Operations | Monitoring | ITSM | DevOps | Cloud

Encrypt Azure Service Bus Data at REST using User Keys

Azure Service Bus messages may contain sensitive business information. This sensitive information should be accessible only to the intended receivers of the message. This information must be protected from the attackers when the messages are in transit and at rest. This blog will brief you how Azure handles the default encryption of data at rest and how we can use our own keys to encrypt the Service Bus data at transit.

Virtual Meetup: Building a COVID-19 Dashboard for Non-Programmers + Inside the COVID-19 data

This session comprises of two talks by community members, catering to audience of varying tech skills. Talk 1: Building a COVID-19 Dashboard for Non-Programmers We will use Kibana to build a Covid-19 dashboard using the "Upload CSV" feature. The dashboard will feature tables, bar charts, line graphs and pie charts. We will use existing publicly available data and show easy it is to build and share dashboards

Virtual Meetup: Multilingual Data & Search - Solving the Common Problems

It’s no secret: multilingual search is hard! Each language is unique. In some languages there is no whitespace between words, in others using the dictionary form of a word is essential to finding more relevant results. Your data can be in one or several languages or even worse, one document can be written in one or more languages. How do you maximize your chances of getting relevant results? This 35min talk will cover some customer use case and the following challenges.

Mastering website monitoring with Applications Manager

In the digital era, most enterprises use a web platform to reach potential customers and showcase the products or solutions they offer. Websites have become extremely popular as a medium of establishing a brand image, and they contribute in making a major share of revenue. Well-planned websites can capture the attention of the target audience, increasing the probability of them turning into valuable, paying customers.

How ML6 used Grafana to deliver a 200% ROI for Accolade Wines

Did you know that Grafana pairs well with a fine wine? That’s what machine learning company ML6 discovered when they worked with their client Accolade Wines, an award-winning Australian vintner whose goal was to decrease the waste produced in its global operations. “Accolade Wines is really focused on being as efficient as possible,” says Rebecca Brooke, ML6’s team leader in the U.K. “They’re always looking at minimizing their environmental impact.”

Is the role of ITSM only limited to IT? Understanding Enterprise Service Management

Enterprises are facing new challenges not just in terms of staying relevant in the market and customers but also in controlling internal organizational chaos. Over the years, there have been a number of frameworks and models that were consistently being rolled out to assist enterprises to declutter operational and organizational challenges, streamline enterprise services and service delivery, and identify loopholes and fix them.

Tyto Care: Accelerating Telehealth in the Fight against COVID-19

At Logz.io, our team has the opportunity to partner with many cutting edge technology companies and products from different trades. Many have a crucial mission and help save lives worldwide. In the fight against the novel coronavirus, telehealth is one such sector. It compels us to do all we can to support these organizations by improving application accessibility and performance for users who need it. One of our customers epitomizes this—Tyto Care. Tyto Care is a healthcare pioneer.

Kubernetes Master Class - 2020-04-20 - Detecting Anomalous Kubernetes Activity with Falco

Even when processes are in place for vulnerability scanning and implementing pod security and network policies, not every risk will be addressed. You still need mechanisms to confirm these security barriers are effective and provide a last line of defense when they fail. In order to keep up with threats at runtime, an open-source based approach can help you stay up to date. In this Kubernetes Master Class, you will learn how to manage security risk at runtime in your RKE environments using Falco, a CNCF project for runtime security. Falco efficiently leverages Extended Berkeley Packet Filter (eBPF), a secure mechanism, to capture system calls and gain deep visibility. By adding Kubernetes application context and Kubernetes API audit events, teams can understand exactly who did what.