Operations | Monitoring | ITSM | DevOps | Cloud

Incident Management

The latest News and Information on Incident Management, On-Call, Incident Response and related technologies.

How to Achieve Measurable Reliability Results

Reliability is more important than ever. As users depend on services more and more, and competition in every sector grows, a great digital experience becomes the baseline for expectations, not the ceiling. It’s crucial to invest in making your software reliable enough to keep customers happy. ‍ But what does investing in reliability look like?

Launched - Zenduty Web v2.0

We constantly update the platform to provide the best-in-class experience to our users. These updates are not something that we feel is right for the client; these updates are based on the user data, behavior, and requests that our users provide. We are always excited to bring new updates and share them with people but this one is special! We bring to you Zenduty Web v2.0!

The Reverse Red Herring

During an incident, time is fungible. At points it seems to go way too fast, and at times it seems like an eternity for a command to complete. More importantly, however, is how it feels to be in an incident. It’s a heightened state of being, where any and every piece of information could be “the one” that helps crack open what is really going on. Likewise, there is an inherent distrust of incoming information.

Micro Lesson: Troubleshoot an Incident Using Root Cause Explorer

The video uses a scenario to demonstrate how to use Root Cause Explorer to analyse and troubleshoot an incident faster. The video shows how Root Cause Explorer helps you dig deeper into the relevant logs and traces in order to isolate the root cause using various dashboards.

Are your SLOs realistic? How to analyze your risks like an SRE

Setting up Service Level Objectives (SLOs) is one of the foundational tasks of Site Reliability Engineering (SRE) practices, giving the SRE team a target against which to evaluate whether or not a service is running reliably enough. The inverse of your SLO is your error budget — how much unreliability you are willing to tolerate.

Sponsored Post

How to implement a Blameless Postmortem (part two)

This is Part 2 of a two-part series on Blameless Postmortems. The previous article went into why blameless postmortems are so effective; this second part goes into detail on how to build your own postmortem process and kick it into overdrive. Read Part 1 here. So you've read our first installment and recognized the value of the blameless postmortem for efficiency, culture, and output. Now you're ready to get off the blame train and kickstart a blameless postmortem process of your own. Where to begin?

May 2022 Update - Templates, scheduler enhancements, landline numbers, and more

Our May update brings Signl templates for manual alerting, improvements for duty scheduling and various enhancements in the web portal. Another new feature is the possibility to notify through calling landline numbers. All details can be found in this blog article.

SIEM: Introduction to SIEM and 4 Top SIEM Tools

Security Information and Event Management (SIEM) technology has become a fundamental part of identifying and guarding against cyber attacks. It is one of the essential technologies powering the modern security operations center (SOC). SIEM is an umbrella term that includes multiple technologies, including log management, security log aggregation, event management, event correlation, behavioral analytics, and security automation.