Operations | Monitoring | ITSM | DevOps | Cloud

Better incident management while working remotely: The Squadcast way

As the pandemic wears on, remote incident management has become the norm worldwide for businesses. Here we share some best practices that helped us to address remote incidents and make on-call less stressful. With the onset of remote work due to Covid-19, remote incident management has become the norm for businesses worldwide. Organisations that were earlier used to having war rooms now find themselves having to coordinate teams through Slack, MS Teams or other collaboration tools.

Four key metrics for responding to IT incidents and failures

If you’re a veteran in this space, you probably understand the many incident response metrics and concepts, along with the many (at times exasperating) acronyms. For those new to the space, or even those with years of experience, the terminology is often overwhelming. If you’re one of those people who’s struggling to navigate through the world of DevOps metrics, we’ve created this article for you.

Ship Your ModSecurity Logs to Logz.io Cloud SIEM

Now, you can ship ModSecurity logs to Logz.io to automatically surface high-priority attacks identified by ModSecurity. Logz.io will automatically parse those logs to project a greater bird’s-eye-view of your security situation within dedicated dashboards. ModSecurity is a prolific web application firewall (WAF) popularly used to help secure web servers. It supports Apache HTTP, IIS, and NGINX. It can deploy either as a proxy server or within a web server itself.

Stackrox Acquisition: The Race to Secure Containers

Today, Red Hat announced its intent to acquire Stackrox. This is a very exciting development in the world of cloud-native security! First and foremost, congratulations to Stackrox, an early participant in the container security space. This acquisition is a great outcome for Stackrox given their nascent scale and on-premises offering.

6 Best Network Mapping Tools

IT software technology is advancing at a rapid pace, with the internet of things, cloud, automation, and machine learning making networks and network management activities more complex and interdependent. As networks grow and become more complicated, it’s increasingly important for administrators to have access to the tools necessary to conduct essential network monitoring and management operations. One such tool is a network mapper, also known as a network topology mapper.

Troubleshooting Kubernetes Job Queues on DigitalOcean, Part 1

Kubernetes work queues are a great way to manage the prioritization and execution of long-running or expensive menial tasks, such as processing large volumes of employee migration to a new system, ranking and sorting all the planets in the universe by Twitter tags, or even post-processing every frame of the latest Avengers movie.

Innovation Insight for Observability by Gartner

In its latest report, research firm Gartner tackles the trending subject of Observability. According to Gartner, "Observability is the evolution of monitoring into a process that offers insight into digital business applications, speeds innovation and enhances customer experience. I&O leaders should use observability to extend current monitoring capabilities, processes, and culture to deliver these benefits." This blog post gives you a sneak-peek of this new analyst report about observability.

Simply the Best: JFrog's Top DevOps Articles from 2020

In 2020, JFrog’s experts published a treasure trove of content — blogs, articles, infographics, and more — to share insights and advice with our customers and the DevOps community at large. In case you missed them — or want to re-read them — here’s a list of the most popular ones. They range from a primer on container registries to an explainer on achieving high-availability for your Maven repository.

5G and the Journey to the Edge

Recently, AT&T Cybersecuritypublished important findings in the tenth edition of their Insights report entitled, “ 5G and the Journey to the Edge.” Ivanti was thrilled to contribute to the report, which outlines the most pressing security concerns organizations face in a world embracing the revolutionary transformation to 5G and edge technology.

Icinga 2 Config Sync: Behind the Scenes

Today’s blog post dives into the internals of Icinga 2 and will give you an overview how the config synchronization works internally. We will take a small cluster as an example and follow the configuration files through the synchronization mechanism. We assume some familiarity with distributed Icinga 2 setups as this post will not go into details on how to set up an Icinga 2 cluster.