Operations | Monitoring | ITSM | DevOps | Cloud

Why should you use Elasticsearch on your website?

In this post we’re covering a range of the best reasons why you should consider using Elasticsearch for your business or website. We’ve brought together some of our favourite experts working in eCommerce and Technology to let us know why they love using Elasticsearch for their projects & why they would recommend this powerful search engine. Two of the biggest reasons for using Elasticsearch were detailed by Usama Raudo, Marketing Strategist at Within The Flow.

Better than what? Why data center baselines matter in cloud migrations.

For most organizations, the cloud is a promise for better outcomes. Let’s be honest, why would you go through all that effort otherwise? This is especially true for all those applications and workloads that are currently running in data center environments but need to be moved to the cloud to support digital transformation efforts.

Games are in our DNA

At Cloudsmith we love playing video games, everything from Super Meat Boy to Halo, Fortnite to Candy Crush. We’ve got a big Pac Man money box sitting on the office shelf. Steve Collins, of Havok fame, is on our Board of Directors. Quite simply, gaming is in our DNA. When we started Cloudsmith we made a list of customers we’d love to work with someday and there were numerous games studios on the list.

FaaS Vs. Serverless: Resolving the Dilemma

In the vast ever-changing world of technology, Serverless and Faas are the two new categories of cloud computing services. Both FaaS and Serverless have helped organizations in saving money, refocusing developers’ time, relegating infrastructure management, and harnessing cloud technology. However, while both are treated as the same, there is a slight difference. Through this post, we will shed light on the similarities and differences between FaaS vs.

How Kubernetes is transforming the industrial edge

According to leading independent researchers teknowlogy | PAC, open source platforms – and Kubernetes in particular – are central to the future of digital factories. The PAC RADAR report offers a detailed market analysis of industrial digitalisation trends, and it predicts that Kubernetes-based platforms that bring together edge and cloud technologies will soon dominate the digital factory landscape.

Elasticsearch Hadoop Tutorial with Hands-on Examples

In this lesson, we’ll learn how we can use Elasticsearch Hadoop to process very large amounts of data. For our exercise, we’ll use a simple Apache access log to represent our “big data”. We’ll learn how to write a MapReduce job to ingest the file with Hadoop and index it into Elasticsearch.

Prometheus Federation with Thanos: How does Thanos Work?

Prometheus is the cornerstone of many monitoring solutions, and sooner or later, prometheus federation will appear on your radar. A well monitored application with flexible logging frameworks can pay enormous dividends over a long period of sustained growth. However, once you begin to scale your prometheus stack, it becomes difficult to keep up with your application’s demands. Prometheus is an extremely popular choice when it comes down to collecting and querying real-time metrics.

SIEM Tutorial: What should a good SIEM Provider do for you?

Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together for a comprehensive view of IT security. This can be tricky, so we’ve put together a simple SIEM tutorial to help you understand what a great SIEM provider will do for you. A SIEM’s responsibility is to collect, store, analyze, investigate and report on log and other data for incident response, forensics and regulatory compliance purposes.

Are your customers catching production problems before you do?

Availability and quality are the biggest differentiators when people opt for a service or product today. You should be aware of the impact of your customers alerting you to your own problems, as well as how to stop this from becoming the norm. To make sure you don’t become an organization known for its bugs, understanding the organizational changes required to deliver a stable service is key.

Detecting Ryuk Using Splunk Attack Range

Cybersecurity Infrastructure Security Agency (CISA) released Alert (AA20-302A) on October 28th called “Ransomware Activity Targeting the Healthcare and Public Health Sector.” This alert details TTPs associated with ongoing and possible imminent attacks against the Healthcare sector, and is a joint advisory in coordination with other U.S. Government agencies.