Operations | Monitoring | ITSM | DevOps | Cloud

Log Analysis: What Is It and How Does It Work?

If you work in Information Technology, you have doubtless encountered logs- in fact depending on your area of expertise, you may be inundated with them on a daily basis. Nearly every piece of digital technology produces some kind of log, from complex web applications to the drivers that power your mouse and keyboard. As such, the definition of what a “log” actually is, is necessarily loose; any output received from a piece of software could be considered a log.

Image scanning for Google Cloud Build

In this article, you will learn how to add inline image scanning to a Google Cloud Build pipeline using the Sysdig Secure DevOps platform. We will show you how to create a basic workflow to build your container image, scan the image, and push it to a registry. We will also customize scanning policies to stop the build if a high-risk vulnerability is detected.

Kibana Visualization How-to's: Heatmaps

In Kibana you have a full selection of graphical representations for your data, most of the time this can be a simple line or bar charts to do what you need to do. But every so often you need to take a different view to get the most out of your data. Heatmaps are a critical component of the Kibana visualization arsenal, and deserve their own attention.

Redirect HTTP to HTTPS with HAProxy

Use the HAProxy load balancer to redirect users from HTTP to HTTPS automatically. For decades, our lives have become increasingly dependent on sending and receiving data from across the Internet. Now, with more people working, studying, and hanging with friends remotely, that trend is showing an uptick. Yet, adversaries seem to be grasping at that communication from every direction.

AWS Elasticsearch Pricing: Getting Cost Effective Logging as You Scale

AWS Elasticsearch is a common provider of managed ELK clusters., but does the AWS Elasticsearch pricing really scale? It offers a halfway solution for building it yourself and SaaS. For this, you would expect to see lower costs than a full-blown SaaS solution, however, the story is more complex than that.

Calico and K8s Network Policies - An Overview and Comparison

In an age where attackers are becoming more and more sophisticated, network security as a line of defense is more important than ever. Network Policy is the primary tool for securing a Kubernetes network. It allows you to easily restrict the network traffic in your cluster so only the traffic that you want to flow is allowed. In this training session, we will go over the core concepts in Kubernetes Network Policies and Calico Network Policies. Compare and contrast between the two models, and highlight when to use one versus the other.

Getting Started with Continuous Integration

It is impossible to overestimate the importance of a strong development environment when scaling your team’s capacity. Nowadays, most organizations use Git, and one of the popular and successful development models used by many organizations is Gitflow. When making use of such models, continuous integration (CI) is key as it enables faster project delivery and offers reduced risk and expenses thanks to self-managed and easy-to-control dedicated teams.

Effective Alerting for a Server Monitoring

Every minute of server downtime can cost you serious revenue. 98% of organizations revealed that a single hour of downtime costs them over $100,000. The good news is that you can effectively prevent such losses with server monitoring software. Being a critical piece of your technical infrastructure, servers must be continuously tracked for their performance, and health. Efficient server monitoring lets you resolve issues before they become too critical.

Continuous Deployment explained in code

Don Brown, CTO/Co-founder of Sleuth and ex-Atlassian Architect, shows what Continuous Deployment is and how to we use it to build and deploy Sleuth, itself a deployment tracker. It steps through the CircleCI and Fabric configuration files and code that takes each commit to master and puts them through staging and production environments automatically.