Operations | Monitoring | ITSM | DevOps | Cloud

Website and Performance Monitoring for Edge Cases

Specific needs are compelling but also hard to plan for. Your use case may be the reason you are searching for a monitoring provider, but the ability of your provider to adapt to your edge cases will be the reason you stay. The challenge is in discerning if a provider will be able to rise to meet your needs in unknown circumstances. In monitoring, there are some uniform needs. Everyone wants to know if their site is UP so HTTP(S) checks meet use cases universally.

A successful Monitoring as a Service Case: Drilling & Mining Industry

Migrating or restructuring a SCOM environment can seem like an overwhelming, even impossible, task. For one of our customers in the mining industry, however, it went more than well, and the improvements have been exceptional. Applying our Monitoring as a Service, they could benefit from the aggregated experiences of programmers, system administrators, and DevOps engineers that our service builds on to make the migration as smooth and trouble-free as possible.

$50M to reinvent security automation

Today, we’re announcing our $50 million Series B funding led by Insight Partners with participation from SentinelOne, GGV Capital, and Bessemer Venture Partners. Together with them, we believe that security teams deserve better. Better ways to collaborate, better ways to work, better ways to keep our lives and livelihoods protected.

ScienceLogic's DoDIN APL Certification Journey: Watch out for Spiders & Snakes

This is the fourth and final in a series of ScienceLogic blogs on the topic of the Department of Defense Information Network (DoDIN), including what it is, what it means to be approved under DoDIN standards, why it is important to both our federal and private industry customers, and the process for being approved for listing.

Security hardening holiday calendar - Week 1

This year we decided to provide security focused modules and content for the holiday season. These are parts of the security configuration we implement on our own infrastructure, based on OpenSCAP and other sources. By putting these into easy to use modules and writing about it, we hope to give our community of users something valuable: Educational and easy to understand security tips, along with configuration which can quickly be automated across your entire infrastructure, using CFEngine.

AWS Outage on Dec. 7, 2021 - When Did You Know About It?

If something isn’t working as expected, your customers will want to know. How quickly did you know that AWS’s us-east-1 region was having issues? Was it from an article online? Customer requests flooding into your support queue? A tweet?? Not being able to get into a PUBG match? Or speaking of matches, were you unable to message your last Tinder connection?

Python JSON Log Limits: What Are They and How Can You Avoid Them?

Python JSON logging has become the standard for generating readable structured data from logs. While logging in JSON is definitely much better than using the standard logging module, it comes with its own set of challenges. As your server or application grows, the number of logs also increases exponentially. It’s difficult to go through JSON log files, even if it’s structured, due to the sheer size of logs generated.

What Is Credential Stuffing and How Do You Prevent It?

In their effort to protect their customers from a range of modern threats, managed services providers (MSPs) may encounter a strategy known as credential stuffing. This hacking technique involves rapidly inserting large numbers of usernames and passwords—often collected from corporate data breaches—into the login fields of other sites and digital services.