Operations | Monitoring | ITSM | DevOps | Cloud

Reserved Instances: Use It or Lose It

Reserved instances are one of those things that, when you first hear about them, you say, “Wow! I could save a lot of money!” And then you start to try and figure out how many you need? What sizes? Which operating systems? In which regions? Should they be convertible? Should I choose a 1-year or 3-year term? All up-front, partial up-front, or no up-front? How much compute am I actually going to need over that term?

Unsung IT Ops and DevOps heroes are finally getting their due!

IT Ops and DevOps teams in every organization are capable of focusing on revenue-generating initiatives and projects. Unfortunately they’re held back by constant fire-fighting…which means they are reduced to supporting just the current state and existing/legacy applications and services.

MSP Hyperspecialization: A High Margin Opportunity

It seems like every year, there’s a trendy new business model that managed services providers (MSPs) are told to adopt if you want to, well, survive. The most obvious example in 2018 is security. Cybercrime is a hot topic at channel conferences, and vendors are offering content in droves to help MSPs package and sell managed security services with the promise it’ll help you better protect your customers—and your business.

Accelerate Security and PCI Compliance Visibility with New Sumo Logic Apps for Palo Alto Networks

It’s becoming increasingly harder to manage the volume of threats coming into enterprise networks as attackers become more sophisticated, the threat landscape expands and enterprises continue to adopt modern applications at cloud scale.

5 Splunk Alternatives - Faster, Affordable Log Management Solutions

Since its first release in 2007, Splunk quickly became one of the leading log management solutions. Its focus on enterprise grade log analysis and security incident and event management (SIEM) made it the de facto choice for organizations generating large volumes of log files and machine data. But over the past decade, the log management landscape has changed drastically.

Alert fatigue, part 4: alert consolidation

So far, we’ve covered alert reduction with Sensu filters and token substitution; automating triage; and remediation with check hooks and handlers (links above). In this post, I’ll cover alert consolidation via round robin subscriptions and JIT/proxy clients; aggregates; and check dependencies. These are all designed to help you cut through the “white noise” and focus on what’s important (especially in the middle of a major incident).

Make time-series exploration easier with the PostgreSQL/TimescaleDB query editor

Grafana v5.3 comes with a new visual query editor for the PostgreSQL datasource. The query editor makes it easier for users to explore time-series data by improving the discoverability of data stored in PostgreSQL. Users can use drop-down menus to formulate their queries with valid selections and macros to express time-series specific functionalities, all without a deep knowledge of the database schema or the SQL language.

From OAuth to GitHub Apps: How Sentry Built its New GitHub Integration

As the most widely used source code management and error monitoring solutions, GitHub and Sentry work together to help developers improve their code and their productivity. With the newest Sentry integration release, GitHub users benefit from faster sign-in, flexible repository permissions, and easier organization-wide setup. And for the first time, GitHub Enterprise users can also take advantage of these useful integration features.

Using Audit Logs for Security and Compliance

Most software and systems generate audit logs. They are a means to examine what activities have occurred on the system and are typically used for diagnostic performance and error correction. System Administrators, network engineers, developers, and help desk personnel all use this data to aid them in their jobs and maintain system stability. Audit logs have also taken on new importance for cybersecurity and are often the basis of forensic analysis, security analysis, and criminal prosecution.