Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

Getting Microsoft Azure Data into Splunk

If you're reading this, you're probably wondering how to get data from various Microsoft Azure services into Splunk. With the growing list of Azure services and various data access methods, it can be a little cloudy (pun intended) on what data is available and how to get all that data into Splunk. In this blog post, I'm going go over how Microsoft makes Azure data available, how to access the data, and out-of-the-box Splunk Add-Ons that can consume this data. So let's dive right in.

How to Implement Network Policy in Google GKE to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Google GKE solution to this security concern is Network Security Policy that lets developers control network access to their services. Google GKE comes configured with Network Security Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network security policy and a live demo implementing each use case.

How to deploy an app to AWS: App security

AWS security is an ongoing battle that you must address during every release, every change, and every CVE. When you’re first launching your production application, it’s impossible to check all the boxes; you simply don’t have the time. Until your application gets more adoption, you only have the time to do the bare essentials of security.

Cloud to Cloud, Easily Integrate Cloud Monitoring Tools in a Time of Remote Work

OpsRamp can ingest, process, and analyze events from third-party tools and automatically create new managed resources for alerts ingested from other monitoring tools. Automatic resource creation ensures rapid root cause analysis for third-party resources with relevant context. Application owners can also tag external resources to service maps so that they can drill-down and troubleshoot the supporting hybrid infrastructure for the associated business-critical service.

How to Implement Network Policy in Azure AKS to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Azure AKS solution to this security concern is Network Policy that lets developers control network access to their services. The Azure AKS comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

On-Demand Webinar - Modernizing Monolithic Apps with AWS & Stackery

A few weeks ago, Stackery had the pleasure of participating in a webinar with leaders from AWS and MasterStream ERP, a telecom-quoting company that has quite the architectural modernization story to tell due to their adoption of serverless with Stackery. Our very own Farrah Campbell (Ecosystems Director) sat down for a fireside chat with Santiago Cardenas (Sr.

How to Implement Network Policy in Amazon EKS to Secure Your Cluster

By default, pods are non-isolated; they accept traffic from any source. The Amazon EKS solution to this security concern is Network Policy that lets developers control network access to their services. Amazon EKS comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.

How to Deploy an Azure Kubernetes Cluster with AKS

At the end of October 2017, Microsoft announced the release of Azure Kubernetes Service (AKS), its hosted version of Kubernetes. If you’re new to AKS and curious about how to get a proof of concept (PoC) set up in your environment, read on. In this AKS tutorial, you’re going to learn, step-by-step, how to get an Azure Kubernetes cluster built with AKS.

Feature Spotlight: Explore

We’ve recently updated one of the most powerful features in Lumigo: Explore, and I wanted to tell you a bit more about it and what it can do for you. Explore is a quick and easy way to find events you are interested in your Lambda invocations. Without a feature such as Explore, you would have to sift through thousands of invocations to find what you are looking for, wasting a lot of time.

Mike Kavis: Cloud Complexity is a CIO Job Killer

Today we share a recent conversation with Mike Kavis, Chief Cloud Architect at Deloitte Consulting. Mike has held numerous technical roles such as CTO, Chief Architect, and VP positions with over 30 years of experience in software development and architecture. He led a team that built the world's first high speed transaction network in Amazon's public cloud and won the 2010 AWS Global Startup Challenge.