Operations | Monitoring | ITSM | DevOps | Cloud

New Feature: Line-of-code-based Error Grouping

We’re launching a new line-of-code based method of grouping errors. Ifyou enable this grouping method in “App settings”, we will find the lineof code that was the source of the error and use that to split out errorsthat otherwise have the same type. To access the feature, upgrade to the latest AppSignal APM for Node.js integration. This is especially useful for Node.js andElixir parts because in these languages different errors often have the same type.

Kemp Flowmon ADS and Check Point Integration: Automated incident detection and response

We have recently published a script for the integration of the Anomaly Detection System (ADS) with a Check Point firewall. This ensures automated threat detection and response where attackers are blocked from accessing the network resources and causing even further harm. The previous integration with Fortinet describes a way of stopping the attacker at the perimeter. The following use case is largely the same, except with a Check Point firewall instead.

Discover VirtualMetric Reader - Full Automation and AI-based Log Processing and Analysis

VirtualMetric presents a new feature as part of our Log Tracking Suite – VirtualMetric Log Reader. The new capability of the product connects to any device within your IT infrastructure, collects the log information, parses it and transforms it into easy to analyse charts and graphs. No need to add any data sources or to read logs manually.

How BasisAI uses Grafana and Prometheus to monitor model drift in machine learning workloads

Qiao Han is a Software Engineer at BasisAI and co-author of Boxkite. He is interested in everything related to observability and has contributed to popular open source projects like libcurl and aiohttp. This post is written together with his coworker Linh Nguyen, who is a Tech Lead at BasisAI.

Democratizing Automation for Security Teams

Everyone wants to automate security. Traditionally, though, doing so has been challenging because setting up security automation tools required a specialized set of skills that no one engineer at a company possesses. It’s time to change this state of affairs by democratizing security automation. Here’s why and how.

3 tips to enhance remote access security

As managed services provider (MSP) technicians know, remote access gives an authorized user the ability to enter another user’s computer or network through a network connection. This access is often established via a remote desktop protocol (RDP), which is a network communications protocol from Microsoft® that is specifically designed for remote management.

Less is more: Incident management and monitoring in hybrid IT infrastructures

Many companies are continuously modernizing their infrastructure – but there is no standard way for the perfect IT infrastructure. Still, hybrid architectures have become the status quo in enterprises. Almost all organizations have migrated at least parts of their assets to the cloud or run applications as cloud services. At the same time, businesses want to dovetail their IT architecture with software development and are therefore embracing dynamic infrastructures. ‍

Hyperconverged Infrastructure and Harvester

Virtual machines (VMs) have transformed infrastructure deployment and management. VMs are so ubiquitous that I can’t think of a single instance where I deployed production code to a bare metal server in my many years as a professional software engineer. VMs provide secure, isolated environments hosting your choice of operating system while sharing the resources of the underlying server. This allows resources to be allocated more efficiently, reducing the cost of over-provisioned hardware.

IT Pro Day '21: Bring IT On

IT Pro Day has always been about singing the praises of practitioners across the vast spectrum of tech specialties, from network engineers and systems administrators; to infosec analysts and developers; to storage and virtualization admins; and even to monitoring specialists (whether that’s your whole job or just part of a much longer list of responsibilities). But an important question we should consider is what, exactly, prepared you for this career?