Operations | Monitoring | ITSM | DevOps | Cloud

Blog

The top 10 reasons companies are choosing Opsgenie over competitors

Over the last six months, Opsgenie’s customer base has expanded significantly. We’ve become the tool of choice for teams that are new to operating always-on services, as well as those who have been left disappointed by alternative solutions. We can claim many advantages over our competition, but here are the top ten reasons Dev and Ops teams are choosing Opsgenie.

Searching for Actionable Signals: A Closer Look at Time Series Data Anomaly Detection

Simple enough to be embedded in text as a sparkline, but able to speak volumes about your business, time series data is the basic input of Anodot’s automated anomaly detection system. This article begins our three-part series in which we take a closer look at the specific techniques Anodot uses to extract insights from your data.

Linux Security Guide: How to Investigate Suspected Break-in Attempts in Linux

Scenario Linux has a number of built-in tools, commands and files which can track and store information about every user activity. These tools are common in most Linux distributions and can be used to investigate suspicious logins or failed login attempts into the system. In this article, we will talk about some of the initial methods to identify possible security breaches. We will use an Amazon EC2 instance to show these commands.

.NET monitoring with Datadog APM and distributed tracing

Since it was first introduced in 2002, Microsoft’s .NET Framework has garnered a robust user base that includes organizations like UPS, Stack Overflow, and Jet.com. And now, thanks to the rise of the .NET Core runtime, this high-performance framework also supports cross-platform development. To provide deeper visibility into all of these environments, we are pleased to announce that Datadog APM and distributed tracing are generally available for .NET Framework and .NET Core applications.

What Your Kubernetes Security Checklist Might Be Missing

New technologies often require changes in security practices. What is remarkable about containers and Kubernetes, is that they also provide the potential for enhancing and improve existing security practices. In this post, I will share a model that we use at Nirmata to help customers understand security concerns and plan Kubernetes implementations that are secure.