Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Synthetic Monitoring from Multiple Locations: Where to Run Tests (and Why It Matters)

Most organizations think of monitoring as a checkbox: set it up once, confirm that it runs, and move on. If the tool says the website is “up,” then the job is done, right? Not quite. The truth is that where you run synthetic monitoring tests from can be just as important as the tests themselves. Synthetic monitoring works by simulating user actions from pre-defined probes or agents. Those probes might live in a cloud data center, a mobile network, or even inside a corporate office.

Harnessing AppNeta's Browser- and HTTP-based Workflows to Track User Experience

These days, maintaining uptime of your servers and other infrastructure elements remains as critical as ever—but it’s not enough. Quite simply, even the best server reliability metrics won’t mean a thing if the user experience is poor. What truly matters is understanding the service levels your users experience, whether they’re accessing apps through a web browser or interacting with API-based services.

Defining the Network Engineer of Tomorrow

A little while ago, I wrote a piece with the provocative title, "The End of the Network Engineer as We Know It?" It struck a chord because it articulated a shift many of us feel in our bones: the ground is moving beneath our feet. The traditional, well-defined corporate network has dissolved into a sprawling, borderless ecosystem of public clouds, SaaS platforms, and the vast, untamed internet. The old role, focused on the care and feeding of devices within our four walls, is no longer sufficient.

Grafana Labs Co-founder Woods: Market maturity, OpenTelemetry, and AI are reshaping observability

As organizations navigate increasingly complex tech environments, unified observability practices have become essential. That was one of the main takeaways from Grafana Labs Co-founder Anthony Woods’ recent appearance on “Tech Keys by by Mercari India,” a podcast hosted by Vaibhav Khurana, Head of Platform Engineering at Mercari India.

Lighting up your dashboards: How to visualize the CheerLights IoT project in Grafana Cloud

I recently joined the Developer Advocacy team here at Grafana Labs, and have been exploring ways to accelerate my Grafana learning journey. Like many others in the Grafana community, my introduction to the open source project happened when I needed a way to easily visualize data that resided in external databases, mostly using SQL queries.

Why Healthcare CIOs Are Becoming Transformation Leaders, Not Just Tech Leaders

The role of the healthcare CIO looks nothing like it did a decade ago. Running the EHR, keeping infrastructure online, and managing vendor contracts are still table stakes, but they’re no longer the whole story. Today’s healthcare CIOs are being asked to do something far bigger: lead enterprise-wide transformation.

Monitor Kubernetes Hosts with OpenTelemetry

It’s 3 AM. API latency just spiked from 200ms to 2s. Alerts are firing, and users are frustrated. You SSH into the first server: top, free -h, iostat — nothing unusual. On to the next host. And the next. That’s how most of us learned to debug. The tools worked, and we got good at using them. But as infrastructure became distributed and dynamic, this approach started to break down. Modern monitoring needs more than SSH and top. It needs unified telemetry.

How SSL Certificate Monitoring Prevents Man-in-the-Middle Attacks

Man-in-the-Middle (MITM) attacks remain one of the most dangerous cybersecurity threats. In these attacks, hackers secretly intercept and sometimes alter communication between two parties. Without proper encryption, sensitive data such as passwords, credit card details, and personal information becomes exposed. SSL/TLS certificates encrypt this communication, preventing unauthorized access. However, certificates can expire, become misconfigured, or become compromised, creating security gaps.