Operations | Monitoring | ITSM | DevOps | Cloud

Migration Path to Linux Container Orchestration Keynote Sizzle - Ubuntu Masters

Roblox moved its game servers from Windows to Linux to reduce costs and create a better player experience, including the migration to containerised workloads. Rob Cameron, Technical Director for Cloud Services at Roblox, gives an overview of his keynote discussion from Ubuntu Masters.

Mattermost Incident Response Workflows App - now in alpha

A look at Mattermost’s upcoming Incident Response Workflows app, now in private alpha. The app is designed specifically for incident response and enables teams to connect all your workflows, automate repetitive tasks, and collaborate on incidents—all without leaving Mattermost.

5 Reasons Why IT Asset Management Is Key to Your Business

The holiday season is always a good time to slow down, meditate, and be grateful for family, friends, and the blessings you have in your life. And believe it or not, I think this is a good practice to do in IT as well. You’re fighting the good fight day after day, extinguishing fires, battling resource and budget constraints, and dealing with more than enough on your Christmas dinner plate.

Alternative to Splunk: Pandora FMS as a monitoring tool

The American magazine “Fortune” specializes in global banking, business and finance… What does it have to do with monitoring? Well, in one of its annual lists, the Fortune 100 (the largest companies on the planet), 92 companies use Splunk software… If we compare by volume of money, yes, Splunk would be the best software and that’s where this article would end.

Automating the install of Elastic Cloud Enterprise on AWS with Ansible

So you want to install Elastic Cloud Enterprise (you know, the orchestration solution for the Elastic Stack that simplifies and standardizes how you deploy, upgrade, resize, configure, and monitor one to many clusters from a single UI/API) Installing ECE on one host isn’t tough. Installing it on two isn’t much harder. However, when you start dealing with 3, 5, 7, 11, etc., the complexity grows, as does the work involved in operating and maintaining (upgrading!) it all.

Storing and enriching alerts for information security with Elasticsearch

Within Elastic, the information security team is tasked with security detection and analytics, among many other activities of a typical information security team. To find abnormal and malicious behavior within our environment we leverage Elastic SIEM for investigations and threat hunting. When we find a pattern of behavior we want to be alerted on during an investigation or hunt we take the request JSON behind our investigation and put in to Watcher for alerting.