Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

NiCE Linux Power MP 1.00 released

Speed up your IBM Power servers like never before. In IBM Power System environments, processing time is costly and is measured in work units. A CPU hog on any Linux server can become expensive. Under-provisioned systems react slowly on queries from business applications, which then cause undesired end user or processing delays. As IBM Power servers typically run business critical workloads, response time and availability is key.

Types of DNS Attacks and How Application Monitoring Can Help

DNS, the Domain Name Service, is the Internet service that translates IP addresses into hostnames, and visa versa. It enables you to type www.exoprise.com in a browser, or send an email to someone at that domain, and have your request actually go to 35.172.52.247. As a vital part of the Internet infrastructure, DNS attacks can have a serious impact on your online operations, including access to your website and email.

Announcing the latest dashboard enhancements

When we first released our custom dashboard over a year ago, we had the needs of our customers in mind. The customizable tiles go a long way in ensuring that the dashboard meets your data display needs while being easy to use. We’re always improving the Raygun dashboard—here’s the latest from the app team.

Automate Tasks with AWS Systems Manager and Opsgenie Actions: A Use Case

Opsgenie Actions enable you to automate manual, repetitive tasks so that your resources are freed up to concentrate on higher-value work. This blog post is the first in a series of use cases in which we discuss how Opsgenie works with various third-party automation platforms to automate these traditionally manual tasks—right from the Opsgenie console or mobile app— to reduce interruptions for your on-call responders, and ultimately help your bottom line.

SIEM vs. Security Analytics

SIEM has been with us for almost two decades now and is seen as a proven approach to dealing with potential threats as well as actual attacks on business critical systems. But today, it is becoming clear that changes in IT infrastructure and deployment practices are giving rise to new challenges that cannot be met by existing SIEM platforms.

Apply for Sentry's Open Source Grant

Work should be fun. Sometimes it’s not, especially when your full-time job isn’t aligned with something you care about — like open source. Contributing to open source full-time is an opportunity not available to everyone. We’d like to change that with the Sentry Open Source Grant, which offers funding to an individual dedicated to working on an open source project for three months.

Windows Management Instrumentation in remote monitoring

Pandora FMS features include decentralized monitoring, which is based on several standards and/or protocols of common and open use (SNMP v1 and v2 -v3 from version 7.0 NG 727-, ICMP and WMI). In this article we will talk about the latter, starting from the simplest and with references to each of the articles published here in your blog.

Coding with Confidence - CloudBees + Honeycomb

DevOps, Observability, Continuous Delivery, Test in Production, Chaos Engineering, and Software Ownership are all major themes in software development today, but why? In an ideal world, we get everything right the first time, nothing breaks, no one DDOS’ us, and the weather report is “Cloudy With A Chance of Meatballs.” Reality of course is different – and better, to be honest.

Why ITOps still suffers from alert fatigue

It takes a lot of time, effort and money to configure centralized monitoring. Making it all the more frustrating that those carefully crafted alerts will probably just end up being ignored. So why has the whole of ITOps collectively decided to banish your monitoring alerts to their junk folders? The simple answer: alert fatigue.

Introduction to Kubernetes Namespaces

Kubernetes clusters can manage large numbers of unrelated workloads concurrently and organizations often choose to deploy projects created by separate teams to shared clusters. Even with relatively light use, the number of deployed objects can quickly become unmanageable, slowing down operational responsiveness and increasing the chance of dangerous mistakes.