Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Light monitoring with Elastic Metricbeat

Since Pandora FMS version 7.0 NG 712, thanks to the integration with Elastic, we have drastically improved the system of storage and visualization of records or logs, which allows us to increase the growth and speed in the presentation of information. But wait, there is still more to talk about before I go on to describe Light Monitoring…

2019 Predictions: Powering IT With Model-Infused Machine Learning

2018 saw modern enterprises adopting different approaches and tools to predict and eliminate IT outages using data collection and analytics — from modeling and performance data to log, event and application data. The advancements in machine learning and AI will help DevOps and IT Ops push boundaries in 2019, enabling them to collect streaming data in real time and get insights to optimize and improve IT performance. Here are some of the trends we are observing for 2019.

Use Case Focused Elasticsearch Online Training Classes to Fit Your Exact Needs

We’ve been working with Elasticsearch since its inception, either with clients on consulting for Elasticsearch products and Elasticsearch production support, or by building our own hosted log management solution. For the last 4 years, we’ve also been sharing our knowledge through Elasticsearch training classes. In 2018, we had remote public training classes on a fixed quarterly schedule, so you can more easily plan your learning time and budget.

Error Monitoring In Zend 3

Zend Framework 3 is a free and open-source PHP framework. It uses a model-view-controller (MVC) pattern which makes its structure consistent and maintainable. It also accesses the database in an object-oriented way. Instead of directly interacting with the database using SQL queries, you can use doctrine object-relational mapping (ORM) to manage the structure and relationships of your data. This makes code easier to write and maintain.

The role of SIEM in PCI DSS compliance

Studies have shown a direct correlation between data breaches and non-compliance. This isn’t to say that compliant companies never get breached, but to reinforce the importance of incident detection and response. Businesses have begun to realize the devastating consequences of data breaches—their finances and reputation are at stake, so many have been taking steps over the last few years to comply with the PCI DSS. The main goal is often an emphasis on achieving continuous compliance.

WLSDM: How to monitor Outbound HTTP Socket connection (back-end outbound http/s response times) performance on WebLogic?

In this blog post we prepared monitoring http/s response times performance via WLSDM Back-End system monitoring features. URLs and URLConnections provide a relatively high-level mechanism for accessing resources on the Internet. Sometimes applications are require lower-level network communication, for example, when you want to write a client-server application.

Adding CVE scanning to a CI/CD pipeline

A Docker image contains an application and all its dependencies. As it also contains the numerous binaries and libraries of an OS, it’s important to make sure no vulnerabilities exist in its root filesystem, or at least no critical or major ones. Scanning an image within a CI/CD pipeline can ensure this additional level of security.