Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Launching Your Ubuntu Confidential VM with Intel TDX on Google Cloud: A Guide to Enhanced Security

In the world of cloud computing, we rely on abstraction layers to manage complex systems. While this simplifies development, it also creates vulnerabilities for sensitive data. Traditionally, privileged software within the cloud has access to your data, and could pose a significant security risk, if not managed properly. But there’s a new way to protect your data: confidential computing.

Elevating SolarWinds Observability for Hybrid IT Environments

Exciting times here at SolarWinds. We’re uniting our Self-Hosted and SaaS observability offerings under a single umbrella, SolarWinds Observability, and announcing a host of enhancements that will allow us to go even further to meet our customers' hybrid IT needs. Let’s take a look at what’s in store.

When SSL Issues aren't just about SSL: A deep dive into the TIBCO Mashery outage

On October 1, 2024, TIBCO Mashery, an enterprise API management platform leveraged by some of the world’s most recognizable brands, experienced a significant outage. At around 7:10 AM ET, users began encountering SSL connection errors that appeared straightforward at first glance.

5 Azure Optimizations That Make Cloud Cost Savings Simple

As both the State Of FinOps 2024 and the State Of Cloud Costs In 2024 indicate, reducing cloud waste remains a top priority for cloud-driven organizations. Cloud spenders care more than ever about cost efficiency — and CloudZero is working tirelessly to make cloud savings simpler. To this end, we’re proud to announce that we’ve added a suite of automated Azure optimizations to our already robust library of automated Insights.

What is an SNMP trap? A complete overview

SHARE Simple Network Management Protocol (SNMP) traps are messages sent by SNMP devices that notify network monitoring systems about device events or significant status changes. At LogicMonitor, our view on SNMP has evolved over the years. While we have often favored other logging methods that offered more insights and were considered easier to analyze in the past, we recognize that SNMP traps remain an essential tool in network management.

Using Honeycomb for Frontend Observability to Improve Honeycomb

Recently, we announced the launch of Honeycomb for Frontend Observability, our new solution that helps frontend developers move from traditional monitoring to observability. What this means in practice is that frontend developers are no longer limited to a metrics view of their app that can only be disaggregated in a few dimensions. Now, they can enjoy the full power of observability, where their app collects a broad set of data as traces to enable much richer analysis of the state of a web service.

How Does Metadata Improve Data Quality? All You Need to Know

Businesses rely heavily on accurate, reliable data to inform their decisions. As the volume and complexity of data continue to grow, ensuring data quality has become a significant challenge. This is where metadata steps in. By providing essential context, metadata enhances our understanding of the data we work with, ultimately improving its quality. Maybe you are wondering how does metadata improve data quality.

How Does Granular Recovery Technology Work?

Data loss can be a nightmare for businesses, especially when critical information is at risk. But there's good news—granular recovery technology is here to help! This advanced recovery method allows you to retrieve specific files, emails, or database entries without restoring the entire system. It’s a game-changer, especially in IT Service Management (ITSM) environments where precision and efficiency matter.

Container monitoring with Grafana: Helpful resources to get started

In simple terms, containers are a standard package of software that enable applications to run consistently across different computing environments. Often, these applications are broken down into smaller collections of independent services known as microservices. For many organizations, these microservices-based applications have replaced traditional monolithic applications because they offer increased performance, flexibility, and scale.

Top 6 Tips for Forwarding Logs

Log forwarding can be seen as the first step towards centralized log management. With centralized log management, your organization can gain from enhanced visibility, monitoring, and analysis capabilities, making it a coveted practice for numerous organizations. Log forwarding is crucial for maintaining robust IT security and operational efficiency, allowing organizations to manage and analyze logs from multiple systems in a centralized, scalable manner.