Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Google GSuite to Splunk HEC Configuration

Google Cloud recently expanded the list of GSuite audit logs that you can share with your Cloud Audit Logs, part of your organization’s Google Cloud’s account. This is awesome news and allows administrators to audit and visualize their GSuite Admin and Login activity in Splunk real-time via the same method used to stream Google Cloud logs and events into Splunk, using the Google-provided Pub/Sub to Splunk Dataflow template.

Dashbird achieves AWS Lambda Ready designation

Dashbird, centralised observability and incident detection platform for serverless applications. Team Dashbird is proud to announce that we have achieved the AWS Lambda Ready designation, part of the Amazon Web Services (AWS) Service Ready Program. This designation recognizes that Dashbird’s serverless monitoring and debugging platform has demonstrated successful integration with AWS Lambda.

New OpsRamp Customer Support Portal and Feature Request Process

Customer-centricity is what many companies want to deliver, but what does that actually mean? For an enterprise software company like OpsRamp, it's about user experience and a comprehensive, feature-rich platform that delivers on their needs today and down the road. What new features or enhancements make our customers more productive and successful on the job, using our product? How can the platform work better for our customers and partners?

Helping Your IT Team's Productivity During the Pandemic

As the world braces for recession, you need your team in fighting shape to take on the economic challenges to come. An efficient use of resources while still maintaining high service standards is more important than ever. But that’s a tall order for IT leaders who may be managing a fully remote workforce for the first time. The processes and habits that worked to boost your team’s productivity while your direct reports all sat within earshot may not cut it when workers are remote.

300 Tickets & Counting: Clearing Up Confusion Over Multi-Factor Authentication

Most remote employees are probably familiar with a security practice known as multi-factor authentication (MFA), even if they cannot technically define it. If you’ve ever tried to complete an online purchase and were met with a string of security questions or received a one-time password (OTP) on your mobile device—then you’ve participated in an MFA process.

InfluxDB Templates: Easily Share Your Monitoring Expertise

If you’re the resident expert in your company on a particular technology, you probably get asked a lot of questions about it: how to set it up, how to maintain it, how to monitor it. While it’s great to be recognized as the expert, all these requests for help can steal time away from your day job. Thankfully, we’ve got something that will help: InfluxDB Templates.

MongoDB (and Atlas) vs DynamoDB - 8 Basic Comparisons

Both DynamoDB and MongoDB are NoSQL databases, but the similarities probably end there. In this article, we cover their strengths and weaknesses in 8 basic categories, so that you can decide which one suits best your needs. While the data model behind Mongo is more flexible for storage and retrieval, Dynamo is stronger in terms of scalability, consistent performance under heavy load, and infrastructure abstraction.

Key metrics for PostgreSQL performance monitoring

PostgreSQL offers flexibility on how data is stored and compared in a relational database. This is why it’s so popular among enterprises as a solution for their database requirements. Although PostgreSQL is quite reliable, database problems are inevitable, especially in large-scale environments. Ignoring these problems could result in a plunge in the productivity of your business.

Cyber-hygiene 101 during remote working: Protecting your digital identities with multi-factor authentication

When organizations shift to a work-from-home environment, identity and access management (IAM) takes center stage. Organizations with remote workforces must fortify their IAM policies and tools for a better user experience to ensure productivity, while also handling all the security challenges remote work presents to ensure data and system security. One of the biggest risks an organization faces when its workforce goes remote is unnecessary and unauthorized access to organizational data.