Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Easy JavaScript error investigation with source maps

Hopefully by now you’re taken your first sip of Elastic RUM, or real user monitoring, and see the power of searching through traces and the User Experience metrics to gain insights into how users actually use and experience your application. One issue you may have experienced is the challenge of finding the source of errors for minified JavaScript files.

Introducing Automatic UI Updates

Automatic UI Updates (AUIU) is a new cloud service that allows admins to get the most up-to-date UI experience between Splunk Cloud upgrades. Cloud admins gain early access to newly enhanced self-service tools through the AUIU opt-in service. Specified AUIU enhanced pages and tooling can now be delivered to customers up to three months faster. AUIU is a delivery service that allows for new UI pages and UI improvements to be integrated into Splunk Cloud deployments for specific enhanced admin pages.

Understanding the Three Pillars of Observability: Logs, Metrics and Traces

Many people wonder what the difference is between monitoring vs. observability. While monitoring is simply watching a system, observability means truly understanding a system’s state. DevOps teams leverage observability to debug their applications, or troubleshoot the root cause of system issues. Peak visibility is achieved by analyzing the three pillars of observability: Logs, metrics and traces.

Goats on the Road: DevOp Struggles

The best part of my job is talking to you, our prospects, and customers, about your logging and data practices. I love listening to what you are doing and hope to accomplish, so I can get a sense of the end state. My goal is to brainstorm solutions that provide overall value across the enterprise, and not just aim for a narrow tactical win with limited impact. In late September, I hung out at a local DevOps conference in Brooklyn with the NYC Cribl sales team.

HAProxy Logging Configuration Explained: How to Enable and View Log Files

HAProxy is generally the frontend layer of your application, which means it plays a critical role since all traffic first lands on this layer. Because of this, you need to make sure everything is working at this layer all the time, as any issue can directly impact your business. Therefore, having visibility on this layer is crucial. Visibility can come from two aspects: the metrics HAProxy emits and the logs it generates while handling requests.

Enhance the Value of Your Data With Mezmo's Observability Pipeline

Organizations of all sizes rely on their observability data to drive critical business decisions. Production Engineers across Development, ITOps, and Security use it to understand their systems better, respond to issues faster, and ultimately provide more performant and secure user experiences. But while the value of observability data is well understood, teams struggle to derive value from it.

Observability and Security Data Are Littering the Enterprise Like Lint Under The Couch Cushions

How enterprises store and split up observability and security data is a great analogy to how lint, spare change, and partially-eaten bags of popcorn end up under couch cushions. Or when you tell your kids to clean up the house when company is coming over and they stash their toys and your tools in various nooks and crannies.

Cracking Performance Issues in Microservices with Distributed Tracing

Microservices architecture is the new norm for building products these days. An application made up of hundreds of independent services enables teams to work independently and accelerate development. However, such highly distributed applications are also harder to monitor. When hundreds of services are traversed to satisfy a single request, it becomes difficult to investigate system issues.

Observing your application through the eyes of a user: A brand new synthetic monitoring experience is coming

Understanding if your applications are not just available but also functioning as expected is critical for any organization. Third-party dependencies and different end-user device types means that infrastructure monitoring and application observability alone are not enough to spot and minimize the impact of application anomalies.