Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Cloud monitoring, security and related technologies.

SaaS, PaaS & IaaS: The Ultimate Guide To Cloud Service Models

The emergence of cloud computing. Arguably the biggest change in technology in decades, cloud computing changed how technology would now develop and how businesses and organizations would operate. Indeed, the enormous popularity of cloud services is due precisely to that: you can get different models depending on your operational needs. To properly utilize these cloud service models, you should understand the differences in their functional capabilities and the ideal use cases for each model.

What Is AWS Compute Optimizer? A Newbie-Friendly Guide

Amazon Web Services (AWS) offers the convenience of choosing specific virtual machine combinations to meet your compute needs. Unlike traditional data centers, you can also scale your cloud resources automatically to meet fluctuating workload needs. The best part is that you can rightsize your workload requirements to specific instance types (VM types) offered by AWS. By hand, this takes a lot of time and is prone to errors. This is where AWS Compute Optimizer comes into play.

What's new in Turbo360 - Reservation recommendations report, Automatic cost anomaly detection....

Turbo360 brings a suite of enhancements this month, which includes automatic cost anomaly detection, group budget monitoring, and savings alerts based on rightsizing and reservations. Plus, generate reservation recommendation reports for Azure subscriptions with the Azure Documenter. Experience a smoother workflow with improved service principal access policies and much more!

How to restore lost access to the site

The modern world dictates new conditions for doing business. One of them is the creation of online platforms. Business owners create websites to sell goods and corporate portals to store information and provide convenience for their employees. Losing access to such websites means loss of profits and the possibility of data loss. Such a situation is a threat to business, so it is better to find out how to restore access to your portal in advance.

How to Propagate OpenTelemetry Trace Headers Over AWS Kinesis: Part 1

Welcome to our series on navigating the complexities of trace header propagation with OpenTelemetry in AWS Kinesis. In this 3-part exploration, we'll dive into the critical role of trace headers in distributed systems, discuss the unique challenges presented by AWS Kinesis, and explore innovative solutions that keep your data tracking robust and consistent.

SharePoint Document Library Security

In the digital age, where data flows as freely as water, securing our digital documents and libraries has become a paramount concern. As we navigate through an ever-expanding digital universe, the line between accessibility and security is often blurred. Striking the perfect balance requires not just technical know-how but a strategic mindset. Setting appropriate permissions is not just a safeguarding tactic; it’s a critical component of modern data management.

Instrumenting using the Java OpenTelemetry OTLP

Java has long been a foundational pillar in application development, its versatility and robustness serving as key drivers behind its widespread adoption. Since its inception, Java has evolved to meet the ever-changing demands of scalable deployments, offering a reliable platform for creating everything from web applications to complex, server-side systems.

Datadog Cost Management: How To Optimize Your Datadog Costs

Datadog is like a Swiss Army knife for observability. Whether it’s cloud, applications, or infrastructure, Datadog can serve all your monitoring needs under one roof. This is with a level of integration that’s akin to having a universal remote for all your digital operations, from on-premises to cloud environments. The thing is, with great power comes a notable concern – cost.

How "Cloud Repatriation" Adds Flexibility and Power to Your Digital Transformation Playbook

The notion of moving assets out of the cloud may sound like a step backward in an era where digital transformation is driven primarily by migration efforts into the cloud. But it turns out deliberately shifting cyber assets away from the cloud– known as “cloud repatriation”– can be a highly strategic option for CIOs and enterprise IT teams looking to strike the optimal balance of cost, security, performance, and scalability in their IT environments.

AWS Observability in Grafana Cloud: A simpler, more intuitive cloud monitoring app

We know monitoring your AWS environment can be difficult, which is why we’re thrilled to tell you about a new application we’ve built to make the entire process easier, more efficient, and more intuitive. We’ve offered AWS monitoring capabilities for some time, but with the AWS Observability application in Grafana Cloud, we’ve distilled our collective efforts into a more integrated and potent solution.