Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

How LM Logs Makes Data Meaningful

Before I get started on how excited I am to see LogicMonitor launching a logging product, here’s a little background information. This blog is probably a blast from the past for many longtime LM employees and customers. I served at the company for over seven years, starting from back when it was just a few of us trying to see if a SaaS monitoring product would be accepted in the marketplace (while seemingly crazy to say now, SaaS was a tough sell back in 2011).

Who Uses A Network Performance Monitor

Network performance monitoring has become a standard practice for modern businesses. With the shift towards large cloud-based applications, and hosted services, businesses rely on optimal network performance to sustain some of their key applications. Because of that, tools like network performance monitoring software have piqued the interest of users even outside of the IT team.

Introducing Agent Modes

Today we are introducing the Agent Modes to help our users to configure the client / server relation between monitoring agents. This article describes the differences between the old settings and the new one. The documentation on Agent Modes is available at Agent Modes. This article refers to old settings that are no longer available in the App and it should be read only by users used to these old settings.

Securing Kubernetes clusters with Sysdig and Red Hat Advanced Cluster Management

In this blog, we introduce the new integration between Sysdig Secure and Red Hat® Advanced Cluster Management for Kubernetes that protects containers, Kubernetes, and cloud infrastructure with out-of-the-box policies based on the Falco open-source runtime security project. Organizations are quickly growing their Kubernetes footprint and need ways to achieve consistent management and security across clusters.

Highlight Critical Security Attacks with Logz.io's New Alerts Correlation

The ever-evolving cloud-native landscape creates constantly changing attack surfaces. As a result, teams implement a whole suite of security tools to identify large varieties of vulnerabilities and attacks, as well as monitor more logs than ever to find malicious activity. But monitoring so much information can cause a barrage of notifications and alerts. Even if you’re identifying real security threats, it can be impossible to know where to start and where to focus.

Are these distractions breaking up your product focus?

Maintaining product focus is the best way to guarantee a successful business. As the late great Steve Jobs put it: “if you keep an eye on the profits, you’re going to skimp on the product… but if you focus on making really great products, the profits will follow.” There are a wide variety of statistics available on how much time developers actually spend writing code, anywhere from 25% to 32%.

Three Reasons Why Hosted Rancher Makes Your Life Easier

Today’s generation of makers, artists and creatives have reinforced the idea that great things can happen when you roll up your sleeves and try to learn something new and exciting. Kubernetes was like this only a couple of years ago: the mere act of installing the thing was a rewarding challenge. Kelsey Hightower’s Kubernetes the Hard Way became the Maker’s handbook for this artisan craft.