Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Five Tools for User Activity Monitoring

As discussed in our blog post [What is User Activity Monitoring?], user activity monitoring (UAM) is a form of surveillance that provides visibility and insight into employee productivity and engagement while also revealing insider security threats. While UAM on company-owned or company-sanctioned devices and networks is legal, ethical and HR considerations require that UAM be implemented with a high level of professionalism and sensitivity.

LogicMonitor

Monitoring is a powerful tool that can unlock new pathways to growth. At LogicMonitor, we expand what’s possible for businesses by advancing the technology behind them. We seamlessly monitor infrastructures, empowering companies to focus less on problem solving and more on evolution. We turn on a complete view in minutes, turn the dial from maintenance to innovation and turn the corner from sight to vision. Join us in shaping the information revolution.

How to Send Log Files to AWS CloudWatch - Ubuntu

AWS CloudWatch allows you to collect log files such as the Apache2 access or error logs from your AWS EC2 instances. This is especially useful if you have a scaling group of instances behind a load balancer. Rather than connecting to each instance and manually searching the logs with grep, CloudWatch centralises the logs into one log stream, allowing you to search all your log files from one place.

Loki's Path to GA: Loki-Canary Early Detection for Missing Logs

Launched at KubeCon North America last December, Loki is a Prometheus-inspired service that optimizes storage, search, and aggregation while making logs easy to explore natively in Grafana. Loki is designed to work easily both as microservices and as monoliths, and correlates logs and metrics to save users money. Less than a year later, Loki has almost 6,500 stars on GitHub and is now quickly approaching GA.

Getting started with Jaeger to build an Istio service mesh

Service mesh provides a dedicated network for service-to-service communication in a transparent way. Istio aims to help developers and operators address service mesh features such as dynamic service discovery, mutual transport layer security (TLS), circuit breakers, rate limiting, and tracing. Jaeger with Istio augments monitoring and tracing of cloud-native apps on a distributed networking system.

Fourteen Free SQL Software Tools

Our databases are the ones that keep the Internet alive. There has even been talk for some years about the development of operating systems with which users do not have direct contact with the files, but their personal files are stored in a local DB. In fact, we already see how there are online services that do this for us, such as Google Drive or Nextcloud, the latter written under free license Affero.

Notes from Observability Roundtables

The Velocity conference happened recently, and as part of it we (Honeycomb) hosted a sort of reverse-panel discussion, where you talked, and we listened. You may be aware that we’re in the process of developing a maturity model for the practice of observability–and we’re taking every opportunity we have to ask questions and get feedback from those of you who are somewhere along the path.