Operations | Monitoring | ITSM | DevOps | Cloud

How Does Internal Uptime Monitoring Work?

Your site or application runs on a server, which is just another computer inside some server warehouse. That server is subject to the same kinds of limitations as your personal computer, and you need a way to determine usage of those resources similar to the internal monitoring for disk space or CPU usage that you find inside a Windows or Mac operating system. These internal metrics collectively determine the power or capacity of your server.

Unveil hidden malicious processes with Falco in cloud-native environments

Detecting malicious processes is already complicated in cloud-native environments, as without the proper tools they are black boxes. It becomes even more complicated if those malicious processes are hidden. A malware using open source tools to evade detection has been reported. The open source project used by the malware is libprocesshider, a tool created by Sysdig’s former chief architect Gianluca.

Web Assembly Deep Dive - How it Works, And Is It The Future?

You’ve most likely heard of Web Assembly. Maybe you’ve heard about how game-changing of a technology it is, and maybe you’ve heard about how it’s going to change the web. Is it true? The answer to this question is not as simple as a yes or no, but we can definitely tell a lot as it’s been around for a while now. Since November 2017, Web Assembly has been supported in all major browsers, and even mobile web browsers for iOS and Android.

Why You Need to Closely Monitor Your Exchange Servers

Monitoring your on-prem and hybrid cloud infrastructure has always been important. With an ever-growing rise in cyber attacks, zero-day exploits, and insider threats, keeping track of your infrastructure has a renewed level of significance. Microsoft Exchange is one of the most prominent enterprise systems in use today, with both cloud and on-prem iterations.

Bits of Security, Snyk.io: Stranger Danger: Finding Security Vulnerabilities Before They Find You!

Open source modules on the NPM ecosystem are undoubtedly awesome. However, they also represent an undeniable and massive risk, since you’re introducing someone else’s code into your system, often with little or no scrutiny. The wrong package can introduce critical vulnerabilities into your application, exposing your application and your user's data. This talk will use a sample application, Goof, which uses various vulnerable dependencies, which we will exploit as an attacker would. For each issue, we'll explain why it happened, show its impact, and—most importantly—learn how to avoid or fix it.

Bits of Security, PedidosYa: Fraud Detection using Datadog and Sherlock

From day one, most organizations,especially the big ones, are targeted with a broad range of attacks. These range from information exfiltration attempts to fraud. Although a great majority of them can be addressed with the help of a Web Application Firewall, there are some that require more extensive tooling. Join me as I show you how we use Sherlock and Datadog to block 30,000+ fraudulent users per week in seconds. We will also discuss other applications and how you can implement similar solutions.

Multi-instance GPU (MIG) with MicroK8s on NVIDIA A100 GPU

Although Kubernetes revolutionised the software life cycle, its steep learning curve still discourages many users from adopting it. MicroK8s is a production-grade, low-touch Kubernetes that abstracts the complexity and can address use cases from workstations to clouds to the edge. We’ll highlight the details of MicroK8s’ simplicity and robustness and demonstrate the different usage scenarios, running it on NVIDIA DGX, EGX, DPU and Jetson hardware using real applications from NVIDIA marketplace.

Kubernetes Master Class - How to Update Monitoring After Upgrading to Rancher 2.5

Rancher 2.5 introduces a new, improved monitoring integration. It is still based on Prometheus, Grafana and Alertmanager, but much more flexible regarding configuration options and customizations. It also directly ships with much improved dashboards and alerting rules. Unfortunately, due to the necessary internal changes, there is no automatic upgrade path available from the old to the new monitoring. While you can continue to use the old monitoring with 2.5, there are some manual migration steps necessary to get all the benefits from the new monitoring system and keep all the configurations and customizations from the old one.

The More You Monitor - What is AIOps?

You might know AIOps as just another buzzword that been getting thrown around almost as much as 'cloud' and 'digital transformation', but do you really know what AIOps is and how it uses AI and machine learning to unlock a whole new realm of possibilities and efficiencies? In this episode of The More You Monitor Lead Sales Engineer, Donde Aponte, walks you through what AIOps and Observability truly means and how this new approach to IT operations can save IT and DevOps teams tons of time and stress by dramatically shortening MTTR and reducing the number outages and slowdowns.