Operations | Monitoring | ITSM | DevOps | Cloud

Don't Let Security Go Up, Up and Away (in the Clouds), Start with Data

Security teams can’t defend what they can’t see. As organizations move more workloads to the cloud, security teams need added visibility into these new workloads or risk having blind spots that lead to compromise. In the first installment of our "Getting Data In" webinar series, "Modernizing your SOC for the Cloud Age Starts with Security Foundations," we demonstrate how to quickly and easily onboard data into Splunk Cloud.

4 ways to save on IT costs in the asset life cycle [Part 3: Maintenance and support]

We’re back with part three of our four-part series on cutting down IT costs during the asset life cycle. In the last blog, we discussed ways to save in the asset deployment stage. In this part, we’ll look at maintenance and support, and examine ways to save during this stage of the asset life cycle. When it comes to IT technicians, time is money. On any given day, an organization can have thousands of assets in play.

Demystifying Open-Source Orchestration of Unikernels With Unik

As the cloud-native ecosystem continues to evolve, many alternative solutions are popping-up, that challenges the status quo of application deployment methodologies. One of these solutions that is quickly gaining traction is Unikernels, which are executable images that can run natively on a hypervisor without the need for a separate operating system.

[KubeCon + CloudNativeCon EU recap] Better histograms for Prometheus

It’s only four months ago that I blogged about histograms in Prometheus. Back then, I teased my talk planned for (virtual) KubeCon Europe 2020. On Aug. 20, the talk finally happened. It completed the trilogy of histogram talks also mentioned in my previous blog post. Here is the recommended viewing order.

Five things to Log in your CI Pipeline: Continuous Delivery

Logs in continuous delivery pipelines are often entirely ignored, right up until something goes wrong. We usually find ourselves wishing we’d put some thought into our logs, once we’re in the midst of trawling through thousands of lines. In order to try to prevent this, we can add DevOps metrics into our logs, which will provide us with greater observability, and give insight into anything going wrong in our pipelines.

Upgrade a K3s Kubernetes Cluster with System Upgrade Controller

Kubernetes upgrades are always a tough undertaking when your clusters are running smoothly. Upgrades are necessary as every three months, Kubernetes releases a new version. If you do not upgrade your Kubernetes clusters, within a year, you can fall far behind. Rancher has always focused on solving problems, and they are at it again with a new open source project called System Upgrade Controller. In this tutorial, we will see how to upgrade a K3s Kubernetes cluster using System Upgrade Controller.

Privacy and Ethical Web Analytics

Web analytics is often based on invasively collecting and aggregating user data. But web analytics doesn’t have to be an invasion of privacy. A growing movement of businesses, including performance monitoring services like Request Metrics, are working to create sustainable web analytics tools. Tools that give web developers the metrics they need to improve their websites without compromising the privacy of our users.

Set Up Your Deployment Pipeline Like a Rockstar!

Nowadays, software development teams utilize continuous delivery or some variation, to create better, faster, more accurate software releases. Continuous delivery is a DevOps practice that empowers software teams to continuously ship code directly to an environment once automated tests pass. Continuous delivery is facilitated through the deployment pipeline. You can read more about it in a previous post.

Beyond the EHR: 3 Other Places Healthcare Organizations Need to Watch to Ensure HIPAA Compliance

With the state of the world today, healthcare facilities of all kinds and sizes are operating under a state of distress. Employees are working on the frontlines, while also having to manage low budgets for IT security, coupled with low resources and all the while having to manage legal and compliance issues on top of it. Sometimes there’s so much emphasis put on the primary platform where patient health information (PHI) resides, other parts of the network are overlooked to determine compliance.

Marathon Oil Boosts Its ITSM and Asset Management Capabilities Significantly with Help from Ivanti and Partner NCSI

Since 1887, Marathon Oil Corporation has been a part of providing energy all over America. The company is a public petroleum and natural gas exploration and production enterprise headquartered in Houston, Texas. Pat Nichols, Senior IT Systems Analyst, has been along for the ride for more than 40 of Marathon Oil’s 133 years of operation. She has witnessed many of the ebbs and flows the company has gone through and led teams through them all.