Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

WEBINAR: Advanced Serverless Debugging through Observability

In this webinar we will be covering the advanced techniques of observability, debugging and operations with large-scale serverless environments. We'll be looking at the best practices for ingesting and navigating logs, metrics and traces to easily understand the state of your application and develop confidence in your operational practices.

10 Common Issues You Could Experience When Using Citrix Cloud

There are an increasing number of organizations, who are moving their Virtual Apps and Desktops deployments to Citrix Cloud by using the Virtual Apps and Desktops service. Citrix Cloud allows you to host components such as your core management layer for a Virtual Apps and Desktops deployment in the cloud, managed and kept up to date by Citrix.

Incident Review - Google Outage

When something as ubiquitous as Google goes down, there is a lot of online frenzy with users tweeting and searching for updates on the issue. That’s exactly what we witnessed today between 9/24/2020 17:59:44 PST to 9/24/2020 18:23:20 PST. Multiple Google services like Mail, Drive, Meet, Hangouts experienced downtime. Frustrated users took to Twitter to report the outage and the tweets were captured by Websee. Users trying to access Google services got a 502 error screen.

Harnessing the Transformative Power of Disruption

They say that necessity is the mother of invention. I believe that the aphorism has a business corollary: Disruption is the mother of transformation. I’ve seen it prove out over and over again throughout my career. In fact, I’d even go one step further to say that lack of disruption can actually stand in the way of successful change—and I have the scars to prove it.

Leveraging logs to better secure cloud-native applications

With the growing popularity of cloud computing, security incidents related to it have been on the rise. Logs are indispensable resources for countering these threats, and they can be utilized for alerting, taking remedial action, and even preventing future attacks. In this post, we will examine ways to better secure cloud-native applications using logs.

Americaneagle.com and ROC Commerce stay ahead with Retrace

As a digital agency, the last thing you need are production issues for your ecommerce clients. The stakes are even higher when your ecommerce clients are running Super Bowl ads for millions to see. Instead of enjoying the game, you are faced with troubleshooting a dumpster fire. The development teams at Americaneagle.com and ROC Commerce rely heavily on Application Performance Management (APM) tools, especially on high stakes game days.

Using alternate PING utilities to test your network

Low latency networks are the ideal media; in typical intranet all the hosts can be reached in a few milliseconds. Monitoring tools, starting from typical default ping utility (the one that sends ICMP Echo packets and waits for response), are consistent in their results if typical response is above 10-15 milliseconds. When response time drops significantly and is circa 1ms or even less, the results may begin to vary considerably.