Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Real User Monitoring for JavaScript with Retrace

Real User Monitoring, also known as End User Monitoring or RUM, is a way of monitoring the client side portions of an application. Real User Monitoring for JavaScript allows developers to have access to key metrics for load times and user paths being used in production as part of their application performance management (APM).

How to make snaps and configuration management tools work together

In environments with large numbers of client machines, configuration management tools are often used to simplify and standardize the target state of each host in a seamless, automated and consistent manner. Software like CFEngine, Chef, Ansible, and others offer a high degree of granular control over software packaging and system configurations.

Deployment Pipeline Launch

Deploying a stack into AWS is at the core of what Stackery helps you do. So much so that Stackery users deployed over 10,000 times last month! For the most part, this has been a manually executed process in our Web UI or command-line client. As teams grow and take on more work, fast and consistent deployments are key to scaling effectively. That’s why we’ve been working this year on continuous integration and deployment (CI/CD) features, tailor-built for serverless applications.

VMworld Recap: Modernizing Infrastructure and Applications with VMware Tanzu

A lot has happened since VMworld 2019. OK, that might be the understatement of the year. But in that time, VMware Tanzu has evolved into a broad portfolio for building and modernizing applications. Operations teams now have what they need to build a more secure software supply chain. And, at the foundation, vSphere pros have a simplified way to get started with Kubernetes.

Our IT transformationstrategyequals three zeros

When I joined ServiceNow, IT Operations had what I’d call a “best effort” strategy—push hard, keep things running, meet your SLAs, and so on. This worked well enough, but that was hardly a formula for long-term success at scale.   We needed a new way of thinking that would move us from our traditional role as incident firefighter to that

Solving Runaway Series Cardinality When Using InfluxDB

In this post, you’ll learn what causes high series cardinality in a time series database and how to locate and eliminate the culprits. First, for those of you just encountering this concept, let’s define it: The number of unique database, measurement, tag set, and field key combinations in an InfluxDB instance. Because high series cardinality is a primary driver of high memory usage for many database workloads, it is important to understand what causes it and how to resolve it.

Working in the SOC with Power Tools: Splunk and Polarity

Have you ever had to saw through a board by hand? I had to finish a partial cut by hand the other day while building a new mantle for my fireplace. It’s slow and difficult, and it often results in a lesser quality cut than one done with a power tool. It’s good exercise, though! We should all have to do it at least once so we appreciate our power tools more.

Sponsored Post

Reduce MTTR with Crowd-Sourced Analytics

The new normal for enterprises today is to witness the vast majority of its employees working remotely across multiple geographic locations and communicating through cloud applications such as Office 365, Slack, or video conferencing tools such as Microsoft Teams or Zoom. As more users feel the need to avoid travel and stay at home due to Covid19, it becomes critical that the underlying infrastructure monitoring these applications respond immediately to service disruptions and sub-optimal performance. The slower an application becomes, the more negative impact it can have on employee productivity and the firm's ability to conduct business smoothly.

Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures cover every aspect of a network environment. To understand why monitoring your whole environment is so important, let’s take a look at what an attacker might do once they get inside your organization.

Monitor Auth0 with Datadog

Auth0 provides identity as a service (IDaaS), allowing you to secure your apps and APIs without having to write your own authorization code. Auth0 can work with social identity providers (IdP) like Google and Facebook so your users can access your app by using their existing accounts for authentication. You can also use an existing enterprise identity provider (e.g., LDAP) to allow your users to leverage single sign-on (SSO) across multiple apps.