Operations | Monitoring | ITSM | DevOps | Cloud

OpenSearchCon: Together after 18 Months

OpenSearch was created by the community for the community to continue to keep an open-source alternative to ElasticSearch and Kibana. The project has been hard at work for the last 1.5 years building, launching and iterating on this important initiative. Some remarkable milestones have been achieved, including over 5,800 stars on GitHub with 19 different community-led projects.

One Click Visibility: Coralogix expands APM Capabilities to Kubernetes

There is a common painful workflow with many observability solutions. Each data type is separated into its own user interface, creating a disjointed workflow that increases cognitive load and slows down Mean Time to Diagnose (MTTD). At Coralogix, we aim to give our customers the maximum possible insights for the minimum possible effort. We’ve expanded our APM features (see documentation) to provide deep, contextual insights into applications – but we’ve done something different.

What Causes False Positive Alerts?

According to Orca Security’s 2022 Cloud Security Report, 59% of respondents received over 500 alerts a day, with more than 42% of them being false positive alerts. And 62% of them said it has contributed to employee turnover. With numbers like this, it’s no wonder why developers dread the false positive alert. They waste time, energy, and money for everyone in every technology space, whether it is cloud or web services. It’s time to change that.

A look under the hood at eBPF: A new way to monitor and secure your platforms

In this post, I want to scratch at the surface of a very interesting technology that Elastic’s Universal Profiler and Security solution both use called eBPF and explain why it is a critically important technology for modern observability. I’ll talk a little bit about how it works and how it can be used to create powerful monitoring solutions — and dream up ways eBPF could be used in the future for observability use cases.

Cloud Security: Indiana Bob's Server Closet Versus Data Centers | Security Insights Podcast, Episode 28

Amanda and Chris share stories proving why your data really is more secure in the cloud than the average on-premises server closet – and what organizations should worry more about when it comes to data security.

Sponsored Post

AIOps Hurdles Not Many Vendors Talk About

According to one survey, 94% agree that AIOps is “important or very important” to manage network and cloud applications performance. AIOps intends to help customers contextualize humongous data volumes and streamline IT operations with automation. As IT infrastructure grows in complexity, alerts flood IT Ops centers and Ops teams drown in managing the deluge.

What to look for in a patch management solution

Welcome to part 2 of our Patch Management Basics series. In part 1—Learn patch management—we covered what patch management is, how it’s different to vulnerability management, and what the components are that make a good patch management program. In this article, we’re going to go a step deeper and explore the features that make up the best patch management solutions.

The Leading Sumo Logic Alternatives

Using Sumo Logic, you can analyze both metrics and logs simultaneously. Developed in 2010, this solution provides a powerful query language and scheduling support. Sumo Logic's production monitoring features provide visibility into production issues. Instead of manually writing alerts, the platform offers pre-configured alert templates (which Logit.io also offers), which makes setting up alerts easier and faster.

How to use Cribl Stream and ChaosSearch for Next-Gen Observability

The market for enterprise observability solutions is growing in 2022, as organizations search for more effective ways to maintain security and oversight of increasingly complex and distributed IT systems. Traditional observability solutions like Splunk, Datadog and New Relic are still widely used by enterprises to analyze logs, metrics, and traces from their IT environments. But as enterprises generate increasing volumes of log data, two things tend to happen.

Secure Backup Strategies for 2022

Hard drive crash. Ransomware. Equipment failure. Accidental deletion. Theft. There are plenty of reasons why end users want to have a secure and up-to-date backup of their most important files. And there are just as many approaches to backup and recovery as there are reasons to want it in place. In this article, we’ll discuss practical strategies and best practices for backing up important data, including consumer-level options and how to get the most from an enterprise-grade backup solution.