Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Taming the compliance beast: achieve efficiency & reliability at scale

Regulatory compliance is time-consuming and expensive. A recent survey of IT security professionals found that, on average, organizations must comply with 13 different regulations and spend an average of $3.5M annually on compliance activities, with audit-related activities consuming 232 person hours per year. With a team of five people, that adds up to 1.5 months a year devoted to audit-related activity. That’s a lot of hours that could have been spent on initiatives driving customer value.

Barriers to DevSecOps Adoption

DevSecOps — or the merging of Ops and Security — has been at the center of discussion for the better part of the outgoing decade. Today, the complexity of infrastructure change, demands security and DevOps teams to work together more efficiently. But there are hurdles to adoption of DevSecOps as a methodology. Cloud-native applications often live in multiple clouds across data centers, co-location, and public clouds.

Download PowerBI Diagram for visualizing overrides using Sankey

Did you catch our recent webinar on how PowerBI makes it possible to visualize override sprawl in SCOM with Sankey Diagrams and want to give our Sankey diagrams a go yourself? You are in the right place. Before you dive in, take a look at our blog explaining the “why” to using Sankey PowerBI diagrams to see your overrides, and how to take action based on what you see here.

6 tips for improving your Grafana plugin before you publish

Are you putting the final touches on your plugin before you submit it to the Grafana plugin page? In this article, I’ll share a few tips for how to add that extra polish to your plugins. This article assumes that you already have some knowledge of building plugins for Grafana. If you’re looking to build your first plugin, start by following one of our plugin tutorials.

Future of Monitoring: Experts Predictions for 2021 and Beyond

Making predictions is a tricky business at the best of times, but especially after a year that turned the world upside down. Even so, we have decided to talk to the IT leaders and discover what we should get ready for in 2021. With technology development, COVID-19 impact, and the new cybersecurity issues happening in the world, the IT engineers responsible for the IT infrastructure monitoring should be always ready to adapt to the new challenges.

Actionable alerts with fewer false positives: intelligent alarms with Netdata

Think about any sport or competitive activity, whether that’s football or a spelling bee. They always feature at least one person who acts as a moderator, referee, or judge. With their domain expertise, this person watches everyone’s behavior and constantly compares that against a set of rules. If someone crosses that threshold, they blow a whistle or throw up a flag. They are, in effect, saying that things have gone from OK to not OK.

Top 10 APM Tools in 2021 As Per G2 Ratings

In this information technology era, Application Performance Management (APM) monitors the performance of software applications and identifies the problems related to application performance as a service to the users. APM can be monitored or tracked using categories like load time, the response time of the application, etc. Nowadays, the applications are becoming more and more complex and distributed by using some technology in it.

Announcing HAProxy Kubernetes Ingress Controller 1.5

We’ve released version 1.5 of the HAProxy Kubernetes Ingress Controller. This version unlocks access to the raw HAProxy configuration language for power users to gain more control. You can also enable mutual TLS authentication between the ingress controller and services, enforce Basic authentication, and return custom error pages to users.

Empower your Organization's IT with Improved Monitoring Visibility

As technology evolves so do the needs of an organization that rely upon it; the ability to quickly adapt has become more important than ever, especially as of late. However, this doesn’t mean that adopting new technology isn’t without its own set of challenges. Take operating in the cloud for instance; one of the trade-offs is visibility.