, Raw Data is the superfood for a Performance Tester. I will talk about what Raw Data actually is, how it differs from averages and why analysing raw data provides deeper insights into the performance of your core applications. But looking at Raw Data can be dangerous as well…. Do you want to know more, tune in and join this presentation.