Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Overcoming Messy Cloud Migrations, Outdated Infrastructures, Syslog, and Other Chaos

As businesses grapple with increasing data volumes, the need for practical tools to manage and use this data has never been greater. High-quality tools are great — but imagine what you could accomplish with one that made all the others in your toolbox even better? That’s exactly how we design every Cribl solution — we exist to help IT and Security teams get more out of their existing infrastructure.

The Frugal Architect, Law I: Make Cost A Non-Functional Requirement

This is part one of seven in our Frugal Architect blog series. In case you weren’t as giddy as CloudZero was at re:Invent this year, we wanted to recount the seven laws outlined by Werner Vogels, Amazon’s CTO, which he’s bundled into a framework called “The Frugal Architect”. What is “The Frugal Architect”? A constitution of sorts for how engineers can build high-functioning, cost-efficient cloud software.

How Gremlin's dependency discovery feature works

Modern applications are rarely created entirely from scratch. Instead, they rely on a framework of pre-existing applications and services, each adding specific features and functionality. These dependencies empower teams to build and deploy applications more efficiently, but they bring their own set of challenges. Tracking, managing, and updating these dependencies is difficult, especially in large, complex applications where dependencies are likely managed by different teams.

The Debrief: Building AI-Related Incidents

Recently we went live with one of our biggest product launches to date AI. And this product was unique in that it was broken up into four smaller projects: So naturally most folks might be wondering: What were the biggest differences between these projects and what went into actually building out each of these features? In this episode, you'll hear from Rob and Isaac, both Product Engineers who played a really critical role in the building out of related incidents, to get a peek behind the curtain.

Monitor Oracle managed databases with Datadog DBM

Datadog Database Monitoring (DBM), which provides host-level and query performance metrics and insights for PostgreSQL, MySQL, and SQL Server, is now available for Oracle. Oracle is one of the most common database types, and now teams that operate Oracle databases can use Datadog to monitor these resources alongside telemetry from across their environments.

Azure VM Autoscaling to enhance performance and cost efficiency

Azure VM Autoscaling is a feature provided by Microsoft Azure that allows to automatically adjust the number of Virtual Machines (VMs) in a specific scale set based on predefined criteria such as load, performance metrics, or a schedule. This post delves into the significance of autoscaling within Azure VMs, spotlighting its role in cost optimization, performance enhancement, and improved availability.

Cybersecurity 101: Everything You Need to Know

Did you know? According to cybersecurity statistics, a cyber threat occurs every 39 seconds. So, are you looking for ways to improve the security of your digital ecosystem? Boost your enterprise immunity against dreadful cybersecurity attacks to mitigate security risks and prevent financial losses. Read through this blog to understand the significance and different types of cybersecurity and the steps you can take to secure your organization from cyberattacks.

APAC Retrospective: Learnings from a Year of Tech Outages, Restore: Repair vs Root Cause

As our exploration of 2023 continues from the third-part of our blog series, Dismantling Knowledge Silos, one undeniable fact persists: Incidents are an unavoidable reality for organisations, irrespective of their industry or size. Recent APAC trends show that regulatory bodies are cracking down harder on large corporations for poor service delivery, imposing harsh penalties as a result of the negative consequences.

How to successfully implement an inventory management software?

For inventory management software to reach its full potential and meet the specific needs of your business, a well-designed and well-executed implementation is essential. This article will provide a step-by-step guide to the successful implementation of inventory management software while emphasizing the importance of customer onboarding.