Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Investigating Timeouts with Tracing

Tracing is one of the key tools that Honeycomb offers to make sense of data. Over the last few weeks, we’ve made a number of improvements to our tracing interface — and, put together, those changes let you think about traces in a whole new way! Tracing makes it easier to understand control flow within a distributed system. We render traces with waterfall diagrams, which capture the execution history of individual requests.

Cassandra vs. MongoDB vs. Hbase: A Comparison of NoSQL Databases

Unlike traditional SQL databases, NoSQL databases, or “non-SQL” databases, do not store their data in tabular relations. Originally designed for modern web-scale databases, they have found widespread use in present-day big data and real-time web applications. Some of the most commonly used data structures include key-value, wide column, graph, and document stores.

How Grafana Labs is Democratizing Metrics Now

Metrics for all – and all for metrics. At Grafana, we not only strive to give people a “single pane of glass” to unify observability metrics. From the very start, our mission has been to advocate for the democratization of metrics, which is the idea that the paradigm needs to shift between who can store data, why they need to store it, and, ultimately, what they’re able to with it. And Grafana users are a great example of how vast and varied the needs are for data access.

Icinga Reporting - Hands On

After our initial release of Icinga Reporting for early adopters we continued our development and are happy to release v0.9.1 today. The release includes bug fixes and some minor enhancements for the usability. I want to take this opportunity to write a post aimed at the people who are new to the whole reporting shabang – like me. This week I set out to figuring out for myself why one would need to use reporting and how to get there – and to share my new knowledge with you!

Let's go dark!

There was time, where CRT screens were ubiquitous. In this time dark websites were pretty common since the way CRT screen emits light worked pretty well with dark colours. Then LCD screens came into every hour. Those were pretty bad compared to CRT, especially in terms of showing true shades of grey. This was the end of black websites popularity. Dark went underground.

Java runtime monitoring with JVM metrics in Datadog APM

Whether you’re investigating memory leaks or debugging errors, Java Virtual Machine (JVM) runtime metrics provide detailed context for troubleshooting application performance issues. For example, if you see a spike in application latency, correlating request traces with Java runtime metrics can help you determine if the bottleneck is the JVM (e.g., inefficient garbage collection) or a code-level issue.

The Top 5 Pitfalls of Serverless Computing and How to Overcome Them

Serverless first came onto the scene in 2014 when AWS Lambda was launched. It offers a dynamic cloud-computing execution model where the server is run by the cloud provider. As with any relatively recent technology, its novelty results in a steep learning curve, and it comes with its own set of benefits and drawbacks.

Abstracting Credentials from Python Scripts

Python has rapidly grown into one of the most popular languages for automation. That’s why LogicMonitor supports Python when it comes to managing your LM portal and expanding your monitoring coverage with scripts. During your scripting adventures, you may find yourself wanting to take your work to the next level. One widely-applicable improvement is credential abstraction.

Helping IT admins tackle commonly encountered web application issues

Unless there’s been a huge breakthrough in technology that proves beneficial to employees, or something goes wrong that affects the business’ typical work processes, IT teams’ efforts often go unnoticed. Since significant breakthroughs are few and far between, more often than not, when someone’s contacting IT, it’s with a problem.

Logs monitoring

Logs Monitoring plays an important role in analyzing, troubleshooting and alerting on problems. Organizations have lots of data in logs that should be mined to get valuable insights on users, applications and systems behavior. Real time alerting from logs monitoring does help in identifying the problems early. It also provides security related insights when someone is trying to break into your organization.