Operations | Monitoring | ITSM | DevOps | Cloud

Intro to synthetic monitoring - and Grafana Labs' new iteration on worldPing

Often there’s a focus on how a service is running from the perspective of the organization. But what does service health monitoring look like from the perspective of a user? Today, understanding your end users’ experience is a key component of ensuring your website or application is functioning correctly. Having a website that is performing well regardless of location, load, or connection type is no longer a nice-to-have, but rather a requirement.

Introducing the AWS X-Ray integration with Grafana

In collaboration with the AWS team, we have just launched another AWS integration, the X-ray data source. Combined with the CloudWatch and Timestream integrations, the AWS X-Ray data source simplifies monitoring and triaging with one Grafana console. The addition of the AWS X-ray data source reflects Grafana’s commitment to becoming a full observability platform that supports distributed tracing as well as metrics and logs.

Top Three Takeaways From Our Multi-Cloud Connectivity Webinar

The move to a multi-cloud environment brings with it many new considerations for an enterprises. Among those is a new approaching to networking. In our recent webinar, Jay Turner, Vice President of Development and Operations, and Neil Templeton VP, Marketing at PCCW Global, looked at some of the common challenges facing enterprises as they connect to more clouds, and identified some new ways to manage these connections more effectively. Here’s some of the tips you might have missed…

3 + 9 Quick Video Meeting Tips We Use Every Day

Here at Sleuth, we live in Zoom, and have accumulated a list of tips to make video meetings better. I'm going to talk about three quick tips to go from a muddled dungeon dweller to a clear, engaging talking head, all without spending a dime. If you want even more, the above video shows you 9 more tips, including one advanced (but still completely free) tip to turn a video call into a real-time broadcast experience.

How to Monitor, Manage, and Secure Active Directory

Microsoft Active Directory (AD) is the nerve center enabling your federal agency to access the systems and applications staff members need to do their jobs. AD is also a high-risk target for inside and outside threats and can be a gateway for other potential security vulnerabilities. The key to protecting your agency’s AD is to have the right processes in place to maintain its integrity, know whether something is happening that shouldn’t be, and demonstrate compliance if required.

Boost CDN Performance by 20-40% with Catchpoint Synthetic Monitoring

Content Distribution Networks (CDN) have been around for more than two decades, and as per Intricately 2019 report, there are over a million companies leveraging CDN services from across the world. In the chart below, they have compared four popular CDNs but there are several other major CDN providers such as Verizon Media (Edgecast) and Lumen. Large enterprises such as Linkedin, Ebay, Walmart, and others have already implemented a multi-CDN approach to power all their applications.

Stuff Happens: How Slack and PagerDuty Work Together to Resolve Incidents Quickly

Like death and taxes, IT incidents are inevitable. Issues like server outages and broken code are common—and costly. A single hour of downtime costs businesses more than $300,000 on average, according to Gartner. That’s why a solid incident management strategy is a must for any organization. “People solve incidents, but we can’t do it alone,” says Ali Rayl, Slack’s vice president of customer experience.

Tracking Kubernetes Spend With CloudZero in 3 Easy Steps

If you are looking to account for your container costs and understand how your AWS Kubernetes or EKS cluster spend maps onto your workloads, this guide was made for you! In this post we will walk through the steps to get up and running with CloudZero and Amazon Container Insights fast. CloudZero has integrated with Amazon CloudWatch Container Insights for its strength as a secure and automated solution for sharing container metrics within AWS.

Data Security for Big Data

Big data security is a term used for all collective measures taken to protect both data and analytical processes from theft, attacks or all other malicious activities. Just like other forms of cybersecurity, big data security is about attacks originating from every online or offline sphere. Companies operating on the cloud face multiple challenges including online information theft, DDoS attacks and ransomware.