Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Closer Look: OpsRamp Intelligent Alert Escalation (Part 1)

Alert management is no longer a manageable task, given the growth in applications, cloud environments and point monitoring tools. Too much time is spent filtering and making sense of alert data and determining where to route incidents. All of these steps slow down critical issue identification and resolution. In this article, I want to discuss a more sensible, modern way to deal with IT alerts, through machine learning intelligence and automation.

How to build a DevOps pipeline

DevOps is an approach to software development and delivery that emphasizes collaboration between different stakeholders. DevOps also places priority on automation and the integration of different tools in a single, well-oiled pipeline. Ultimately, DevOps boils down to cultural values and goals. When it comes to tooling and processes, there is no one right way to “do” DevOps; a variety of different approaches are possible.

Why Stack Trace APM Isn't Enough for Complete Web Application Monitoring

It’s probably true to say that if you asked an average user what makes a great web application, they’d probably say “speed.” But speed is the probably the least important aspect of an extensive rundown of elements. Factors like application development and rendering in the program are probably higher on that list. And what makes up a great performing application? And when something goes wrong, how do you know?

Hardening Your Windows Server in 2020

Security is vital for protecting company assets and data subjects. Evolving data protection regulations, like the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), have thrown light on security breaches and the security architecture of those compromised. In 2019, the global average cost for a data breach was $3.9 million, not including reputational damage and hidden costs.

The essentials of monitoring AWS Elastic Load Balancing

AWS Elastic Load Balancing (ELB) dynamically distributes incoming application traffic across multiple EC2 instances and scales resources to meet traffic requirements. Elastic Load Balancing helps optimize the performance of various web and mobile applications by identifying failing EC2 instances before they affect the end-user experience.

ISO/IEC 20000 certification: What it is, why your organization needs it, and how to get it

One of the most important things that customers consider while purchasing a product or service is its credibility. A label that states the product has been tested, analyzed, and certified by an international regulatory body reassures a customer’s purchase decision. This is why organizations today strive to get themselves bench marked, differentiated, and validated. For this, they seek out regulatory bodies that develop and publish international standards.

GrafanaCONline Day 9 recap: Prometheus rate queries explained, and inside one company's adoption of a central telemetry platform

We’re into the third and last week of GrafanaCONline! We hope you’re able to check out all of our great online sessions. If you didn’t get a chance to watch yesterday’s sessions (or want to see them again), here’s a recap of day 9 of the conference.

The UX changes we made for Grafana 7.0 -- and what you can learn from them

Behind every part of Grafana, there are the ideas, creativity and commitment of the people who made it. While that includes code, it is not limited to it. Since August 2019, Grafana Labs has had a dedicated UX team, and we have been involved in countless recent features and improvements. We want to show you how we do our work, why you users are at the heart of everything we do – and most importantly, how design changes can make software better.

Kubernetes disaster prevention and recovery

Yeah, Kubernetes is great at making sure your workloads run as needed. But another of its amazing benefits is its ability to recover from failure all by itself. On an everyday basis, Kubernetes takes care of the complicated task of container orchestration. However, as with any complicated system, there is always the chance that you’ll experience failures and downtime.

Detect reverse shell with Falco and Sysdig Secure

Reverse shell is a way that attackers gain access to a victim’s system. In this article, you’ll learn how this attack works and how you can detect it using Falco, a CNCF project, as well as Sysdig Secure. Sometimes, an application vulnerability can be exploited in a way that allows an attacker to establish a reverse shell connection, which grants them interactive access to the system.