Operations | Monitoring | ITSM | DevOps | Cloud

%term

Making the Switch to Hosted Monitoring

Implementing a monitoring solution is no small task; with your company's data growing, it can feel impossible. Often, small teams develop their own monitoring infrastructure because it is more cost-effective than a platform. But when your business grows, your data does, too. Monitoring can quickly become a bigger challenge than a small team can handle, and some companies need more resources to hire a developer dedicated to their monitoring.

From Basic Monitoring to Modern Observability: Shifting Right and Observability as Code

I've been in the observability market long before it even had that name. Over the years, observability has undergone a significant transformation. As someone who has witnessed these changes firsthand, I can attest to the dynamic nature of this field. In the early days, it was largely about basic monitoring: tracking system metrics, lots of logs, and simple alerts.

ITIL Best Practices to Get Started With The Framework

Starting with ITIL can be overwhelming, especially when you’re unsure of where to begin. Don't worry; we’re here to help you take the right steps with some essential ITIL best practices. This article will guide you in building a solid foundation for implementing ITIL effectively before diving into the official components of the framework. We've gathered these practical steps to set you up for success in managing IT services that align with your organization’s goals.

Visualise your Icinga Cluster with Clustergraph

This is a guest blogpost from Dave Kempe from Sol1 At Sol1, we provide services around scaling and automating Icinga rollouts for customers. In large environments, we make heavy use of the excellent distributed monitoring features of Icinga to build redundant clusters across datacenters. Icinga uses the object types of Endpoints and Zones to designate the cluster layout, where a Zone contains Endpoints, and may have a parent Zone. Using this logic, a Zone with no parents is the top level zone.

What Is PGP Encryption? Meaning, Uses, & Examples

PGP (Pretty Good Privacy) is software that encrypts data. It’s widely used, and has become the standard for email and file encryption, making it an important component of cybersecurity. This article explains what PGP Encryption is in detail, its purpose, and its real-world applications, as well as how and when you should use it.