Operations | Monitoring | ITSM | DevOps | Cloud

%term

Feature Spotlight - Incident Insights

To help mitigate and resolve incidents even faster, our AI-powered incident insights provide immediate and actionable suggestions during the response process and provide additional context during post-incident reviews. From the Insights panel, you can easily review suggested resolvers and information about similar incidents that may help with the resolution process. To help further speed things up, when an insight is more likely to help resolve the incident, it's displayed as a popup in the Incident Console.

Comparing Azure NSG and VNet Flow Logs

Phil Gervasi compares Azure NSG Flow Logs and VNet Flow Logs, explaining the benefits VNet Flow Logs bring to network observability in Azure environments. Learn how VNet Flow Logs simplify network monitoring, improve traffic visibility, and address the limitations of NSG Flow Logs by capturing traffic at the virtual network level. Learn about VNet Flow Log applications—including traffic analysis, network optimization, and security enhancement—and how Kentik integrates with these logs for deeper insights and advanced analytics.

Top 5 Obstacles to Observability in 2025

I’ve spent over 25 years in tech product marketing and customer support, working with pioneering companies like Dell/EMC, Apple, Keeper Security, and now, SolarWinds. In my current role, I’ve had the privilege of helping organizations of all sizes achieve comprehensive observability in their IT environments. I’ve also witnessed firsthand the challenges that can arise on this journey.

Datadog Pricing: All your Questions Answered

When it comes to monitoring and observability tools, Datadog is often one of the first names that comes to mind. But while Datadog’s features are widely discussed, its pricing often remains a topic of confusion. How much does Datadog cost, and what factors influence your bill? This guide breaks down Datadog pricing to help you better understand its structure, hidden nuances, and whether it’s the right fit for your needs.

An Easy Guide to OpenTelemetry Environment Variables

When working with OpenTelemetry, environment variables play a crucial role in configuring and customizing your setup. These variables provide a flexible and convenient way to adjust settings without needing to change code, allowing you to fine-tune your OpenTelemetry installation across different environments.

Mobilize your Monitoring and Management with Pulseway

Monitoring and managing IT assets shouldn't tie you to your desk all day. Imagine having the freedom to move around and monitor assets right from your mobile device. This mobility means you can catch and address potential issues instantly, no matter where you are, improving uptime and efficiency. Our blog explores how Pulseway's mobile-first remote monitoring and management solution (RMM) solution empowers you to handle critical tasks from anywhere, keeping your IT environment in top shape.

Top 5 Database Monitoring Software: Optimize Performance and Prevent Downtime

Databases are the foundation of modern applications, right from e-commerce platforms to social media networks. As the need for real-time data increases, businesses require tools that ensure their databases function efficiently. These database monitoring tools play a crucial role in preventing downtime, improving the speed of data retrieval, and scaling operations as business demands grow.

Fast and furious: The importance of performance in the digital age

As someone who's been in the tech space for years, I've seen the evolution of user expectations and the way businesses have adapted to the digital world. What strikes me most today is how fast things have to move. I remember a time when uptime alone was the key to a successful service. Today, it’s no longer enough for a service to just be “up”—it needs to be fast, seamless, and reliable at all times.

Mastercard's DNS Misconfiguration: Lessons Learned and How DNS Spy Can Help

In January 2025, security researchers uncovered a critical DNS misconfiguration involving Mastercard. For nearly five years, one of Mastercard’s DNS records pointed to the incorrect domain "akam.ne" instead of the intended "akam.net." This error, caused by a simple typographical mistake, created a vulnerability that could have allowed malicious actors to intercept or redirect traffic.