Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Log Analysis: What Is It and How Does It Work?

If you work in Information Technology, you have doubtless encountered logs- in fact depending on your area of expertise, you may be inundated with them on a daily basis. Nearly every piece of digital technology produces some kind of log, from complex web applications to the drivers that power your mouse and keyboard. As such, the definition of what a “log” actually is, is necessarily loose; any output received from a piece of software could be considered a log.

Monitor code deployments with Deployment Tracking in Datadog APM

Continuous integration and continuous delivery (CI/CD) pipelines have become fundamental to modern software development and code deployment. Implementing CI/CD practices can let teams deploy code more quickly and efficiently. But with these methods come a number of new challenges: bad code deploys are a major source of downtime and can lead to a loss of revenue and customer trust.

Top Three Takeaways From Our Multi-Cloud Connectivity Webinar

The move to a multi-cloud environment brings with it many new considerations for an enterprises. Among those is a new approaching to networking. In our recent webinar, Jay Turner, Vice President of Development and Operations, and Neil Templeton VP, Marketing at PCCW Global, looked at some of the common challenges facing enterprises as they connect to more clouds, and identified some new ways to manage these connections more effectively. Here’s some of the tips you might have missed…

Difference between a team lead and an engineering manager and how to transition between these roles

Transitioning from a team lead role to an engineering manager role is tough and you will experience many changes when transitioning between these two roles. What happens when you become an engineering manager?

How Serverless is an emerging Software Architecture?

Software development has greatly evolved over the years. Serverless is an emerging software architecture that could resolve issues when it comes to developing software solutions. As software developers, you’re tasked with server setup, installing the software, operating systems requirements, server management and maintenance, designing an application with high fault tolerance and availability, as well as managing load balance and more.

Azure Kubernetes Service (AKS): Deployment, Tools and Best Practices

Kubernetes (k8s) is an open source platform. You can use it to automate, scale, and manage container workload distribution. K8s is ranked amongst the most widely used container orchestration tools. Many Kubernetes users run it in a public cloud, such as Microsoft Azure. You can use Azure resources for Kubernetes without worrying about lock-in.

Detecting & Preventing Ransomware Through Log Management

As companies responded to the COVID-19 pandemic with remote work, cybercriminals increased their social engineering and ransomware attack methodologies. Ransomware, malicious code that automatically downloads to a user’s device and locks it from further use, has been rampant since the beginning of March 2020. According to a 2020 report by Bitdefender, ransomware attacks increased by seven times when compared year-over-year to 2019.

How to Monitor, Manage, and Secure Active Directory

Microsoft Active Directory (AD) is the nerve center enabling your federal agency to access the systems and applications staff members need to do their jobs. AD is also a high-risk target for inside and outside threats and can be a gateway for other potential security vulnerabilities. The key to protecting your agency’s AD is to have the right processes in place to maintain its integrity, know whether something is happening that shouldn’t be, and demonstrate compliance if required.