Operations | Monitoring | ITSM | DevOps | Cloud

logz.io

Deploying the ELK Stack on Kubernetes with Helm

ELK and Kubernetes are used in the same sentence usually in the context of describing a monitoring stack. ELK integrates natively with Kubernetes and is a popular open-source solution for collecting, storing and analyzing Kubernetes telemetry data. However, ELK and Kubernetes are increasingly being used in another context — that of a method for deploying and managing the former.

Kubernetes Phase 2-Key Challenges at Scale

Kubernetes is THE buzzword these days. Almost every IT organization is currently using it or is in the process of implementing it as part of their infrastructure. The transition to Kubernetes is complicated, whether a company is using an on-premises, cloud, hybrid, or managed solution, and it usually involves other changes in the codebase, such as shifting to a microservices architecture. While the implementation phase is led by the DevOps team, it requires the participation of the whole R&D group.

How to Secure a Kubernetes Cluster

Kubernetes is one of the most advanced orchestration tools that currently exists in the software world. It provides out-of-the-box automation for environment maintenance and simplifies deployment and upgrade processes. It has different implementation types (on-premise, cloud-managed, hybrid, and more), multiple open-source supporting tools, and supports a wide range of configuration options.

Monitoring and incident management: a winning combination

Monitoring systems gather and log a wide range of performance data on a diverse range of targets—from applications to user experience, networks, servers, and more. Usually, monitoring is conducted under runtime conditions, but synthetic monitoring can also be used to simulate loads and test the resilience of web services, for example.

How Kenshoo Streamlined Development by Creating an Intellij Plugin for Log-based Alerting within Logz.io

Complex problems can often be solved with simple, practical solutions. That’s what our team at Kenshoo discovered when we realized that we needed a way to easily and proactively track specific log messages which indicate mission-critical events.

Securing Secrets With HashiCorp Vault and Logz.io Security Analytics

Secrets, i.e. passwords, API keys, certificates, and any other type of credential used for digital authentication, have exploded in number and type. Even small-sized organizations might have thousands of SSH keys for example. Secrets are also a common security weakness often exploited by attackers.

Key Trends in Logging Workflows

Logs have been around since the advent of computers and have probably not changed all too much since. What has changed, however, are the applications and systems generating them. Modern architectures — i.e. software and the infrastructure they are deployed on, have undergone vast changes over the past decade or so with the move to cloud computing and distributed environments.

How to Choose Your Cloud Provider

With the emergence of Amazon Web Services (AWS) in 2002, the Infrastructure as a Service (IaaS) model kickstarted the public cloud revolution that has permanently changed how IT services are deployed and delivered. According to Gartner’s July 2019 Magic Quadrant for Cloud Infrastructure as a Service report, the annual cloud IaaS market is currently worth $41.4 billion and is expected to grow to $81.5 billion by 2022.