Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Reducing cloud reliability risks with the AWS Well-Architected Framework

Designing and deploying applications in the cloud can be a labyrinthian exercise. There are dozens of cloud providers, each offering dozens of services, and each of those services has any number of configurations. How are you supposed to architect your systems in a way that gives your customers the best possible experience? AWS recognized this, and in response, they created the AWS Well-Architected Framework (WAF) to guide customers.

Dashboard Studio Feature Highlights in Splunk Enterprise 9.2

With every major Splunk Enterprise release, we level up your dashboarding experience so that you can visualize and take action on your data fast. In Splunk Enterprise 9.2, we are bringing the experience across Classic (SimpleXML) dashboards and Dashboard Studio closer together and weaving in Dashboard Studio features from the two most recent Splunk Cloud Platform releases. This blog post covers the major dashboarding features included in Splunk Enterprise 9.2.

Monitoring as Code: Everything you Need to Know

Everywhere businesses are growing and adapting new technologies to stand out from their competitors. In fact, 91% of companies are working on a digital initiative as per a report by Gartner. It has also been concluded that 89% of all businesses either already have a digital-first business strategy in place or intend to implement one. With everything on the cloud and complex form, detecting issues can be quite challenging.

Best practices for creating a reliable on-call rotation

It's fair to say that effectively managing an on-call rota is crucial for ensuring the 'round-the-clock availability of your services. But it's more than that. Spending the time getting your rotas right also empowers and protects the folks who make it all possible: your team. Some best practices for doing this include using software to automate scheduling, setting up teams with clearly defined responsibilities, establishing escalation policies, and defining time limits for issue resolution.

Mastering Firewall Logs - Part 2

As a pivotal element within your networking configuration, logs generated by Network Firewalls hold immense importance from both security and compliance standpoints. These logs serve as a source of valuable information, encompassing records of network traffic details like source and destination IP addresses, ports, protocols, timestamps, and the actions (e.g., allowed or denied) taken by the firewall for each connection or packet.

RCAs Within Incident Management Tools

The IT world thrives on uptime, efficiency, and seamless experiences. But amidst software and servers, glitches and disruptions threaten to bring operations to a halt. When these disruptions arrive, Incident Management takes center stage, collecting resources to restore order and minimize the chaos. Yet, simply fixing the immediate issue isn't enough. Preventing future disruptions requires delving deeper, finding the root cause, the reason that triggered the incident.

Introducing ManageEngine DDI: The key to unlocking the full potential of your critical network infrastructure

Building a future-ready network begins with integrating three core network services: DNS, DHCP, and IPAM, collectively known as DDI, which serves as the heart of network connectivity and operations.

Is Downdetector an Effective Monitoring Tool?

The internet has become an essential part of our lives, especially when it comes to business. Whether for work, communication, or entertainment, we heavily rely on the internet’s availability. However, when the internet goes down unexpectedly, it can be frustrating and disruptive. This is where Downdetector has become integral for many people in determining the status of an internet service.