Operations | Monitoring | ITSM | DevOps | Cloud

Migrating your Splunkbase App and Users to Splunk 8.0

Earlier this year Python 2 entered End of Life — and Splunk has already released versions of Splunk Cloud and Splunk Enterprise that provide a Python 3 runtime. As the developer of an app that is published to Splunkbase, if your app contains Python code, you need to update it to work with Python 3 and Splunk Enterprise 8.0 by July 1, 2020 as the Splunk Enterprise and Splunk Cloud releases after that date will no longer support the Python 2 runtime.

Online Sales Are Up! Ensure Your E-Commerce Platform is Not Being Used for Fraud

Even with tough economic times, e-commerce is up 25% since the beginning of March. But, fraud has increased as well; according to Malwarebytes online credit card skimming has increased by 26% in March alone. In our April “Staff Picks for Splunk Security Reading” blog post, I referenced a story about an e-commerce site getting hacked with a “virtual card skimmer” (thanks Matthew Joseff for sharing this with me).

Heroku Logs - The Complete Guide

Platforms like Heroku give you the freedom to focus on building great applications rather than getting lost setting up and maintaining infrastructure. One of the many great features of working with it is the Heroku logs that enable monitoring your stack error troubleshooting. It helps speed up the process when things go wrong. In this Heroku tutorial, we’ll uncover best practices for making the most of Heroku logs.

How to implement log management policies with your teams

Logs are an invaluable source of information, as they provide insights into the severity and possible root causes of problems in your system. But it can be hard to get the right level of visibility from your logs while keeping costs to a minimum. Systems that process large volumes of logs consume more resources and therefore make up a higher percentage of your overall monitoring budget. Further, log throughput can be highly variable, creating unexpected resource usage and financial costs.

Security configurations-Part two: 8 imperative security configurations for your arsenal

In part one of this two-part blog series, we discussed seven reasons security configurations are an important part of an organization’s security posture. In this part, we’ll look at eight security configurations that can help with ensuring comprehensive control over the endpoints, avoiding vulnerabilities, deploying security configurations, and automating a number of verticals of endpoint security.

Five worthy reads: Multiexperience: The next milestone in the digital transformation curve

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we’ll take an in-depth look at multiexperience which came in second on the list of Gartner’s top 10 strategic technology trends for 2020 and it’s importance in an organization’s digital transformation.

Customer Story: How Sentry Helps Grofers Meet Unprecedented Delivery Demand

As one of the leading grocery delivery services in India, Grofers needed to make massive fulfillment adjustments as demand rocketed due to an entire nation sheltering in place to help control the spread of infection during a global pandemic. For the Grofers team, providing much-needed grocery delivery service is as much of a technical challenge as a human resources one.

Detailed view on Azure Function Custom Handlers

Custom Handler is a feature in Azure Functions which lets you bring your own command, script, or executable, and hook it up to Azure Functions Triggers and Bindings. Custom Handler implements a lightweight Web Server. In other words, you can write your own APIs, in any language i.e. it need not be a language supported by Azure functions. You can just hook up your Azure function host with your custom API and let your function act as a proxy.