Operations | Monitoring | ITSM | DevOps | Cloud

Validating Elastic Common Schema (ECS) fields using Elastic Security detection rules

The Elastic Common Schema (ECS) provides an open, consistent model for structuring your data in the Elastic Stack. By normalizing data to a single common model, you can uniformly examine your data using interactive search, visualizations, and automated analysis. Elastic provides hundreds of integrations that are ECS-compliant out of the box, but ECS also allows you to normalize custom data sources. Normalizing a custom source can be an iterative and sometimes time-intensive process.

Pingdom Powered Status Page

Pingdom is one of the most used website monitoring tools, with almost 15 years in the business. It excels at providing simple and reliable synthetics as well as real user monitoring. This monitoring tool provides a simple public status page, but as you might have noticed it’s quite limited. It only serves as a display of your uptime and response time history, not much more than that.

Shifting Complexities in DevOps

In this episode of ShipTalk, Jim Shilts, Developer Advocate at Shipa and the Founder and President of North American DevOps Group (NADOG), chats with Ravi Lachhman, Evangelist at Harness on the “Shifting Complexities in DevOps.” Jim has been working on solving engineering efficiency problems for over 20 years, working at firms such as Build Forge and Electric Cloud, pre-dating the inception of Hudson/Jenkins.

Improve Business KPIs with Splunk APM Business Workflows

One of the biggest challenges that DevOps teams face is how to connect their efforts with the priorities of business leaders. In conversations we’ve had, developers and SREs discussed how they need to show business and engineering leaders that they are investing their time solving the right problems, and how solving these problems lead to overall better business outcomes.

Enough! 4 Work From Home Solutions to Heal IT's Pain

Let’s face it: when it comes to managing a work-from-home setup, IT has a lot of problems they don’t know how to solve. It’s not for lack of effort – there just don’t seem to be many practical solutions out there that can alleviate their new remote work-induced headaches. It was tough enough getting everyone up and running in home offices. Now, IT is all but drowning in tickets (a majority of tech leaders have reported ticketing increases up to 50%).

Website downtime: 4 more major websites that have gone down in the last month

Website down. Two words that cause panic in website owners far and wide, especially if they have thousands, if not millions of people, using their website on a daily basis. But it’s not as rare as most people think, even the biggest of companies find themselves in the deep depths of website downtime hell. The impact? Loss of revenue for starters, followed up by your competitors who are online getting your customers’ attention, bad SEO rankings, and lack of customer satisfaction.

What You Need to Know About Server Security in 2021

How often do you check your event log monitor for potential security breaches? Did you know that many potential security breaches, events, and other problems are logged to event logs? Unfortunately, even the most skilled IT professionals have a hard time making sense of what to watch for that could indicate security issues or even a potential breach until it is too late. Event logs contain a ton of information that can be useful.

How to Prevent Website Defacement

We have identified what website defacement is. We can all agree that it has the potential to have long-lasting effects on your brand image, if not prevented. Your website can be left inaccessible, and a security breach can make you lose trust among customers who entrusted you with their data. It can also impact search engine rankings and traffic.

Ransomware in 2021: What has changed? Detection and mitigation strategy

A ransomware attack is a bug that we can’t shake off. Or perhaps, it can even be called a shape-shifter that somehow finds a way into networks, no matter how many armed sentries you’ve deployed in and around your perimeter. The line between ransomware and a data breach is slowly fading. Threat actors prefer ransomware over other modes of attack because they work.