Operational analytics is of vital importance to IT organizations today. With complex hybrid infrastructures and dynamic workloads commonplace in many businesses, the ability to monitor important metrics like application performance requires a level of automation and analysis that can quickly turn data into useful information for your IT team.
Early on in the "cloud," Werner Vogels made his famous quote "You Build It, You Run It". With DevOps we learned that this became a mantra for shared responsibility between developers and operations. Operations learned how to process infrastructure as code and participate early in the supply chain of a service's life cycle. Developers learned that they had responsibilities to enable and in some cases operationalize their service. Now there is a new movement to include and collaborate in a similar way with Security. This is all part of an "everything" shift left ideal. Developers and operations are taught the importance of including security in the stories and all parts of the delivery pipeline including security gates as well as code test gates. Listen in on this session featuring DevSecOps expert, John Willis, as he goes through an introduction to DevSecOps. We discuss: Why traditional DevOps has shifted and what this shift means How DevSecOps can change the game for your team Tips and tricks for getting DevSecOps started within your organization About the Speaker: John Willis is VP of DevOps and Digital Practices at SJ Technologies. Prior to SJ Technologies he was the Director of Ecosystem Development for Docker, which he joined after the company he co-founded (SocketPlane, which focused on SDN for containers) was acquired by Docker in March 2015. Previous to founding SocketPlane in Fall 2014, John was the Chief DevOps Evangelist at Dell, which he joined following the Enstratius acquisition in May 2013. He has also held past executive roles at Opscode/Chef and Canonical/Ubuntu. John is the author of 7 IBM Redbooks and is co-author of the “DevOps Handbook” and the upcoming Beyond the Phoenix Project.
Agility is the cornerstone of the DevOps movement. Developers are working to continuously integrate and deploy (CI/CD) code to the cloud to ensure applications are seamlessly updated and current. But what about ensuring they are secure? Security best practices and compliance are now the responsibility of everyone in the development lifecycle, and continuous security is a critical component of the ongoing deployment process. The challenge is that not everyone knows how to integrate these two camps in a seamless and successful manner. Listen in on this session for an interactive webinar featuring George Gerchow, VP of Security and Compliance at Sumo Logic and DevSecOps evangelist, to discover how to: Incorporate fundamental and high impact security best practices into your current DevOps operations Gain visibility into your compliance posture Identify potential risks and threats in your environments
Today’s leading enterprises are striving to deliver high performance, highly scalable and always-on digital services. Built using a host of modern tools including microservices, multiple cloud platforms, containers and DevOps practices, these apps present new challenges for operations teams when it comes to understanding and driving performance. Although IT operations analytics (ITOA) tools bring visibility to IT teams, they don’t operate well in today’s complex and heterogeneous environments. A new breed of ITOA solutions (ITOA 2.0), driven by advancements in machine learning and big-data technologies are poised to better respond to the needs of IT pros responsible for the modern complex applications. In this webinar, we will discuss: •The driving factors behind the evolution of ITOA to ITOA 2.0 •How machine learning and analytics play a central role •Why correlation of logs and metrics is becoming critical for monitoring tools •How organizations can leverage ITOA 2.0 technologies to reduce mean time to identify the source of problems and repair them
DevSecOps means everyone is responsible for security and compliance from Day 1. A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake it into your technology’s DNA from Day 1. Ultimately, the challenge is to deal with imminent cloud-based attacks, whilst having visibility into processes in order to safeguard user and corporate information. This is easiest, and most scalable, under the mantra of DevSecOps. Do it from Day 1, and you won’t regret it on Day 1,000. In this session, George will share best practice of how companies have achieved this, as well as the benefits they have realised -- and potential catastrophes they have avoided. Some of the key takeaways will include: How DevSecOps is changing how organisations approach security and compliance A practitioners' guide to Securing the Cloud and Demystifying GDPR How to successfully implement and maintain a DevSecOps culture
Microservices are front and center on every company’s IT operations radar. It’s an approach very different from its monolithic predator, and much of it goes against the grain of traditional thinking. It has modular, independent components and teams, yet it requires complete company involvement and end-to-end management. To some, its “iterative development” approach (multiple cycles of redevelopment for the same service) resembles repetitive failure rather than ongoing learning. Yet industry giants like Amazon and Netflix have made great strides with it. So, is microservices the answer? What are the pitfalls? Is this the path you really want to lead your company down? Is it worth the transition from monolithic, and if so, what should you look out for? For the answers to all these questions and more, listen in to this engaging webinar featuring JP Morgenthal, Managing Editor of Microservices Journal, and a specialist in the integration of people and technology in the business sphere, as they discuss the ins and outs of microservices, including: Common pitfalls of microservices Management, sprawl, and decomposition How to avoid microservices pitfalls
How Hootsuite replaced ELK and Graphite with Sumo Logic to deliver amazing service to their customers Today's businesses run on modern applications. And enterprises have to deliver these apps with amazing customer experience to attract, engage and retain customers. As the leading provider of social media management services for enterprises, Hootsuite started with open source solutions ELK & Graphite software to monitor and analyze their mission-critical application performance. However as their customer base and adoption grew, Hootsuite realized the challenging in scaling their management solutions to deliver predictable services. To address these needs, Hootsuite turned to Sumo Logic. Sumo Logic provides the industry’s first machine data analytics platform to natively ingest, index and analyze metrics and log data together in real-time. Listen now to learn how Hootsuite made the switch from open source tools to Sumo Logic and the benefits they realized. In this presentation, we discuss: The challenges in running & managing solutions like ELK and Graphite Sumo Logic unified logs and metrics monitoring solution and its advanced analytics, dashboarding and troubleshooting capabilities How Hootsuite was able to leverage Sumo Logic to deliver excellent user experience to their end customers
Sumo Logic exposes the Search Job API for access to resources and log data from third-party scripts and applications. Targeting experienced Sumo Administrators, this webinar shows you how to leverage the Search Job API to interact with the Sumo Logic service. Everyone attending should be familiar with the concepts of RESTful web services and JSON. Through theory and demo, this webinar covers: Creating a Search Job Checking Status of a Search Job Paging through messages and records
To effectively manage your application, it's critical to have visibility into both logs and metrics. Metrics can provide app and infrastructure KPIs, while logs provide context into application and infrastructure execution KPIs. Managing one without the other, provides you with incomplete data; you need both to troubleshoot application issues quickly and efficiently. This webinar will feature a live demo of Sumo Logic's Unified Logs and Metrics machine data analytics platform and show how to: Natively ingest your logs, host metrics, AWS metrics and Graphite-compatible metrics Proactively set alerts based on logs and metrics thresholds Analyze and correlate logs and metrics in real-time and in a unified way to reduce mean time to problem resolution (MTTR)
If you use open source Graphite software to monitor mission critical applications, you know well the challenges in running, managing and scaling Graphite. Graphite may be ok to get started, but it creates lots of cost and complexity and total-cost-of-ownership headaches as your environment scales. Sumo Logic provides the industry’s first machine data analytics platform to natively ingest, index and analyze metrics and log data together in real-time. In this webinar, we will show a live demo of how to: Ingest graphite compatible metrics into the Sumo Logic service Analyze and dashboard the metrics to get real-time insights Correlate Graphite metrics and logs to troubleshoot issues faster See how easy it is to migrate from graphite to Sumo Logic.
It's no secret that continuous innovation and speed to market are mandating dynamic paradigm shifts in how companies conceive, develop and implement IT operations and security strategies. While this is all fine and well for the DevOps teams, for the folks managing security, these innovations bring up new challenges. Modern applications must be architected and managed with security in mind from the get-go, and building a SaaS offering that has security baked in is a whole new game. DevSecOps is the name of the game, but there isn't always a clear path to implementation and adoption. Between protecting against major attacks that arrive on a daily basis to maintaining compliance with strict regulations, leaving the boundaries of traditional IT can leave some security professionals quaking in their boots. Fear not, friends! There is a way to be secure and compliant in the cloud with the right approach. In this webinar, George Gerchow, VP of Security and Compliance at Sumo Logic, will do a deep dive into the steps it takes to successfully implement and maintain DevSecOps in your organization at scale. He will be discussing: What it took to build a world-class data analytics service on AWS from the ground up Technologies used to gain necessary operational and security visibility Tips and tricks to maintain optimal levels of performance, integrity and availability of the data How to best approach regulatory compliance in the cloud in pursuing certifications like PCI DSS, ISO 27001, CSA STAR, TRUSTe, SOC 2, Type 2, etc. Challenges encountered in the journey and how they were addressed
The world of the serverless app is here – with AWS Lambda pioneering serverless computing. With its NoOps promise of enabling users to run code that responds to events without requiring provision and management of servers (and only charging for the compute time consumed), Developers and DevOps teams everywhere want to leverage Lambda. But as with any new technology, there are significant challenges with knowledge, adoption and operational usage. The common questions that most teams ask include: How do I use Lambda effectively? What use cases work well with Lambda? How do I manage Lambda performance and operations? Join us for this exclusive webinar presented by Sumo Logic and 2U engineer David A. Black and you will learn: Basics of AWS Lambda Best practices for using AWS Lambda efficiently How to get started using AWS Lambda What use cases work best with AWS Lambda AWS Lambda management possibilities
Enterprises are running their workloads across complex, hybrid infrastructures, and need solutions that provide full-stack, 360-degree visibility to support rapid time to identify and resolve security threats. Trend Micro Deep Security offers seamless integration with Sumo Logic’s data analytics service to enable rich analysis, visualizations and reporting of critical security and system data. This enables an actionable, single view across all elements in an environment. In this webinar, we will: Demonstrate how to leverage Trend Micro Deep Security’s seamless integration with Sumo Logic’s data analytics service to enable rich analysis, visualizations and reporting of critical security and system data Illustrate how you can accelerate compliance by using a single tool that meets most compliance requirements when combined with Sumo Logic Show a live demo showing how to integrate Deep Security with Sumo Logic Platform in three easy steps. Dive into how to leverage out-of-the-box dashboards and saved-searches to improve your security posture
Legacy monitoring and troubleshooting tools can limit visibility and control over your infrastructure and applications. Organizations must find monitoring and troubleshooting tools that can scale with the volume, variety and velocity of data generated by today’s complex applications in order to keep pace with business demands. In this webinar we discuss how Sumo Logic helped Scripps Networks harness cloud-native machine data analytics to improve application quality and reliability on AWS. Sumo Logic allows IT operations teams to visualize and monitor workloads in real-time, identify issues and expedite root-cause analysis across the AWS environment. Listen in on this on-demand webinar as we are joined by an expert from AWS and Mark Kelly of Scripps Networks to discuss: How to migrate from traditional on-premises data centers to AWS with confidence How to improve the monitoring and troubleshooting of modern applications How Scripps Networks, a leading content developer, used Sumo Logic to optimize their transition to AWS