Enterprise Alert 2019 Update 8.5.1 released
On October 7th we released a new Enterprise Alert version, version 8.5.1. Included in this release are the following enhancements.
On October 7th we released a new Enterprise Alert version, version 8.5.1. Included in this release are the following enhancements.
In a recent post by the Splunk Threat Research team, we addressed permanent and temporary token/credential abuse in AWS and how to mitigate credential exposure. With 94% of Enterprises using a cloud service, and some using at least five different cloud platforms, it’s imperative to stay ahead of threats across multicloud environments. Let’s now turn our attention to Google Cloud Platform (GCP) and how to detect and mitigate OAuth Token Abuse.
Sharing information about the health and performance of an application is a critical part of any team’s daily workflow. That’s why we’re excited to announce the Datadog Slack App, which simplifies crucial communication tasks by deepening the integration between Datadog and Slack.
Do you want to know how to measure the full impact of third-party scripts and page contents on your website? In this article, we step you through the process as we analyze the performance impact third-party elements have on a popular content marketing site. We go beyond looking at how a single third-party supplier affects page performance and show you how to measure how the different types of third-party content affect page performance.
As time goes by, I’m looking for solutions that require as little maintenance as possible. One of those is deploying our client web app and our homepage directly on the CDN edge, with GitHub Actions. Not only we don’t need a server to host the app, but the deployment script is also serverless and maintenance-less. This allows me to focus on important tasks, knowing that deployment and serving of the app is always blazing fast.
Making sense out of logs is not an easy task. Log management solutions, such as Sematext Cloud, gather and accept data from multiple sources. Those sources can have different log events structures, providing a different granularity. They may not follow common, logging good practices and be hard to get some meaning from. Because of that, it is important that the application we develop and follow best practices. One of those is keeping meaningful log levels.
A key topic of conversation that comes up again and again with our customers is the challenge of collaboration in a remote work environment. Too many channels of communication or documentation are ineffective, and IT professionals are starting to feel fatigued by never feeling quite “in the know” with business decisions that are happening in real-time. When separated from colleagues, teams can feel distant and unmotivated or find it hard to stay focused.
Your monitoring system provides a comprehensive overview of any infrastructure. To effectively monitor your infrastructure and systems, you’ll need to get all of your data into one place - regardless if you have 1 node or 10 nodes. This centralization of data inevitably creates a vulnerable point that attackers can potentially target and exploit. In this article, we look at how to design your infrastructure in a secure way, as well as focus in on how to secure your nodes.
Helm charts are great. They combine high quality, ready-made runtime configurations for a huge number of applications with an incredible getting-started experience. There is literally no faster way to install a production-ready Grafana or Loki on Kubernetes than using helm install. Unfortunately, Helm charts can also be incredibly inflexible.