Operations | Monitoring | ITSM | DevOps | Cloud

%term

Monitoring multi-cloud container storage with Portworx and Datadog

Portworx provides solutions for Kubernetes storage as well as other leading container schedulers, dramatically reducing storage, compute, and infrastructure costs for running mission-critical, multi-cloud applications with zero downtime or data loss. With Portworx, you can manage any database or stateful service on any infrastructure using any container scheduler. Portworx is trusted by many of the world’s most sophisticated IT organizations including Comcast, GE, Lufthansa Systems, the U.S.

Less is more: Role-based performance monitoring with OpManager

Much of a business’ strength lies in its network infrastructure. One way to keep your business up and running is by proactively monitoring key network performance indicators. However, with a plethora of parameters to keep an eye on, and a lot of data to skim through, there’s only so much an IT professional can do while troubleshooting. This is a common challenge many IT teams in the network infrastructure monitoring field face, and it often increases the time taken to resolve issues.

New Container View in infrastructure monitoring

Containers are eating the world and the newly added Containers view in Sematext Cloud helps you manage that. You can experience container monitoring with the new Containers view that provides you with enhanced visibility into all your hosts and containers, drawing your attention to the ones that need it the most.

Feature Spotlight: DNS Checks

The Domain Name System (DNS) is brilliantly designed as a hierarchical structure, ensuring that any single point can fail with the system remaining relatively intact. There are some nuances to this statement, like caching issues that arise from outages, but the overall focus is on uptime. This is why the DNS check is a critical part of your IT uptime monitoring process.

Top 7 DevSecOps Tools

CNN recently estimated that in the first six months of 2018, the cryptocurrency market lost approximately $731 million to hackers and theft. One of the most famous software breaches—which caused major panic in the market—involved Cointhumb, a cryptocurrency exchange with more than 1 million users. In this breach, hackers stole around $32 million from customers’ wallets.

How to train alerts & set resolution states in SCOM with EZalert v2

EZalert is a tool that uses machine learning to help you manage your SCOM environment in a more efficient and effective way, it helps you filter out noisy alerts and lower the total cost of ownership. When starting out with EZalert, you will have to start “training” EZalert to handle new incoming alerts.