Operations | Monitoring | ITSM | DevOps | Cloud

Track Datadog metrics in Sleuth

Data from monitoring tools like Datadog are useful for developers to help them understand whether the code they've deployed is healthy or needs to be fixed or rolled back, or when there is an incident to investigate. As a deployment mission control, Sleuth helps developers see metrics data from a developer-centric point of view - by deployment - and interpret such data for them. ‍‍

Introducing: Business Impact Alerts

Anodot is the only monitoring solution built from the ground up to find and fix key business incidents, as they’re happening. As opposed to most monitoring solutions, which focus on machine and system data to track performance, Anodot also monitors the more volatile and less predictable business metrics that directly impact your company’s bottom line. Now there’s an easy way to measure the business impact of every incident.

How Active Directory Management Tools Help Quickly Find and Troubleshoot Issues

Active Directory is part of Microsoft Windows software environments primarily for networks where some sort of domain control is required. The service is much more than just authenticating and authoring access to network resources. Active Directory is also used to enforce various network security policies, enable various processes, and enable various services. Active Directory consists of a logical structure that allows the server to execute the appropriate actions, authentication, services, and so on.

Best practices for monitoring authentication logs

If you are running a user-facing web application, you likely implement some form of authentication flow to allow users to log in securely. You may even use multiple systems and methods for different purposes or separate groups of users. For example, employees might use OAuth-based authentication managed by a company-provided Google account to log in to internal services while customers can use a username and password system or their own Google credentials.

Synthetic Monitoring: When Bad things Happen to Good Checks

Running synthetic monitoring thinking it will match up with a user’s reality throw for throw is a fool’s game. While you can test in prod, your testing parameters are limited by an insider’s knowledge of the transaction’s pathways – making true objectivity challenging to achieve in testing. Yet still, every transaction tells a story.

5 Takeaways from Gartner's 2020 IOCS Conference

I recently had the pleasure of attending the Gartner IT Infrastructure, Operations & Cloud Strategies (IOCS) Conference. Like most events in 2020, this event was virtual and brought together infrastructure and operations (I&O) leaders from across the world together to redefine, reassess, and prepare for what normal might be in the near future. Here are some of the major takeaways from my experience at this four-day event.