Operations | Monitoring | ITSM | DevOps | Cloud

How to Replace Synthetics with the httpcheck Receiver

A 200 OK doesn't always mean everything is okay. You've probably seen it: your health check endpoint returns success, but your users are staring at an error page. Maybe the database connection pool is exhausted, or a critical downstream service is timing out, but your API dutifully returns 200 because technically it responded. This is the reality of monitoring HTTP endpoints in production—status codes alone don't tell the whole story.

Announcing HAProxy ALOHA 17.5

HAProxy ALOHA 17.5 is now available. This release delivers powerful new capabilities that improve security and performance — while future-proofing HAProxy ALOHA to enable richer features and advanced functionality. With this release, we’re introducing HTTPS health checks to Global Server Load Balancing (GSLB), new partitioning for larger firmware updates, enhanced web application firewall (WAF) functionality, and our new Threat Detection Engine (TDE).

How to solve authentication failures when you have an Azure setup

It is not just your business. Enterprises worldwide face recurring technical issues related to authentication failures and access problems. These errors often pop up, especially in scenarios with service connection setups, pod/start failures, or integration issues. Most of the time, these errors indicated failed deployments, pods failing to pull images, or intermittent authentication/access errors.

Kubernetes monitoring & observability trends 2026 | Future of Kubernetes observability

Kubernetes continues to dominate as the container orchestration standard, but the way we monitor and observe clusters is rapidly evolving. As we head into 2026, Kubernetes monitoring is moving toward actionable insights, cost-aware observability, and security-first approaches. This blog dives deep into what engineers, architects, and platform teams should watch for in the year ahead — with real-world examples for context.

From Code To Clicks: A Visual Way To Build Dimensions In CloudZero

In early October, we launched Dimension Studio, a new visual editor for engineers and others that brings point-and-click simplicity to the same powerful, precise allocation engine CloudZero is known for. Before that, when CloudZero users built cloud cost allocations, they got it from our YAML-based CostFormation engine, a code-driven way to describe how cloud and AI costs roll up to products, customers, or teams.

Cultural ROI In FinOps: People Drive Pivots

When I ask clients to picture cloud cost optimization, they think dashboards, policies, maybe a clever right-sizing purchase. What they don’t picture? Meetings. Misunderstandings. Mistrust. To avoid FinOps failures, we need a new starting line; one that gets to the root of spend misalignment.

Unpacking the Elements of Site Uptime (by way of Jeopardy!)

Picture this: you’ve achieved your second lifelong dream of being a contestant on Jeopardy! Now it’s time for the fateful “final answer.” The good news? You’ve got a comfortable lead over your fellow contestants, and a correct response means eternal bragging rights. The bad news? Miss this one, and everyone — your family, coworkers, dentist, mechanic — will remind you of it forever. The lights dim. The audience holds its breath.

A quick recap of IDPCON 2025

Two weeks ago, we hosted IDPCON 2025, and the response has been overwhelming. Over 250 engineering leaders from 20+ countries joined us for 12 sessions featuring speakers from Canva, Skyscanner, Blackstone, and more. Attendees participated in discussions at 20+ roundtables, sharing strategies and challenges around engineering excellence and internal developer portals.

Demystifying WMI Permissions

Network administrators are always seeking to gain a deeper understanding of their Windows-based environments. Windows Management Instrumentation (WMI) enables their network monitoring tools to access system information, manage configurations and automate tasks. It provides a vital role in network monitoring by providing a standardized interface for querying and controlling system components. A complex set of permissions governs WMI access.