Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Raspberry Pi and Ubuntu: 2020 roundup

We’re almost there, 2021 is just around the corner. Like many others, we at Canonical have a deep appreciation for all things Raspberry Pi. We see the good they do and the joy they bring and can’t help but be impressed. This year marks the beginning of a stronger collaboration between the folks at Raspberry Pi and us at Canonical. We are by no means done and still have a long way to go. But we have made strides in the right direction.

Why You Should Monitor Your Azure Infrastructure

Microsoft Azure and Microsoft, in general, has a history of being seen as designed for big enterprises only. Those days are in the past. Azure is working its way to the front of the pack for cloud services. It is easy to transition your workflows to Azure because it connects well with other Microsoft tools you use. Even though it is a smoother transition, it is just as complex and complicated as other large cloud providers.

How to bring Jupyter Notebook visualizations to Kibana dashboards with Vega

In this blog post you’ll learn how to create visualizations for Kibana dashboards from Jupyter Notebooks. The good news for you as a Python developer: You won’t have to spend time writing cumbersome plain JSON documents or even JavaScript code. Under the hood, we’re going to make use of Kibana’s Vega plugin which became generally available with Elastic Stack 7.10.

Leading Video Conferencing Platforms Unveil New Waves of Integrations

Over the past year, many organizations have stagnated or struggled as a result of the global pandemic. Other businesses, specifically those who benefit from the widespread shift to remote work, have achieved unprecedented growth—none more so than video conferencing providers. Now, platforms like Microsoft Teams and Zoom are introducing new features that position them to become much more than video communication tools.

Elastic Security provides free and open protections for SUNBURST

On December 13, SolarWinds released a security advisory regarding a successful supply-chain attack on the Orion management platform. The attack affects Orion versions 2019.4 HF 5 through 2020.2.1, software products released between March and June of 2020. Likewise, on December 13, FireEye released information about a global campaign involving SolarWinds supply-chain compromise that affected some versions of Orion software.

Tapping Native Controls in Kubernetes to Protect Your Cloud-Native Apps

As companies adopt container technologies, they face a significant challenge - how do we secure this new attack surface? It’s an issue that you often see backlogged in favor of solving storage, networking and monitoring issues. Add on the challenge of educating the workforce on one of the fastest-growing open source projects to date, and it’s no wonder security has lagged as the primary focus for teams.

Installing Mattermost using the Azure CNAB Quickstart Library

TL;DR – Get started with Mattermost on Azure using the Mattermost on AKS quickstart from the Azure CNAB Quickstart Library. The quickstart provides a fast and simple way to get running with Mattermost, without the need to learn or install any new tooling. By using Azure Kubernetes Service (AKS), the infrastructure is fully managed for you, and the quickstart handles configuring networking and SSL certificates so you can instantly access the Mattermost application after installation.

Optimizing the Home Network | Nexthink Library

Earlier this year, as organizations around the world adapted to new remote working environments, Nexthink released a library pack to support IT teams through this transition. The Remote Worker Experience pack introduced a multitude of new dashboards, remote actions, investigations, metrics and Engage campaigns. All with a single objective: monitor, manage and improve the current remote working landscape.

How to Remediate Unencrypted S3 buckets

Cloud environments are always susceptible to security issues. A significant contributor to this problem is misconfigured resources. Traditional IT Infrastructure was somewhat static; server hardware only changed every few years. With few changes occurring, security was also more static. The modern cloud environment is a much different challenge. In cloud environments, servers, services, and storage are created with automation, resulting in a dynamic and potentially ever-changing server environment.