Operations | Monitoring | ITSM | DevOps | Cloud

Model-driven observability: Embedded Alert Rules

This post is about alert rules. Operators should ensure a baseline of observability for the software they operate. In this blog post, we cover Prometheus alert rules, how they work and their gotchas, and discuss how Prometheus alert rules can be embedded in Juju charms and how Juju topology enables the scoping of embedded alert rules to avoid inaccuracies.

Sponsored Post

Kent RO sees 50% faster MTTR with Applications Manager

Kent RO is an Indian multinational healthcare product company and a leader in the reverse osmosis (RO) water purifier category. Founded in 1999, Kent RO pioneered and brought the revolutionary RO technology to India. With a vision to enhance the quality of everyday living, Kent RO has evolved as a market leader that provides technologically advanced healthcare products ranging from water purifiers, air purifiers, to water softeners.

Find the right person at the right time to fix the right issue with SCIM for Okta, Code Owners with GitHub, and more

If you know someone who actually likes managing work across projects, we’d love to meet this mythical being. Because we can’t imagine who enjoys hand-sifting through digital piles of notifications, prioritizing issues, then tracking down the right developer to assign the issue to. And once you’re done with that detective work, your engineer-of-the-hour may not even have access to the right tools to resolve the issue. Who’s got time for all this org chart spelunking?

UptimeRobot August 2021 Update: Configurable Timeout, support improvements and Plesk extension

We’ve been busy this summer and introduced two new features last month – longer intervals and a grace period for recurring jobs monitoring (Heartbeat monitors). There is some good news this month too, so let’s get right into it!

Authentication and Authorization for RESTful APIs: Steps to Getting Started

Why do APIs require authentication in the first place? Users don't always need keys for read-only APIs. However, most commercial APIs require permission via API keys or other ways. Users might make an unlimited number of API calls without needing to register if your API had no security. Allowing limitless requests would make it impossible to develop a business structure for your API. Furthermore, without authentication, it would be difficult to link requests to individual user data.

ServiceDesk Plus Cloud's all-new UI - Exclusive Training

Introducing the all-new UI of ServiceDesk Plus Cloud. A refreshing new look for your service desk, Kanban for an efficient ticket queue, powerful dashboards for easy access to information, an adaptive service desk layout and more. In this exclusive training, product experts demonstrate what the upcoming new user experience will be like and showcase new functions across all modules, ensuring teams are up to speed before switching over to the new UI.

Developing an Analytical Approach to Service Management Cloud

In this session of ManageEngine's Masterclass 2020, we will help you uncover and extract the hidden value in your service desk data to understand customer needs, manage costs, and deliver high-quality customer service. Learn how Advanced Analytics for ServiceDesk Plus can help you run your IT like a business.

IT Service Management: Streamline Your Workflows to Make Everyone Happier

Shadow IT is, at best, an organizational distraction; and at worst, a team of people working at cross-purposes to the business and causing harm. But if shadow IT is such a bad thing, why does it still happen in so many organizations? In under 10 minutes, SolarWinds Head Geek Leon Adato and Technical Content Manager for Community Kevin M. Sparenberg break down what shadow IT is, why it’s bad for the organization even if it seems to be “getting things done,” and how the cycle can be broken with a robust, mature, responsive service management solution and process.