Operations | Monitoring | ITSM | DevOps | Cloud

Cherwell Monitoring in Production

I have been working on a couple of monitoring ideas for Cherwell. I didn’t see anything with a quick online search, and I enjoy authoring MPs to monitor applications, it is the closest I’ll get to 007. I’ve hit a major hurdle and I need to ask for a hand from the community. We have a lab environment that’s worked great while developing the Cherwell integration for Connection Center, however, it is not a good simulation for an actual deployment.

Elasticsearch Text Analysis: How to Use Analyzers and Normalizers

Elasticsearch is a distributed search and analytics engine used for real-time data processing of several different data types. Elasticsearch has built-in processing for numerical, geospatial, and structured text values. Unstructured text values have some built-in analytics capabilities, but custom text fields generally require custom analysis. Built-in text analysis uses analyzers provided by Elasticsearch, but customization is also possible.

Monitoring UV sensors on the International Space Station with Grafana

In space, there’s no atmosphere to protect against the sun’s ultraviolet radiation. Astronauts in orbit are exposed to the equivalent of eight X-rays a day, and the space stations and suits that protect them degrade over time due to radiation and other factors. Scientists working on the International Space Station (ISS) want to know more about ultraviolet (UV) radiation in orbit so they can design better materials.

Correlate CrowdStrike Data with Logz.io Cloud SIEM

Crowdstrike is an innovator in the endpoint protection market with innovative approaches for the last decade. They specialize in depth of data collection and have uncovered many forensic mysteries in security over the last 10 years. We have many mutual customers with CrowdStrike, which is why we began working with them on a solution to analyze and correlate their data within Logz.io.

Kaseya VSA Cyberattack: A Statement on Solidarity from N-able CSO Dave MacKinnon

The recent Kaseya VSA cyberattack is an important reminder of how security works best when we approach it as a community. The adversarial pivot to supply chain-based attacks for delivering ransomware underscore the role we all must play in helping to keep each other protected.

How to Monitor Logs Guide With Recommended Automated Tools

Log monitoring is a practice used by IT administrators to organize, analyze, and understand a network’s performance. All network devices, including applications and hardware, create logs as they perform operations. Logs are like a device’s diary—they record every event and its critical information like user IP address, date and time, request time, and more.

A Look at Today-The "New Normal"

We’ve reviewed the year that was, how business big and small had to fast forward their digital transformation to accommodate remote work and keep their businesses in business. Some IT leaders have said because of the pandemic, they were able to expedite digitalization and digital transformation within their organizations. Efforts previously envisioned to take months or years were moved forward and achieved in a matter of weeks.

Elastic Security prevents 100% of REvil ransomware samples

Users of Elastic Security are protected through numerous layers of protections against the REvil ransomware that affected Kaseya VSA and its customers. Elastic Security’s layered protections prevented 100% of the REvil ransomware samples tested before damage and loss could occur to the business. We believe that detections and preventions must be layered, as no single protection works 100% of the time.