Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Monitor AWS IAM Access Analyzer findings with Datadog

As you monitor the health and performance of your infrastructure and applications, you also need to be able to identify potential threats to the security of those components. To help address this challenge, we’re pleased to announce that Datadog now integrates with AWS Identity and Access Management (IAM) Access Analyzer, a new IAM feature that helps administrators ensure that they have securely configured access to their resources.

Where is the enterprise network market heading in 2020?

The networking field is changing quickly with the emergence of new technologies. This change, along with the onset of digital transformation and increasing cloud-adoption, highlights how businesses have realized the importance of the third platform, as it interconnects mobile computing, cloud computing, social media, and information analytics. 2019 has been the year of edge computing and the dawn of the SD-WAN.

[PromCon Recap] A Look at TSDB, One Year In

This is a writeup of the talk I gave at PromCon 2019. TSDB is the storage engine of Prometheus 2.x. Based on the Gorilla compression, it started out in an independent repo, which eventually attracted 60+ contributors and 771 stars. There were 500+ commits after the Prometheus 2.0 release. The repo was archived in August 2019, and now it’s a part of the Prometheus repo, inside the tsdb directory. Here are some highlights of the development over the past year.

Alternative to Splunk: Pandora FMS as a monitoring tool

The American magazine “Fortune” specializes in global banking, business and finance… What does it have to do with monitoring? Well, in one of its annual lists, the Fortune 100 (the largest companies on the planet), 92 companies use Splunk software… If we compare by volume of money, yes, Splunk would be the best software and that’s where this article would end.

Storing and enriching alerts for information security with Elasticsearch

Within Elastic, the information security team is tasked with security detection and analytics, among many other activities of a typical information security team. To find abnormal and malicious behavior within our environment we leverage Elastic SIEM for investigations and threat hunting. When we find a pattern of behavior we want to be alerted on during an investigation or hunt we take the request JSON behind our investigation and put in to Watcher for alerting.

Solve The Cold Start Issue with Lambda Provisioned Concurrency

Cold Starts have been a massive issue with FaaS. In summary, it makes functions slower to startup in some cases. That’s in the opposite way of every effort to improve web applications performance. Many efforts have been made in the recent years to solve AWS Lambda cold starts or educate on handling them. Many have mitigated the issue, but none really solved it. AWS has just made a great progress on the area with the Provisioned Capacity feature announcement.

Virtualization Monitoring with OpsRamp

Hypervisor-based server virtualization is widely used in hybrid IT environments for better infrastructure utilization, improved disaster recovery, and considerable cost savings. Given the complexities involved in managing virtualized environments, IT teams need the right insights for virtual resource monitoring so that they can address performance issues quickly.

How to Choose a Web Hosting Provider

Are you starting up a new business website, or just looking to change hosting to a new provider? Identifying the right web host for your website can be a real headache for businesses. There are so many providers out there, all offering a variety of features that all appear quite similar, making it difficult to determine which hosting is right for you. To help you choose a web hosting provider, we will first aim to help you define the hosting needs for your website.

How to Convert More Leads, Retain More Customers & Grow Your Revenue with Encharge.io

Marketing automation is everywhere. It helps make processes that would have otherwise been performed manually much more efficient, as well as making new processes possible. Marketing automation is used to deliver targeted messages across multiple channels (SMS, push notifications, social media messages, direct mail, etc.) to a broader audience at the right time.