Operations | Monitoring | ITSM | DevOps | Cloud

Analytics

Logging Your Cloud Foundry Apps to LogDNA

Cloud Foundry Application Runtime is an open source platform as a service (PaaS) for running applications and services. Frequently called simply “Cloud Foundry,” the Cloud Foundry Application Runtime (CFAR) is one of many interoperable projects within the Cloud Foundry family. For the purposes of this post, “Cloud Foundry” refers to the Application Runtime.

Docker Container Monitoring with Sematext

Everyone’s infrastructure is growing – today mostly in the container space. As we learned in Part 1 of this series – Docker Container Monitoring and Management Challenges, monitoring for containers is different from traditional server monitoring. In Part 2 we had a glance at key container metrics and in Part 3 we compared several open source tools for container monitoring.

Monitoring AWS EC2 with Metricbeat, the ELK Stack and Logz.io

Amazon EC2 is the cornerstone for any Amazon-based cloud deployment. Enabling you to provision and scale compute resources with different memory, CPU, networking and storage capacity in multiple regions all around the world, EC2 is by far Amazon’s most popular and widely used service.

Data Lake. What are we talking about?

Data! More data! What is Data Lake? Big Data is not only a more or less fashionable marketing “word”, but also contains a quite clear concept: the accumulation and processing of enormous amounts of data in order to take advantage of the knowledge they may contain. So far so good: it’s easy to describe (not so easy to do, though).

Everything You Need to Know About the OSS Licensing War, Part 2.

Where we left off: AWS had taken the Elasticsearch software and launched their own cloud offering in 2015, and Elastic N.V. had doubled down on an “open core strategy.” Once AWS decides to offer a project like Elasticsearch, it immediately becomes a truly formidable competitor to anyone trying to do the same, even the company behind the software itself. AWS has huge scale, operational expertise, and various network effects that really compound.

Zero Trust Security: Supporting a CARTA approach with Anomaly Detection

Learn how Anomaly Detection supports, what Gartner has termed, a continuous adaptive risk and trust assessment (CARTA) when building a CaaS platform using Kubernetes. Anomaly Detection expands the zero trust network security model and continuously assess the application and network risk that enables adaptive policy adjustments.