Operations | Monitoring | ITSM | DevOps | Cloud

Troubleshooting Cloud Traffic Inefficiencies with Kentik AI

Balancing cost efficiency and high performance in cloud networks is a constant challenge, especially when misconfigurations or inefficient routing lead to inflated costs or degraded performance. Learn how Kentik Journeys simplifies traffic analysis, helping cloud engineers identify inefficiencies like unnecessary Transit Gateway routing.

Kentik Bytes: Enhancing Azure Observability with Kentik

Kentik offers exceptional visibility into Azure public cloud environments, allowing users to easily filter and explore cloud telemetry. The platform provides detailed insights into network resources, including traffic metrics and peering information. Users can focus on specific applications and visualize data in a wide variety of formats, including Sankey diagrams. Additionally, you can adjust time frames, create alerts, and share reports for better traffic management.

The Why and What of AWS Lambda Monitoring

Serverless architectures are the rental tux of computing. If you’re using AWS to manage and scale your underlying infrastructure, you’re renting compute time or storage space. Your Lambda functions are the tie or cummerbund you purchase to customize your rental. Using the AWS event-driven architecture improves business agility, allowing you to move quickly. Lambda is the on-demand compute services that runs custom code driving an event’s response.

Smarter handling of Flyway validation issues | The Tony and Tonie Show

In this video Tony and Tonie discuss the quick way to verify whether a Flyway validation error is a real cause for concern, due to retrospective metadata changes, or just the result of a developer valiantly adding formatting and documentation to improve the code. If the latter, developers can safely run Flyway repair to resume normal migrations.

Proactive Protection with Exposure Management

Proactive Protection with Exposure Management Every organization faces risk. What separates the vulnerable from the well-protected isn’t whether you have exposure — it’s how you manage it. Gaining visibility over your organization’s attack surface lets you prioritize which threats you address based on the degree of risk they pose. That’s when you can put together an exposure management strategy that empowers you to gauge your vulnerabilities and maintain the security posture appropriate to your business.

AI Agent RCA on Alerts: Get the Info You Need, Fast

A critical component of any monitoring and observability system is alerting. But alerts in and of themselves aren’t enough—when something goes wrong, time is of the essence, and your team needs to figure out not just what’s going on but how to fix it, and fast. Additionally, constantly chasing down alerts can be the bane of any observability practitioner’s existence.