Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Active vs. Passive Monitoring: What's The Difference?

Today, it’s perfectly normal for businesses to continuously monitor software applications and IT infrastructure to ensure uninterrupted customer service. Active and passive monitoring are the two popular methods enterprises use for infrastructure and application performance monitoring (APM). As the names indicate, these two approaches to monitoring are very different.

Mastering Firewall Logs - Part 1

A firewall is a network security device or software that is used to monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewall Logs contain valuable information about network and security events. These logs are essential for security and infrastructure monitoring for enterprises. While this data is critical to securing enterprise networks, they are also one of the most voluminous data types security teams use to monitor and secure their networks.

Deployment Frequency (DF) Explained

Technical teams use various metrics and indicators to track performance and success. For DevOps teams, among the most important metrics is deployment frequency. Deployment frequency can help you evaluate the software delivery performance of teams that develop software and apps. In this article, I’ll look at using this metric to calculate deployment rate, the importance and best practices for improving your deployment rate and setting your DevOps team up for success.

Announcing the Splunk Add-on for OpenTelemetry Collector

The Splunk Add-on for OpenTelemetry Collector is a variation of the Splunk Distribution of the OpenTelemetry Collector that simplifies metrics and traces data collection, configuration and management. Since it is an add-on, users can deploy it alongside Universal Forwarders using tools like Deployment Server to start collecting high-fidelity metrics and traces from 1000s of their hosts easily. We’re happy to announce that the Add-On is now generally available in Splunkbase.

5 Elasticsearch Disadvantages You Should Know

Since its initial release in 2010, Elasticsearch has grown into the most popular enterprise search engine with use cases that range from web crawling and website search to application performance monitoring and security log analytics. But despite its widespread adoption and success, Elasticsearch does have some notable disadvantages that you should consider - especially if you’re envisioning a high-scale deployment with a large amount of daily ingestion.

Recapping KubeCon North America 2023

If you missed KubeCon North America 2023 in Chicago, or you were there and spent more time in the “hallway tracks,” you may have missed some of the big news that came out of the show. We covered the big happenings in the open source cloud native and observability realm in the latest episode of OpenObservability Talks!

Introducing Responsive Pipelines from Mezmo

The ability to swiftly resolve incidents is central to SREs responsible for a service's reliability and its users' satisfaction. Mezmo has recognized this need and, at Kubecon, unveiled an innovative solution: Mezmo Responsive Pipelines. Responsive Pipelines enable users to pre-configure a Pipeline to respond automatically in the case of an incident.

Aggregating Logs From Microservices-Best Practices

Depending on where you are on your journey with microservices, you may have noticed visibility into the system can be a bit tricky at times. Well, there’s good news. Not knowing what’s going on in the system is a solvable problem. One of the first things you can do is get your logs in order. And one of the best ways of doing so is aggregating your logs into a single logging service.

Modernize Your SIEM Architecture

In this Livestream conversation, I spoke with John Alves from CyberOne Security about the struggles teams face in modernizing a SIEM, controlling costs, and extracting optimal value from their systems. We delve into the issues around single system-of-analysis solutions that attempt to solve detection and analytics use cases within the same tool.

Infrastructure Management & Lifecycle Explained

IT infrastructure must meet enterprise needs for effective service delivery while also providing value for money. This is a critical undertaking. Massive data growth, increased complexity of hybrid cloud environments, and emphasis on digital-first strategies are just some of the challenges. This requires an advanced approach to how infrastructure is configured and controlled — infrastructure management.