Operations | Monitoring | ITSM | DevOps | Cloud

Cybersecurity defenses for IIoT

Cybersecurity attacks on industrial IoT solutions can have detrimental consequences. This is the case because IoT devices record privacy-sensitive data and control production assets. Therefore, demonstrable trustworthiness is prerequisite to IoT adoption in industrial settings. Fortunately, IT security is a mature field. Experts have identified classes of threats devices may be subject to. Let’s discuss these threat patterns and mitigation strategies in the IIoT context.

Distribute ROS 2 across machines with MicroK8s

Our simple ROS 2 talker and listener setup runs well on a single Kubernetes node, now let’s distribute it out across multiple computers. This article builds upon our simple ROS 2 talker / listener setup by running it on multiple K8s nodes. At the completion of this setup expect to have a ROS2 Kubernetes cluster running MicroK8s on three different machines. Applying a single configuration file distributes the ROS 2 workload across the machines.

Announcing LogDNA Agent v2.2 Beta

We’re excited to announce the public beta release of our latest Agent v2, which includes two major feature improvements for our Kubernetes® customers. First, Agent v2.2 now supports Kubernetes event logs that enable more seamless Kubernetes deployment troubleshooting. In addition, we now support running Agent v2 as a non-root user, making Agent v2 the most secure Kubernetes agent on the market.

The Ultimate Guide to Web Hosting for SEO

If you're looking to start a website, the first thing you'll need to do is choose a web hosting service. But all web hosts are not created equal, and the abundance of choice often paralyzes newcomers to the online space. How do you know which hosting service to choose? This article will explore the relationship between web hosting and search engine optimization (SEO) and how you can choose the most SEO-friendly host.

ServiceNow's own story: Leaving no customer behind

In this new series of Now on Now stories, we share how we use ServiceNow products internally to transform our operations and create great experiences. We hope our stories will inspire you--our customers and partners--to achieve even greater business value and resiliency through the Now Platform®. For more information, visit the Customer Workflows Book of Knowledge.

Achieve Better Observability into AWS Services with the AWS CloudWatch Monitoring Template

Amazon CloudWatch — Amazon’s built-in infrastructure monitoring tool — monitors your Amazon Web Services (AWS) resources and the applications you run on AWS in real time. Here’s what you can do with this tool and how to access AWS CloudWatch monitoring dashboards.

Get The Most Out of Splunk Infrastructure Monitoring and Splunk ITSI

SignalFx was founded in 2013 to enable customers to gather and monitor key information for both their application code and infrastructure. The efficient metrics storage technology enables both high cardinality of metrics as well as the no-sample method of gathering every APM trace. This combination of efficiency and standardization is exposed through the SignalFlow language to allow access and manipulation of the vast amount of metric data.

Why every IT admin needs a hardware monitor, and what it can do for your organization's business continuity

The ITIC 2020 Global Server Hardware, Server OS Reliability Report released in April found that reliability declined in 67 percent of servers over four years old when corporations failed to retrofit or upgrade the hardware to accommodate increased workloads. This highlights the pressing need for hardware monitor solutions and the need for immediate alerting mechanisms to ensure the longest possible lifespan for hardware.

Automating Monitoring & Alerting Infrastructure with Terraform

At iLert we embrace infrastructure as code and try to automate our processes whereever possible. This might reach from niftly little bash scripts to fully blown Terraform projects that spin up whole environments with as little as terraform apply on a CLI. With Hashicorp’s Terraform you can make use of infrastructure as code to provision and manage any cloud, infrastructure, or service.

Sysdig extends image scanning to Google Cloud's Artifact Registry

In support of modern application development built on CI/CD, containers and open source, Google Cloud launched Artifact Registry (now generally available), a new artifact management solution. Sysdig helps DevOps teams using Artifact Registry confidently secure the build pipeline with comprehensive image scanning that identifies container vulnerabilities and misconfigurations to reduce risk.