Operations | Monitoring | ITSM | DevOps | Cloud

6 steps to secure your workflows in AWS

On AWS, your workloads will be as secure as you make them. The Shared Responsibility Model in which AWS operates ensures the security of the cloud, but what’s in the cloud needs to be secured by the user. This means that as a DevSecOps professional, you need to be proactive about securing your workloads in the Amazon cloud. Achieving the optimal level of security in a multi-cloud environment requires centralized, automated solutions.

5 Essential Retrace Custom Dashboard Widgets For DevOps Managers

Imagine a man, a metaphorical man, slumped over, sitting silently across from you. Do you see him? Hastily smashing his fingers against the keyboard with a feverish sweat running down his neck. He, like many, only opens his APM solution after those universally feared “oh shit!” moments. Like a firefighter with a magnifying glass, he dives into his logs looking for a needle in a haystack. But you… Well, you know better than that. You wouldn’t just use your APM on bad days.

Identifying bottlenecks and optimizing performance in a Python codebase

July 08, 2019 In this post, we will walk through various techniques that can be used to identify the performance bottlenecks in your python codebase and optimize them. The term "optimization" can apply to a broad level of metrics. But two general metrics of most interest are; CPU performance (execution time) and memory footprint. For this post, you can think of an optimized code as the one which is either able to run faster or use lesser memory or both. There are no hard and fast rules.

Five reasons to choose Log360, part 3: Comprehensive network auditing

In the previous post, we discussed the various environments that Log360 helps you audit and secure. Having established the ease of Log360’s use and the breadth of its auditing scope, now we’ll examine some of the critical areas it can help you monitor. With over 1,000 predefined reports and alerts for several crucial types of network activity, Log360 provides comprehensive network auditing.

Magecart Monthly: Record £183m fine for British Airways.

Read the latest news on Magecart attacks! We’ve trawled the web for the latest news of data breaches, including updates on previous attacks. Now featuring insider insights from our own Security Researcher! Latest attacks: New! Major Attack on US Medical Debt Collection company American Medical Collection Agency (AMCA). Their payment portal was compromised for 8 months from August 1st, 2018 to March 30th, 2019.

A Closer Look at Lazy Loading Grafana Dashboards

Lazy loading of dashboard panels has been a popular feature request from the Grafana community for many years, and it was finally added in v6.2. In previous versions, the moment you opened a dashboard Grafana will issue queries for every panel, even those you have to scroll to see. This can create high peaks in load to your data source backends. Meanwhile, you may never actually scroll down to look at all of those panels, so executing queries for those panels would have been pointless.

Surfer - SEO Analytics and Data on your plate

SEO is an important aspect of web and the growing trend of Internet shopping has made SEO an essential aspect to achieve success in any online endeavors. We live in a modern age where our digital world surpasses our physical one and just having a basic understanding of it is not going to take you anywhere.

How to set up multiple environments in LogDNA

The use cases and requirements of a logging platform in an organization varies between teams and job functions. The problem isn’t in collecting log data (we are a logging company after all), but in deciding how to manage these logs for each team. For example, our backend developers need detailed, short-lived logs in order to build and test new features; while our infrastructure team needs lengthy retention periods for auditing and compliance.

Logstash Tutorial: A Quick Getting Started Guide

Looking to learn about Logstash as quickly as possible? This Logstash Tutorial is for you: we’ll install Logstash and push some Apache logs to Elasticsearch in less than 5 minutes. Logstash is a good (if not the) swiss-army knife for logs. It works by reading data from many sources, processing it in various ways, then sending it to one or more destinations, the most popular one being Elasticsearch.