Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Q&A with Andrew Hewitt (Forrester)-Experience NYC '19

Experience NYC hosted several quality speakers but one in particular stood out to me for his unique message: Andrew Hewitt, a leading IT Analyst from Forrester. Probably the last thing you would expect to hear at an IT solutions conference is a captivating talk grounded in human psychology. Feelings? Perceptions? Beliefs? These topics don’t seem to fit nicely into bits and bytes. They’re perceived as foreign, un-engineer speak.

Network Throttling: Monitor the User Experience

When it comes to monitoring web application performance, not only is it necessary emulate user actions, but also network conditions of end-user devices. Network throttling allows you to control connection speeds to better match the experience of real users, allowing you to see web application behavior in specific network conditions. Network connections can vary for many reasons. User location, device type, and browser used are just a few factors that can affect a user’s experience.

Network Throttling: Monitor the User Experience

When it comes to monitoring web application performance, not only is it necessary emulate user actions, but also network conditions of end-user devices. Network throttling allows you to control connection speeds to better match the experience of real users, allowing you to see web application behavior in specific network conditions. Network connections can vary for many reasons. User location, device type, and browser used are just a few factors that can affect a user’s experience.

Screens Beta

Screens display a series of widgets that you can use to share across your organization. Widgets can display your log activity, from the number of logs ingested in the last 4 hours, to a line graph comparing today’s logs to yesterday’s logs. You can control the data you want to display by creating a “Screen” with a combination of different widgets. Post your screen on a company monitor to provide your organization with a snapshot of your system’s activity.

October 2019: New and updated website monitoring checkpoints

For the month of October, we’ve added three new checkpoint locations for a total of 212, and we’ve updated the IP addresses of three more checkpoints. We keep adding new checkpoints because you need to monitor your websites and web services from as close to your users’ locations as you can get. A few randomly placed monitoring locations or just monitoring from the cloud (who’s users are in the cloud anyway?) doesn’t cut it.

The dos and don'ts of scaling agile

Virtually every organization in the world is going through some sort of transformation, whether it’s digital, cultural, or agile. Atlassian customers (and non-customers) come to us for guidance in navigating these changes because they understand that what got them to where they are today won’t get them to where they want to be. They want real-life examples from people on the ground of how to drive their transformations.

The life-long learner's guide to mentorship

You’ve heard over and over how valuable mentors are as you move through your career. You’ve listened to your colleagues’ testimonials. You’ve watched the TED talks. You’re convinced. But what’s less clear is the role of mentorship at this point in your career. Right now. If you went out to seek a mentor today, would you know what you need from the relationship? Maybe, maybe not. And you’re not alone.

New in Grafana 6.4: The Logs Panel

At Grafana Labs, we are working to make it easier to visualize data that comes from many different sources and in many different ways. We know that our customers are usually using more than one system to track what’s going on within an infrastructure. If you are a system administrator, or even a curious developer, there is a very high probability that you are monitoring and quite regularly reviewing your logs to find valuable and important information in them.

A catastrophic flaw in Linux sudo command with a simple fix using Desktop Central

A critical vulnerability in sudo has been disclosed, that when exploited, enables users to bypass security restrictions and execute commands as the root user. This security flaw has to be swiftly remediated as sudo is one of the most integral and commonly used functionalities in Linux operating systems.