Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

LogicMonitor's Best Practice Approach to Security

A few months ago, LogicMonitor was certified to the ISO 27000 standards for Information Security management, so I thought I’d take the opportunity to write a bit about our efforts to build our information security certification program as well as our own best practices for secure use of the LogicMonitor platform.

Xray 2.10 Released: New Package Support, an IDE Plugin and More.

Our user community spoke and we listened. You asked for Xray to be even more universal and support more package types… in particular Go and PHP Composer. With Visual Studio Code (VSCode) now having more than 4.5 million monthly active users, we also added a new VSCode plugin for Xray. This broad adoption of multiple programming languages and package types across organizations, is driving up the need for a more universal DevSecOps solution supporting more package types.

Post Mortems- Bringing clarity to incident reviews

An incident post mortem is known by many names- incident review, root cause analysis (RCA), learning review, but what do they entail?. A post mortem is a post-incident activity to help organizations understand how the incident happened and to learn from it. Service incidents are an unavoidable hurdle for any company when they do happen, the teams working will be wholly focussed on restoring service as quickly as possible.

What is RAID? What types of RAID are out there?

What is raid? Do you want to find out? The term RAID is related mostly to those components of our computers that allow us to store information and get our computer up and running properly.. What would we do without hard drives? Well… In this article we are going to learn what a RAID is and some of the types of RAID that exist. Let’s go!

Monitor Java memory management with runtime metrics, APM, and logs

The Java Virtual Machine (JVM) dynamically manages memory for your applications, ensuring that you don’t need to manually allocate and release memory in your code. But anyone who’s ever encountered a java.lang.OutOfMemoryError exception knows that this process can be imperfect—your application could require more memory than the JVM is able to allocate.

The first rule about technical debt - never talk about technical debt

Have you ever been frustrated that your warnings and opinions on technical debt are going unheard? Or you’ve felt pushed to deploy code and software updates that are either not ready, or will cause your team more headaches than other stakeholders appreciate? You’re not alone. Whether you are building an early-stage startup or working at a vast 20-year-old monolith, technical debt mounts as you make changes and deploy new functionality.

Deploying the ELK Stack on Kubernetes with Helm

ELK and Kubernetes are used in the same sentence usually in the context of describing a monitoring stack. ELK integrates natively with Kubernetes and is a popular open-source solution for collecting, storing and analyzing Kubernetes telemetry data. However, ELK and Kubernetes are increasingly being used in another context — that of a method for deploying and managing the former.

WSUS: The outdated way of staying updated?

WSUS (Windows Server Update Service) is an add-on provided by Microsoft for patching Windows applications. Along with being free, the basic functionalities that WSUS provides makes it an easy choice for major SMBs. However, in reality, WSUS falls short in a number of ways; because of this, many teams that rely on WSUS for their patching needs end up investing in additional tools that usually come at an additional cost.