Operations | Monitoring | ITSM | DevOps | Cloud

Hacking the Cloud and Things to Watch Out for - Civo.com

Why should we be discussing cloud security in terms of internal infrastructure? This is exactly what Gillian Vanhauwaert from Defense.com spoke about in the final talk of the evening, as she outlined how aspects such as vendor lock-in, external facing, and phishing can impact your journey into the cloud.

Reference Architecture Series: Scaling Syslog

Join Ed Bailey and Ahmed Kira as they go into more detail about the Cribl Stream Reference Architecture, with a focus on scaling syslog. In this live stream discussion, Ed and Ahmed will explain guidelines for how to handle high volume UDP and TCP syslog traffic. They will also share different use cases and talk about the pros and cons for using different approaches to solve this common and often painful challenge.

See How Coveo Engineers Reduced User Latency

Many teams are wasting far too much time and energy searching through massive amounts of log data trying to find answers to user latency issues. Metrics data doesn’t help either as it only tells you that there is a problem, not where to fix it. This is why Coveo turned to observability. Through implementing observability with Honeycomb, Coveo was able to reduce their user latency by 50 percent.

Join Jeli and Honeycomb for an Incident Response and Analysis Discussion

Solutions Engineers Vanessa Huerta Granda and Emily Ruppe from Jeli, along with Honeycomb’s Field CTO Liz Fong-Jones and SRE Fred Hebert discuss some of our more interesting recent incidents and how we use Honeycomb and Jeli together for incident response.

Learn How SumUp Implemented SLOs to Mitigate User Outages and Reduce Customer Churn

Blake Irvin and Matouš Dzivjak from SumUp’s Software Engineering team, Honeycomb Solution Architect Michael Sickles and Account Executive Nathan Leary, discuss how SumUp incorporated observability, specifically, SLOs, to identify and resolve issues before they grew into customer-noticeable problems.

Surface and Confirm Buggy Patterns in Your Logs Without Slow Search

Debugging with logs in distributed systems can be a pain. It’s tough to search raw data looking for a pattern, relating potential causes with other logs, and checking trace and metrics data for more confirmation. Is finding one pattern enough? What if there are other problems? Who knows how many colliding factors are relevant? At Honeycomb, we’re flipping the script on the log search problem. Hear our resident experts, (former Splunk Ninja) Michael Wilde and Andy Dufour, discuss how Honeycomb customers have technically evolved their log analysis process to achieve fast pattern detection, skipping the search grep/search loop entirely.

Amazon and Atlassian layoffs, Curl is 25 and more news

Amazon lays off 9,000 more workers, and that's just scratching the surface of recent job cuts. Back in 2008, Atlassian bucked trends and increased hiring when everyone else was firing. This time, they cut 5 percent of their workforce. Is Amazon using return to office mandates as a way to cut jobs? On a lighter note, Happy 25th Anniversary to command line tool, Curl!

Security and real-time Linux in a shifting automotive world

Software is completely changing the automotive industry - from vehicle design to use and maintenance. The whole lifecycle now relies on software and vehicles resembling “computers on wheels”. But vehicles aren’t regular devices like smartphones. They move humans at hundreds of kilometers per hour and need to be safe and secure at all times. When there is software involved, there are always security vulnerabilities. No cybersecurity expert can say the opposite. How can the automotive industry navigate the shift towards software-defined vehicles while ensuring the best level of security?