Operations | Monitoring | ITSM | DevOps | Cloud

Now FedRAMP Ready, Sumo Logic Empowers Public Organizations

As we continue to adopt a digital-first mentality globally, there’s a massive shift to the cloud happening within federal agencies. While the sector has traditionally been slower to adopt new technologies, these agencies are understanding the urgent need to transition from legacy on-premise systems to more scalable and secure, cloud-based architectures.

Integrate Akamai with Datadog to monitor CDN performance

Akamai is a leading provider of content delivery network solutions around the world, handling many millions of HTTP requests per second. By Akamai’s estimates, its CDN platform delivers 15 to 30 percent of global web traffic. If you’re using Akamai to accelerate and protect the delivery of content to your users, we are pleased to announce that you can now use Datadog to monitor the utilization and performance of your CDN.

Prometheus and Docker: Monitoring Your Environment

Coming back from Monitorama, I had a chance to sit back and start playing with some tools to see how they worked. Prometheus is a pretty ubiquitous tool in the monitoring space, it's pretty easy to spin up, and is open-source. Having a very active community of engaged developers means finding help articles or guides is easy. We are also going to use Grafana to build nicer looking graphs based on API queries from Prometheus.

SaneBox: Using Artificial Intelligence for Smarter Email Services

We all struggle with overloaded emails and are always on the lookout for methods to ease this burden. To make a clutter-free inbox a reality, help comes in the form of Sanebox. This is a software program made especially to clean up and effectively organize the client’s inbox. This simple software program works by taking a complete overview of your email.

Why the LogDNA Agent Runs As Root

One question that customers often ask is “why does the LogDNA agent need to run as root?” With IT departments and DevSecOps teams pushing to secure systems against cyberattacks, running a cloud-based logging agent as root sounds like a huge risk. While it’s true that you should avoid running applications as root, there are several reasons why our agent runs as root out of the box and several ways that we reduce your risk of attack.

Write to S3 and call other Lambdas with Python

Many people writing about AWS Lambda view Node as the code-default. I’ve been guilty of this in my own articles, but it’s important to remember that Python is a ‘first-class citizen’ within AWS and is a great option for writing readable Lambda code. Take a look at these two starter examples of writing functionality in Python.

Five worthy reads: Fend off cyberattacks using dark web intelligence

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we discuss how organizations can use the dark web to build a treasure trove of actionable intelligence to prevent attacks.