Operations | Monitoring | ITSM | DevOps | Cloud

Securing Serverless Applications with Critical Logging

FaaS services such as AWS Lambda take care of many security aspects - networking, firewall, OS updates, etc. Make no mistake, though: application-level security is still fully on our hands! Do we have all the information needed to secure our serverless apps? Enters critical logging!

Auvik Use Case #12: Fast Client Onboarding

Onboarding new clients can be a very time-consuming process for MSPs. To get the lay of the land, you typically need to make the trip to the client site, crawl through switch closets, perform a site survey, and complete many more manual tasks. But even after that investment of time and resources, sometimes you don’t get the full picture.

Best Practices for Configuring Linux Containers

Within a Linux network or development system, launching a limited set of applications or services (often known as microservices) in a self-sustaining container or sandboxed environment is sometimes necessary. A container enables administrators to decouple a specific set of software applications from the operating system and have them run within a clean, minimal, and isolated Linux environment of their own.

Network Security Monitoring with Suricata, Logz.io and the ELK Stack

Suricata is an open source threat detection system. Initially released by the Open Information Security Foundation (OISF) in 2010, Suricata can act both as an intrusion detection system (IDS), and intrusion prevention system (IPS), or be used for network security monitoring.

Rigado - Infrastructure for a secure and scale-able IoT

Ben Corrado - CEO of Rigado explains how Ubuntu Core enables the simplifying of the update and configurations process in order to put together an IoT edge gateway so customers only have to focus on their end application without having to worry about the underlying security and update process of their devices.

2019 Important IT Milestones

“What??? Fully end of life by April, you say? As in, ‘in-six-weeks’ April? Well, there go my weekends for a while. When will we ever get this right?” We’ve all been there at some point, completely under water, late on key projects, having to fight to get our SLA and security KPIs green and completely forget that time is running and now, again, core components are nearing their end of life. Here at Nexthink, we don’t want you to have to go through that.

PHP Error Log Basics

When developing PHP applications, error logs tend to be underutilized due to their apparent complexity. The reality is that PHP error logs are extremely helpful, especially when configured and used properly. While there are advanced tricks to truly squeeze every last drop of utility out of error logs, this article will cover the basics of configuration and the most common use cases so you can get up and running quickly.