Operations | Monitoring | ITSM | DevOps | Cloud

The importance of Cloud monitoring: AWS

In previous articles we talked about the need to move forward to cloud technology, as well as about the incorporation of the monitoring of this technology, describing this need with Microsoft Azure tool. Now we are going to describe the Amazon AWS tool, its differences regarding Microsoft Azure and we will delve into monitoring AWS with Pandora FMS.

Elastic Stack Monitoring with Elastic Cloud on Kubernetes

Elastic Cloud on Kubernetes (ECK) is the official operator for provisioning Elastic Stack deployments in Kubernetes. It orchestrates not only day-one provisioning, but also has the processes and best practices for day-two management and maintenance baked in. If you want to run your own Elastic Stack deployment on Kubernetes, then look no further than ECK!

5 Tips For Better On-Call Support (in 2020)

Your enterprise needs on-call support, but it often struggles to achieve its desired results. Yet, the longer your enterprise waits to improve its on-call support processes and procedures, the greater the risk becomes that a minor outage could cause substantial downtime. Bonus Material: Advanced Escalation Example PDF Ultimately, your enterprise needs seamless on-call support processes and procedures.

Restore authority with Token Bandwidth Controls!

Now you can go beyond measuring your bandwidth usage and regain control via Cloudsmith's new bandwidth controls for Entitlement tokens. You can craft tokens with individual usage limits using the UI, API, and CLI, allowing you to decide the exact level of usage for each token. Combining the new and existing limits for entitlement tokens, allowances are configurable to provide fine-grained control for any combination of properties.

Email Security Risks: Why You Need a Cyber Security Plan

Even though technology has advanced significantly over the past few decades, hackers and cybercriminals still target large volumes of email messages daily. Some of the biggest types of things that get sent through email include malware, ransomware, trojans, and viruses. These things are often disguised in some sort of “friendly” email message, an embedded link, or a cute kitten meme.

InfluxDB 2.0 Release Candidate Now Available

Today we announce InfluxDB 2.0 Open Source’s first official release candidate (RC). This represents a final version of the software as we move towards general availability. We appreciate all the feedback from our users over the last few years and realize that getting to this stage has taken longer than any of us predicted.