The Cloud Network Security Gap
Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember…
Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember…
The first time I created a cloud compute instance, then called a “Cloud VM”, was an almost transcendent moment. It was like magic. I was at…
Your log monitoring solution works through millions of lines of logs, which makes implementing a machine learning solution essential. Organizations are turning to machine learning log…
An Elastic Security Advisory (ESA) is a notice from Elastic to its users of a new Elasticsearch vulnerability. The vendor assigns both a CVE and an…
The latest Elasticsearch release version was made available on September 24, 2020, and contains several bug fixes and new features from the previous minor version released…
Surveys show that developers spend roughly 25% of their time troubleshooting issues, amounting to over one working day per week! Let’s examine the solutions that will…
As the leading log management and analytics platform, we’re proud to announce that we’ve been recognized in the Gartner “2020 Cool Vendors in Performance Analysis” report…
In the previous article, we have created the Continuous Integration (CI) pipeline for a simple Java application. It is now time to start working on the…
You may have noticed how on sites like Google you get suggestions as you type. With every letter you add, the suggestions are improved, predicting the…