Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Feature Spotlight: Timeline

Lumigo’s Transaction Timeline lets you see in a glance the flow of a transaction across its components and the latency caused by each, allowing you to easily identify bottlenecks and issues. Distributed tracing is a popular method for monitoring and profiling transactions in a microservices architecture. It’s what developers use to pinpoint failures, performance drops and other problems.

Parsley Health: Bringing Telemedicine to the Front Lines

As a child with a cancer survivor and heart disease patient for parents, I developed a psychological discomfort for visiting hospitals and the doctor’s office in my adult years. For me, the feeling of restlessness while sitting in a waiting room coupled with fear of the medically unknown can create the perfect breeding grounds for stress and anxiety—and apparently, I’m not alone.

Why CloudZero is the next step on my journey to empower developers.

Innovation drives success. And today more than ever, software drives innovation. No matter what product or service you offer, you’re a software company. You may not sell something called “software,” but successfully building, marketing, delivering, and supporting customers for any product today relies on software and technology. Innovation is what software developers do. And software developers are at the center of what CloudZero does.

How to implement Prometheus long-term storage using Elasticsearch

Prometheus plays a significant role in the observability area. An increasing number of applications use Prometheus exporters to expose performance and monitoring data, which is later scraped by a Prometheus server. However, when it comes to storage, Prometheus faces some limitations in its scalability and durability since its local storage is limited by single nodes.

Five Ways AIOps Can Improve IT Incident Management

Artificial intelligence for IT operations (AIOps) is an emerging technology that can help IT operations teams make sense of operational data. As hybrid infrastructure and cloud-native technologies present new levels of complexity, AIOps is showing great promise in simplifying and transforming digital operations management. In our recent Tech Talk, Five Ways AIOps Can Transform Your Enterprise, OpsRamp’s Eric Cook spoke about the need for AIOps in today’s multi-cloud environments.

Profiling "VIP Accounts" Part 1

Detecting malicious activity is rarely easy, but some attacker methods are more challenging to detect than others. One of the most vexing techniques to counter is credential theft. Attackers that gain control over a user account have access to the assets of that user. If the credentials are for an account with special privileges, like a system administrator, then the attacker may be able to gain access to system-wide resources and even be able to change logs to cover their tracks.

Experimental feature: progressive releases

“No plan survives contact with the enemy.” This is a famous quote attributed to the Prussian field marshal Helmuth von Moltke. It is also quite applicable to software development: “No code survives contact with the user.” In mission-critical environments, staggered deployments of software are a crucial part of controlled updates, designed to ensure maximum stability of production applications and services.

Lockdown Bugfixes & Midnight Coding

It's been a strange few months here in Edinburgh. Thankfully Downtime Monkey has been largely unaffected by the lockdown, quietly continuing to monitor websites while the world shuts down. Coding from home has been challenging with kids off school and nurseries closed. However, in the twilight zone silent hours after everyone has gone to bed we've been developing improvements and fixing bugs. Here are the details...

Monitoring Applications that use Okta for User Authentication

As the leading provider of identity and access management and authentication for enterprises, Okta gives employees, partners, suppliers, and customers secure access to the tools they need to do their most important work. With deep integrations to over 6,000 applications, the Okta Identity Cloud enables simple and secure access from any device.

A Blueprint for Running Stateful Services on Kubernetes

Managing stateful applications has been challenging for engineering and operations teams long before the debut of Kubernetes. In this post, we’ll explore all aspects of your deployments of stateful applications on Kubernetes, from the underlying hardware to Pod update strategies, and provide insights into how LogDNA uses stateful Kubernetes to build one of the world’s fastest log management platforms.