Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Network Emulation. Bringing real-world conditions to the test environment

The Network Emulation is a relevant technology when making tests related to the behaviour of our platform. Let’s look at these situations: All these situations are part of the day-to-day work of the IT managers and all are responded to by developing the necessary tests. However, when we propose to do these tests, two options arise: simulation and emulation of networks. These are two concepts that are often used interchangeably but are actually very different.

Best Tools to Help You Get More Engagement

“You cannot buy engagement. You have to build engagement.” Have you already created your customer engagement strategy? And have you already answered the question “How to increase customer engagement?” If your answer is half yes, half no or simply no, then you will probably face problems that will turn into lost sales opportunities, customer dissatisfaction, and low popularity.

Fireside chat with Kelsey Hightower, part one: on Kubernetes, legacy tech, and the future of monitoring

At Sensu Summit 2018, Sensu CEO Caleb Hailey and CTO Sean Porter sat down with Kelsey Hightower, Staff Developer Advocate at Google Cloud Platform (GCP), for a fireside chat on a variety of topics, including the evolution of the monitoring space, Kubernetes best practices, their opinions on an open core business model, how operators’ jobs are changing, and more. Kelsey, Sean, and Caleb discussing all things Kubernetes and open source at Sensu Summit 2018

How to install Datadog on AWS hosts with Ansible dynamic inventories

Ansible is an automation tool for provisioning, managing, and deploying infrastructure and applications. When building large-scale applications, Ansible enables users to manage and configure their infrastructure across platforms like AWS. Whether you rely on temporary or dedicated hosts, you can use Ansible to create a repeatable process for configuring them with the Datadog Agent.

How to Identify Malicious Code and Stop Web Defacement

In April of 2018, security researcher Kevin Beaumont discovered an interesting case of web defacement on the NHS Insights website. He’d expected to find data related to patient surveys about their experiences with the National Health Service. Instead, he found a very different kind of message. A review of the page’s cache suggested that this eerie music and imposing image had been in place for at least the previous five days.

Most Popular Java Web Frameworks in 2019

As Java has evolved over the years, multiple attempts have been made to simplify development for various use cases. From official standards like Java Enterprise Edition, to community-driven frameworks, Java is continuing to prove itself to be adaptable and viable. Our top list is based on usage from Hotframework.com's Java ranking and several other sources including blog posts and GitHub download numbers.

Network Management in a Nutshell for MSPs

Let’s be honest: Network management is a big responsibility. It includes monitoring and controlling a computer network to ensure all of its resources—both hardware and software—are in good shape and are being used productively. And if you’re not a network expert (or don’t have one on your payroll), that probably sounds pretty intimidating. But there’s no time like the present to tackle the topic of network management head on.

How to Monitor Fastly Performance

In the last post, we talked about how Fastly, a content delivery network, provides a global infrastructure footprint to enterprises, and enables them to move apps and websites closer to their end users. Using Fastly CDN, they can serve content and deploy updates quickly, optimize web performance, and improve overall user experience. In this post, we will discuss how to collect, analyze, and monitor Fastly logs.