Operations | Monitoring | ITSM | DevOps | Cloud

Sins of Data Management

Every company needs data for various reasons, but hoarding too much data can be a dangerous habit. An overload of data can turn the average IT pro into a hoarder and lead them to obtain too much redundant, outdated, and trivial information, also known as ROT. The lust for big data can be tempting, but it’s also more damaging than companies may think. Five sins may be great threats to security: lust, gluttony, greed, slothfulness, and pride.

Investigating the Scene of an Incident: Using a Time-Traveling Topology to Create Escalation Graphs

Yes, time travel is possible...through data. My ability to time travel began when I started coding at age 10. Back then, all of my code ran on my own little computer. Like many ten-year-olds, I coded to create and play games. I also coded cool graphics to accompany music to impress my friends and utilities for copying. I launched my first commercial website in 1996 and made 25 guilders, which was good money for a 15-year old. Life was so easy.

Invisible Security at the Speed of Cloud

Security teams have the tough job of monitoring and securing every single workload in each cloud and for workloads in the development pipeline. Inevitably, these processes wind up being a bottleneck from the developer’s perspective, and developers get frustrated. Understandably, developers feel like security is simply making their jobs harder. But, on the other hand, security teams feel like they’re powerless to provide full coverage.

Ingesting threat data with the Threat Intel Filebeat module

The ability for security teams to integrate threat data into their operations substantially helps their organization identify potentially malicious endpoint and network events using indicators identified by other threat research teams. In this blog, we’ll cover how to ingest threat data with the Threat Intel Filebeat module. In future blog posts, we'll cover enriching threat data with the Threat ECS fieldset and operationalizing threat data with Elastic Security.

API Monitoring Best Practices

Though invisible to most users, APIs are the backbone of modern web applications. Developers love them because they facilitate complex integrations between systems and services. The business loves them because integrating disparate systems to create new products and services drives innovation and growth. The challenge with this transformative connectivity is the dependencies that exist between systems. API failure can result in performance degradation, data anomalies, or even system-wide outages.

Chapter Eight: In Which James Embarks on a Service Desk Migration to Improve Incident Management with AIOps

It’s been a month since Dinesh and I humbly high-fived leaving the meeting with Charlie and Lucia and they gave us the green light to roll Moogsoft out across the whole of C&Js and I’m feeling a little weary. Change is hard. I’ve also made it harder on myself by persuading Charlie we should also migrate our service desk solution.

How to Optimize Your Cloud Spend Using Observability

The rise of public cloud services has enabled businesses to innovate faster, scale effortlessly, and adopt more advanced technologies easier than ever before. However, there’s a dark side to using public cloud services: complexity and cost. Public cloud services can scale to handle almost any workload, but in doing so, they can quickly generate unpredictable costs for your business.

Distributed Tracing for Kafka Clients with OpenTelemetry and Splunk APM

This blog series is focused on observability into Kafka based applications. In the previous blogs, we discussed the key performance metrics to monitor different Kafka components in "Monitoring Kafka Performance with Splunk" and how to collect performance metrics using OpenTelemetry in "Collecting Kafka Performance Metrics with OpenTelemetry." In this blog, we'll cover how to enable distributed tracing for Kafka clients with OpenTelemetry and Splunk APM.

Interview With CTO & Co-founder Alexander De Ridder

For the newest instalment in our series of interviews asking leading technology specialists about their achievements in their field, we’ve welcomed the CTO & co-founder of INK, Alexander De Ridder to share his journey to launching the first AI-based web content optimization editor. Alexander is the mastermind behind the award-winning technology that's helped deliver over a million more organic visitors per month for Fortune 100 companies and freelance content creators alike.