Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Your Questions About AI-Assisted Development Answered

We recently hosted a webinar on AI-assisted development with DORA, and the audience had a lot of questions—far more than we could get to in an hour. I picked out six that get at the stuff people are wrestling with day to day. These aren't the easy questions, and I don't think there are necessarily easy answers, but I've spent the past year building and shipping with AI coding tools and observing (literally) what happens when that code hits production. Here's what I have.

How LLMs can help boost productivity

Learn how large language models (LLMs) are transforming productivity in business, coding, research, and daily workflows. Discover practical ways to use AI tools to automate tasks and improve efficiency. Additional Resources: About Elastic Elastic, the Search AI Company, enables everyone to find the answers they need in real time, using all their data, at scale. Elastic’s solutions for search, observability, and security are built on the Elastic Search AI Platform — the development platform used by thousands of companies, including more than 50% of the Fortune 500.

How AI lets you talk to your company's data and get answers instantly

In this conversation recorded at Elastic’s New York office, three product leaders discuss how AI agents are transforming enterprise software. The discussion features Steve Kearns (general manager, Search solutions at Elastic), Mike Nichols (general manager, Security solutions at Elastic), and Baha Azarmi (general manager, Observability at Elastic). They explain how Elastic Agent Builder allows teams to interact with their data using natural language instead of complex queries.

Meet the new Bits AI SRE: Deeper reasoning, twice as fast

When we announced Bits AI SRE at DASH 2025, we introduced an autonomous SRE agent that investigates alerts the moment they trigger. Bits AI SRE reads the same telemetry data as your team, understands your architecture, and follows your runbooks to identify likely root causes before you even open your laptop. It’s your AI teammate that’s always on call.

What Is LLMjacking? The New AI Cybercrime Stealing Cloud AI Compute

LLMjacking is a new cybercrime where attackers steal access to cloud-hosted AI models and use them for free — while the victim pays the bill. In this video, we break down what LLMjacking is, how attackers exploit compromised credentials and exposed APIs, and why security teams should treat AI infrastructure as a high-value attack target. Discovered by the Sysdig Threat Research Team, LLMjacking is quickly becoming the AI-era equivalent of cryptojacking — except instead of mining cryptocurrency, attackers run expensive large language models (LLMs) at scale.

From Reactive to Predictive: Preserving BESS Uptime at Scale

Battery Energy Storage Systems (BESS) operate as revenue-generating grid assets that capture surplus electricity, deploy power during demand spikes, and support frequency control. By shifting energy across time, they stabilize grid conditions, enable renewable integration, and execute market dispatch commitments. When systems respond as designed, stored capacity becomes a flexible, monetizable supply. But BESS performance depends on precision and availability.

Continuous Security Monitoring: The Practical Guide for Modern Ops Teams

If you've ever been on call during a "nothing changed... except everything" incident, you already understand the real problem with traditional security checks: they're snapshots. And snapshots are useless the moment your infrastructure shifts, a new SaaS tool gets approved, a developer spins up a service in a different region, or a vendor quietly exposes an admin portal to the internet. Modern environments don't stay still. So security can't, either.

AWS Middle East data center strikes: 92 SaaS platforms report disruptions

StatusGator analysis identifies 92 cloud services that publicly acknowledged disruptions tied to the AWS Middle East incident. Over the weekend, Amazon confirmed that drone strikes damaged AWS facilities in the Middle East, disrupting cloud infrastructure across the region. The strikes affected AWS regions in the United Arab Emirates and Bahrain, causing outages and degraded performance across core cloud services including compute, storage, and databases.

Centralizing Docker Logs for Observability and Security

Most people can remember the old game of telephone, the stream of whispered sentences or phrases across a group of kids. At each transmission, a different piece of information gets lost or misheard, leaving the last person with an incomplete or incomprehensible statement. Managing Docker logs can feel the same way, especially when an error message is lost or an error message lacks context.