Operations | Monitoring | ITSM | DevOps | Cloud

Insights from the 5th annual Continuous Intelligence Report

For five years, Sumo Logic has created the Continuous Intelligence Report on the state of modern apps and DevSecOps. New to this year’s report are unique insights into how enterprises are adapting to the COVID-19 pandemic— particularly in terms of security threats. Customers use Sumo Logic to manage their production apps and services, and this report provides a reflection of overall trends in technology adoption across entire industries.

Full VPC traffic visibility with AWS Network Firewall and Sumo Logic

We’re happy to partner with AWS on their launch of AWS Network Firewall by providing a cloud-native integration that gives customers real-time visibility into network traffic and automated correlated events surfaced by AWS. Too often, virtual private cloud (VPC) traffic is a black box leaving many security operations teams unable to connect potential threats to their broader infrastructure.

How to use Lambda extensions with Sumo Logic to reduce operational overhead and improve performance

We are excited to partner with AWS to get real-time log data from AWS Lambda through the new AWS Lambda Runtime Log API and AWS Lambda Extensions. AWS Lambda Extensions enable us to more easily integrate into the AWS Lambda execution environment to control and participate in the AWS Lambda lifecycle and the AWS Lambda Logs API enables us to collect function, platform, and extension logs. Through this integration, Sumo Logic and AWS make it possible to reduce operational overhead and improve performance.

How to Monitor Akamai Logs

Some of the largest and most prominent websites, worldwide, partner with Akamai to provide their customers with a premium web experience. What benefits could Akamai offer to you and your online product offerings? In this article, we will introduce you to Akamai and the services they provide. We’ll talk about why those services are essential and how they can help you provide a better online experience for your customers. We’ll also talk about how Akamai can protect you from cyberattacks.

How to Monitor MongoDB Logs

MongoDB is a leading NoSQL database that has proven itself through time as a stable and easy-to-use system of great flexibility. There are numerous tutorials and real-world success stories that show how MongoDB has helped with supporting the database needs of certain organizations and projects. It’s fair to say that using MongoDB proves to be a solid choice for integrating with web-based applications and microservices serving as a database system or even as a monitoring aggregator itself.

How to analyze IIS logs for better monitoring

Log analysis helps organizations determine the best way to optimize application functionality while giving development teams a leg up in root cause analysis. With that said, it’s not feasible to scroll through thousands of lines of log entries in a text editor. Instead, development teams need modern tools that enable them to centralize, filter, and analyze their logs in a way that allows them to glean valuable insights in a time-efficient manner.

Building better software faster - the key to successful digital transformation

As digital transformation accelerates across all industries, it has become increasingly important for businesses to get better, much better at the development and delivery of new software to drive revenue and engage customers in new ways. Ironically, most businesses are flying blind in how they track, benchmark and optimize their software development. Teams that consistently innovate and deliver new, high quality software quickly generate significant competitive advantage for their companies.

A New Framework for Modern Security

We are in the midst of an unprecedented convergence of events that are forcing enterprises to dramatically change how they secure their modern businesses. With the acceleration of digital transformation from COVID-19, work-from-home initiatives, the continued growth of SaaS and the increasing adoption of microservices-based applications, the modern enterprise threat landscaping is transforming rapidly.

Kubernetes Security

Containers and Kubernetes have revolutionized the way many teams deploy applications. But with the many benefits that these technologies provide come new challenges. Key among those challenges is security. By adding more layers and complexity to application environments, containers and Kubernetes create new opportunities for attackers and new security threats for Kubernetes admins to address.