Operations | Monitoring | ITSM | DevOps | Cloud

What are logs and why monitor them?

What are logs? In computing, when generally speaking of “log”, we refer to information belonging to a more or less low level reported by the operating system or a specific application that helps identify what is being done, including errors, problems or minor warnings, and when that happens, it indicates the date and time. In some cases, the source, the user, the IP address and other interesting fields from the point of view of what has happened can be identified.

Elastic on Elastic: How InfoSec deploys infrastructure and stays up-to-date with ECK

This post is part of a blog series highlighting how we embrace the solutions and features of the Elastic Stack to support our business and drive customer success. The Elastic InfoSec Security Engineering team is responsible for deploying and managing InfoSec's infrastructure and tools. At Elastic, speed, scale, and relevance is our DNA and leveraging the power of the Elastic Stack is the heart of InfoSec.

10 Tips for Handling a Major Outage (When Your Website Is Down on Black Friday)

If your e-commerce website is down< due to a Black Friday major outage/b>, are you prepared to handle it? Customers demand exceptional digital retail experiences on Black Friday, Cyber Monday, and throughout the holidays. If your company can manage issues that can cause an e-commerce outage, it can limit their impact now and in the future. Ultimately, we want to help your team handle major incidents.

6 quick ways to cut cost on your Lambdas

We’ve talked about how serverless architecture is a great option for companies that are looking to optimize costs. Just like with all app building and developments, monitoring the performance of your implementation is crucial and we, the folks at Dashbird, understand this need all too well – this is why we’ve spent the better part of the past year and a half to create a monitoring and observability solution for AWS Lambda and other Serverless services.

How to Monitor Amazon Redshift

Amazon Redshift is a cloud-based data warehousing solution that makes it easy to collect and analyze large quantities of data within the cloud. Cloud data warehouse services like Redshift can remove some of the performance and availability pain-points associated with on-premises data warehousing, but they are not a silver bullet. Getting the most out of Redshift requires carefully monitoring Redshift clusters in order to identify stability issues and performance bottlenecks.

The State of Robotics - November 2020

Goodbye Thanksgiving (well, for some of us), hello Christmas! The holiday season really is the best, and it always brings interesting robotics news, which we will now distill into a quick dose of delightful and easily-digestible tidbits. As always, if you’d like to see your work showcased here, please send an email to robotics.community@canonical.com, and we’ll feature it in next month’s blog.

Empowering Remote Users

2020 has certainly presented all of us with its fair share of challenges. Small businesses and large organizations alike have been forced to change policies and procedures to adapt to the concept of ‘the remote worker’. As more and more employees are working from home, it is critical that they are set up for success and armed with the tools to address issues that arise, no matter where they are located.

How to Ensure Your Website is Secure and Trustworthy

How is your website showing your customers that you care? You are selling a great product and making some good money, but what are you doing in return to assure your customers that all their payment and private data is protected? If you haven't thought about that before, now is the time because a significant data breach could mean the end of your company.

Galileo Enhancements: Spectrum Protect Logs and Summary Data

Anyone who has ever had to administer IBM Spectrum Protect™ (formerly Tivoli Storage Manager or TSM) knows that eventually, you’ll end up parsing the activity log for advanced problem determination or running advanced queries on the summary table for extended reporting. This is a huge pain! With the latest enhancements to Galileo for Spectrum Protect, you need not go elsewhere for answers.

Monitoring Endpoint Security States with InfluxDB

Several factors in recent years have increased endpoint vulnerability — from organizations’ need to make access to data more fluid, to threats targeting mobile device access and networks, to the growing work-from-home and work-on-the-go trends. Endpoints connected to a network — including remote devices, IoT devices, workstations, tablets, laptops and servers — create attack paths for security threats.