Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Breaking Out of Analysis Paralysis: Streamlining Cloud Migration with Tidal Accelerator

In Episode 1, we delve into the critical topic of overcoming “Analysis Paralysis” during cloud migration. We will explore how Tidal Accelerator can help organizations break free from the shackles of over-analysis and guide them towards successful cloud migration.

How to Protect Vital Cloud Systems from Cyber Attacks

In today's digital era, cloud computing has become the backbone of numerous businesses. Cloud systems have become the go-to choice for many organizational needs thanks to advantages like unparalleled scalability, accessibility, and cost-effectiveness. Still, the rapid surge in cloud adoption has attracted the attention of cybercriminals. According to a report from Netwrix, 68% of organizations experienced at least one cyber attack incident in the past year.

How to Identify Your Organization's Attack Surface

Our glossary page on attack surfaces defined the terms associated with the concept. This post provides information that'll help your organization identify its attack surface. Much like your lawn after a good rain, your attack surface will grow rapidly if left unchecked. Along with increases in attack surface size comes an increase in cybersecurity risk. That risk can’t be eliminated as attack surfaces are always evolving, but it must be carefully managed.

Troubleshooting Common Kafka Conundrums

This is the third blog in our series on Kafka, where we continue to explore the nuances of deploying Kafka for scale. In our previous blogs, Essential Metrics for Kafka Performance Monitoring and Auto-Instrumenting OpenTelemetry for Kafka, we laid the foundation for understanding Kafka’s performance and monitoring aspects. Now, as we explore further into the Kafka ecosystem, we’re here to tackle the common challenges that can arise during deployment and scaling.

Telemetry 101: An Introduction To Telemetry

Understanding system performance is critical for gaining a competitive advantage. Telemetry provides deeper insights into the system, helping business owners make better decisions. This article take a comprehensive look at the topic of telemetry. We’ll look at its functionality and telemetry types. We’ll also look at all the things telemetry data can help you with — plus the challenges companies with telemetry systems might face.

Listen, Learn and Adapt: The Keys to a Nimble Customer Experience Strategy

In celebration of Customer Experience Day 2023, this post is part of a series on customer experience and the ways that Splunk strives to deliver superior customer experience at every level. Any resilient customer experience (CX) team knows that in order to create superior customer experiences, listening is the first step. This is made apparent when you consider that 73% percent of customers expect companies to have a firm grasp on their unique needs and expectations.

Unify and query private network data in Grafana Cloud: Private Data Source Connect is now GA

You may be ready to make the move to Grafana Cloud, but securely querying private data has been a blocker. If you wanted to query a network-secured data source like a MySQL database or an Elasticsearch cluster that is hosted in an on-premises private network or a Virtual Private Cloud (VPC), you needed to open your network to inbound queries from a range of IP addresses.

How to securely send your telemetry to Grafana Cloud using AWS PrivateLink

Using Grafana Cloud to manage and monitor even your most sensitive data from your AWS services just got easier. If your organization’s workloads are hosted in AWS and you are using a Grafana Cloud instance that’s also hosted in AWS, you can now use AWS PrivateLink to establish a secure connection between your virtual private cloud (VPC) network and Grafana Cloud for all your data.

Securing open source software dependencies in the public cloud

I recently recorded a Lightboard presentation on securing open source software dependencies in the public cloud. This blog summarises, and expands upon, some of the key elements from that presentation: I think about this topic through two lenses: software supply chains and updating software dependencies while maintaining stability.