Operations | Monitoring | ITSM | DevOps | Cloud

Network traffic analysis: from packet analysis to flow analysis

Monitoring has always relied on both network administration and network traffic analysis. Both fields provide ways to obtain data that allows us to obtain information about the general state of the platform. It is easy to understand that when faced with, for example, an application performance problem, we want to be able to observe and evaluate the traffic generated, and this is just what network traffic analysis does.

Brace Yourself-768K Day Is Coming

All over the internet, there are ominous rumblings that “768K Day” is on its way—and it’s likely going to happen before May is over. And while some ISPs think this BGP (Border Gateway Protocol) milestone is being overhyped like Y2K and Cisco assures us the sky isn’t falling, that doesn’t mean we’ll all be left unscathed. If you’re an MSP who hasn’t heard about 768K Day yet, brace yourself—you could be in for a serious connectivity headache.

Evolving Digital Employee Experience - the Next Generation of Chatbots is Powered with Actionable Insight

It is difficult to overstate the importance and impact that Artificial Intelligence (AI) has had on the employee experience. This is crystal clear when you see how employees are interacting with their IT departments. Employees expect technology to just work. When there are technical problems the expectation is that fixing the issue will be fast and seamless. An increasingly important part of meeting this employee demand is the virtual agent, or chatbot.

Monitoring GitHub Activity with LogDNA

Source code management (SCM) is a core component of DevOps. In addition to storing and sharing source code, SCM tools maintain an ongoing history of changes. Reviewing this history provides numerous insights into your development process, including: How often code changes are submitted, The impact of changes on application performance, Which changes result in errors, bugs, or broken builds.

A Closer Look at Falco CVE-2019-8339

Recently, a member of the Falco community privately disclosed a capacity related vulnerability which, under circumstances where a malicious actor has already gained access to your system, could allow the actor to further bypass Falco’s detection of abnormal activity. The final details are still being worked out, but we believe the CVE will be classified as Medium severity according to the CVSS methodology.

Falco 0.15.0 Released

We are happy to announce the release of Falco 0.15.0. This release incorporates a number of improvements, as well as bug fixes, and rules updates. This release also includes a mitigation for CVE-2019-8339, and all users are encouraged to update to this release. You can find more details about the features and improvements in the release notes, but below are a few highlights.

Solr Monitoring Made Easy with Sematext

As shown in Part 1 Solr Key Metrics to Monitor, the setup, tuning, and operations of Solr require deep insights into the performance metrics such as request rate and latency, JVM memory utilization, garbage collector work time and count and many more. Sematext provides an excellent alternative to other Solr monitoring tools.