Operations | Monitoring | ITSM | DevOps | Cloud

How to Set Up Effective Network Monitoring Alerts

Your network is like the beating heart of your digital world. And who's there making sure it's in tip-top shape? That's right – the network admins, the unsung heroes of the networking world. In our deep dive today, we're talking all about navigating Network Health Monitoring to ensure the peak performance of your network! Think of it like checking the pulse of your network.

End of year review: Ubuntu Desktop in 2023

As 2023 draws to a close, it’s time to look back on the evolution of Ubuntu Desktop over the last twelve months. The philosopher Gary Barlow once wrote “we’ve come so far, and we’ve reached so high, and we’ve looked each day and night in the eye”. These words certainly resonate in the context of our most recent Ubuntu releases.

Introducing Canonical's new open source support portal

Amplifying the global impact of open source is at the heart of Canonical’s mission. Support is a crucial part of this exciting journey, especially when it comes to helping enterprises, institutions and communities around the world solve real-world problems through their IT infrastructure and applications. Working with thousands of global customers in a variety of use cases, our support team delivers fixes on everything open source, both Canonical-maintained projects and others.

Top 6 IPAM Software & IP Address Management Tools in 2023

In the rapidly evolving landscape of network management, and as businesses expand and grow more complex, the demand for efficient and dependable IP address management (IPAM) solutions continues to rise. Why Do You Need IP Address Management Software? What Are the Benefits of IPAM Tools?

Cribl Search & Parquet Pushdowns - Smooth Like Butter!

Data is growing, and we are being asked to search larger and larger amounts of data. This puts larger and larger demands on Search resources. Reading all the data to find matching events is muscling through the data. Wouldn’t it be more efficient to be able to do filtering before reading the data? Cribl Search does precisely that by leveraging Parquet Pushdowns.

Data Overload: Why Companies Collect Too Much Data and Pay the Price

In the US, a recurring news topic is the state of the federal budget – and if we’ll get one signed. Government budgets have hundreds of thousands of line items; each bickered over to gain or lose political capital with one group or another. However, most government budgets aren’t up for debate. Only about 30% of the US federal budget is discretionary or flexible. Nearly two-thirds, or 63%, is mandatory spending required due to prior commitments.

EKS Cost Traps: 3 Common Mistakes And How To Avoid Them

In today’s fast-paced digital landscape, Kubernetes has emerged as the go-to orchestration platform, revolutionizing the way applications are deployed, scaled, and managed in containerized environments. As organizations increasingly adopt Kubernetes, with platforms like Amazon’s Elastic Kubernetes Service (EKS) leading the charge, the importance of cost management within these environments has come to the forefront.

Team Assignment

Assign items to teams as well as individual owners! We’re excited to announce a new feature for Advanced and Enterprise customers - the ability to set a team as the owner of an item. Previously, Rollbar has only allowed users to assign a specific team member as the owner of an item. However, recognizing the need for flexibility in ownership, especially in collaborative environments, we now allow a team to be set as the owner of an item.

Understanding IT event analytics: From basics to AIOps

A wise person once said, “What’s measured is what matters.” This couldn’t be more true than in the high-stakes world of IT operations, where the ability to swiftly measure, analyze, and respond to events is crucial for improving IT operational performance. This blog delves into defining IT event analytics, guiding you on getting started, showcasing real-world examples, and introducing essential methods to transforming your incident response strategy.