Operations | Monitoring | ITSM | DevOps | Cloud

Manage Your Splunk Infrastructure as Code Using Terraform

Splunk is happy to announce that we now have a Hashicorp verified Terraform Provider for Splunk. The provider is publicly available in the Terraform Registry and can be used by referencing it in your Terraform configuration file and simply executing terraform init. If you're new to Terraform and Providers, the latest version of Terraform is available here. You will need to download the appropriate binaries and have Terraform installed before using the provider.

Monitor Alcide kAudit logs with Datadog

Kubernetes audit logs contain detailed information about every request to the Kubernetes API server and are critical to detecting misconfigurations and vulnerabilities in your clusters. But because even a small Kubernetes environment can rapidly generate lots of audit logs, it’s very difficult to manually analyze them.

Best Planning Tools for Students

Whether you’re a freshman just getting started in student life, or a senior preparing to enter the workforce in a few months, it’s never too early to begin honing your time-management skills. Trust us, as a team who frequently hires new software developers right out of school, having a foundational understanding of project management can go a long way.

Using Machine Learning for Root Cause Analysis

From a security breach to a complete system outage, when an incident occurs and your network or service is impacted, it’s typically the result of a chain of events. A problem with one service has impacted another service, and so on until finally, you’re facing a problem that’s compromising availability and damaging your customer experience. In the event of a serious incident, your team’s immediate response is to focus on identifying the root cause and restoring service.

Find Where N+1 Database Queries Affect Your Application

One of the Scout’s key features is its ability to quickly highlight N+1 queries in your application that you might not have been aware of, and then show you the exact line of code that you need to look at in order to fix it. In this video, we will use a Ruby on Rails application as an example, but the same concepts apply to other popular web frameworks.

Is That Bot Really Googlebot? Detecting Fake Crawlers with HAProxy Enterprise

Detect and stop fake web crawlers using HAProxy Enterprise’s Verify Crawler add-on. How your website ranks on Google can have a substantial impact on the number of visitors you receive, which can ultimately make or break the success of your online business. To keep search results fresh, Google and other search engines deploy programs called web crawlers that scan and index the Internet at a regular interval, registering new and updated content.

An Introduction to Kubernetes and Its Uses

It's easy to get lost in today's continuously changing landscape of cloud native technologies. The learning curve from a beginner's perspective is quite steep, and without proper context it becomes increasingly difficult to sift through all the buzzwords. If you have been developing software, chances are you may have heard of Kubernetes by now. Before we jump into what Kubernetes is, it's essential to familiarize ourselves with containerization and how it came about.

What is Docker Monitoring?

We have come a long way in the world of computing. From having computers that fill up entire rooms or buildings while performing relatively basic actions to having complex machines that literally fit in our pockets and palms, this advancement has been nothing short of breathless. With an emphasis placed on speed and efficiency, computers and the applications running on these computers have been tailored to ensure optimal use of resources, be these resources hardware or software resources.

Three Ways Agencies Can Improve Cloud Security and Performance

The Federal Cloud Computing Strategy (FCCS) makes it clear government agencies have significant responsibilities for protecting cloud-hosted data. The FCCS states the need for agencies to develop their own governance models and create service level agreements to ensure they’ll have continuous access to log data and prompt notification from their cloud service provider if there’s a breach.