Operations | Monitoring | ITSM | DevOps | Cloud

Automatically (or manually) tag your Sleuth deployments

All deployments are not created equal, but you'd never know it from your Slack channel notifications. In reality, some deployments you really care about, as they contain things like API changes or database migrations, and you want that information to surface. We created tags in Sleuth for this very reason. Out of the box, Sleuth matches files in your deployment with known patterns, and if any are found, tags your deployments automatically.

Who's calling - A neighbor or a fraudster?

Once upon a time the telephone system was a trusted method of connecting people. While we now spend more time on our phones than ever, our relationship to phone calls has changed -- we’re hesitant to answer calls from unknown phone numbers, often because we think the call is a con. But what if the caller ID is spoofed/modified and made to look like a telephone number that you may trust or a number with a local area code and familiar prefix?

Enforcing Enterprise Security Controls in Kubernetes using Calico Enterprise

Hybrid cloud infrastructures run critical business resources and are subject to some of the strictest network security controls. Irrespective of the industry and resource types, these controls broadly fall into three categories. Workloads (pods) running on Kubernetes are ephemeral in nature, and IP-based controls are no longer effective. The challenge is to enforce the organizational security controls on the workloads and Kubernetes nodes themselves.

How to Spot Website Errors and Reduce Troubleshooting Time

Errors and bugs are a nightmare for any software engineer or developer. Even though errors can seem like a bad experience for any developer or website owner, errors can help improve the quality of a website. You may be wondering, “But how?” Errors pinpoint the weaker parts of the website, giving you direction of what to work on.

Adapting Your Cybersecurity Habits With Ivanti Neurons

Tuesday morning you roll out of bed, turn off your alarm, tiptoe down the stairs, retrieve your paper, flip the hallway lights on, feed the dog, and start making coffee—in five minutes. Performing this series of early-morning tasks is called chunking. Certain neurons in the brain “bookend” the habit for you, signaling the routine has started (the alarm) and ended (coffee).

community.icinga.com

The community forum is a place where you can meet and chat with other Icinga users. It’s hosted by Icinga and moderated by both the Icinga team and members of the community. It’s mostly being used as a platform to ask and answer technical questions about Icinga, which is a great way to learn more about the tool stack! What does it look like? It’s a discourse platform, so it’s a collection of threads or topics which are open for anyone to leave a comment on!

Debugging AWS Lambda Timeouts

Some time ago, an ex-colleague of mine at DAZN received an alert through PagerDuty. There was a spike in error rate for one of the Lambda functions his team looks after. He jumped onto the AWS console right away and confirmed that there was indeed a problem. The next logical step was to check the logs to see what the problem was. But he found nothing. And so began an hour-long ghost hunt to find clues as to what was failing and why there were no error messages.

8 Changes Drift Made to Save $2.4M in Cloud Cost

Chief Architect at Drift, Freedom Dumalo, recently spoke with the CloudZero team about how they’ve successfully cut cloud costs by $2.4M in just a few months. When the world rapidly transitioned to work from home, Drift, the conversational marketing platform known for their chatbots, saw a spike in their customer utilization. The largest usage spike were among new users experimenting with their free trial. This increase in engagement was a great sign for their business.

4 Reasons Why Carbon Black Co-Founder Ben Johnson Prioritizes Cloud Cost at His Latest Startup

After growing Carbon Black from nothing to over 800 employees, Founder and CTO Ben Johnson turned his attention to the security of SaaS applications with new startup Obsidian Security. Obsidian secures companies like Office 365, G Suite, Salesforce, Slack and Zoom. This time around, Ben is a seasoned founder and is proactively thinking about how to scale his company with healthy product margins. He uses CloudZero to monitor his AWS costs, detect anomalies, and enable his engineering team.