Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Analyzing Tomcat logs and metrics with Datadog

In Part 2 of this series, we showed you how to collect key Tomcat performance metrics and logs with open source tools. These tools are useful for quickly viewing health and performance data from Tomcat, but don’t provide much context for how those metrics and logs relate to other applications or systems within your infrastructure.

Introducing Sysdig Secure 2.2: Kubernetes auditing, compliance, and access control.

Over the past four years we’ve helped hundreds of organizations run reliable, secure, and compliant Kubernetes and Openshift clusters. Some of the key themes we’ve seen from organizations that have successfully grown their Kubernetes footprint are: they have immaculate labeling, understand how to leverage internal Kubernetes features to harden their platform, and understand what developers need access to and manage it with RBAC and namespaces.

Part I: Anomaly Detection in monitoring: what can we really do?

In recent years we have frequently found the term anomaly detection in monitoring. In fact, some monitoring tools have introduced in their features the customized application of anomaly detection algorithms and some companies offer anomaly detection from data collected by monitoring tools.

Take your ITIL incident management to the next level with Enterprise Alert

ITIL incident management aims to manage the lifecycle of all incidents. And the simple goal is rapid response and resolution, hence IT uptime, as modern IT is the backbone of a rapidly growing number of processes. Enterprise Alert is the perfect tool to accelerate and mobilize critical parts of the incident management process. It has a significant impact on the effectiveness and efficiency of handling time-sensitive and major incidents.

Incident Communications - Get Ready for Black Friday/Cyber Monday 2019!

As the year draws to a close, for many of us this is a time to slow down, kick back and look forward to holiday time. For others, the work certainly isn’t done yet. The “S” word comes down to bear. Like it or not, this time of year – it’s all about the Shopping.

Sponsored Post

A guide to Apdex score: Calculations, improvements, and more

Apdex scores are a fantastic, simple tool you can use today to better understand how your development team is doing, how it can be improved, and the impact of almost every change to your service. They're also likely a part of your Service Level Agreements (SLAs) with your customers, which help them understand your platform's availability.

Container security orchestration with Falco and Splunk Phantom

Container security orchestration allows to define within your security policy how you are going to respond to your different container security incidents. These responses can be automated in what is called security playbooks. This way, you can define and orchestrate multiple workflows involving different software both for sourcing and responding. This is how Falco and Splunk Phantom can be integrated together to do this.