Operations | Monitoring | ITSM | DevOps | Cloud

BubbleUp Meets Tracing (and Other Odd-shaped Data)

A few weeks ago, BubbleUp came out of Beta. We’ve been getting fantastic user feedback on how BubbleUp helps users speed through the Core Analysis Loop and lets people find things they never could have found before. We’ve also been learning more about how BubbleUp works with Tracing, which unearthed some difficult issues. Today, we’re taking those head on.

We Tested Google Analytics vs Anodot - See Which Anomaly Detection Solution Won

A couple of months ago we released the all-new Anodot.com. Following the release, I explored our Google Analytics account to see what had happened post-launch. I have always been ambivalent about Google Analytics. On the one hand, the service has helped shape web analytics as we know it today and is used by nearly every website. Not to mention it’s free and rather easy to consume. On the other hand, GA is never a slam dunk.

Endpoint Security Analytics with Sumo Logic and Carbon Black

As the threat landscape continues to expand, having end-to-end visibility across your modern application stack and cloud infrastructures is crucial. Customers cannot afford to have blind spots in their environment and that includes data being ingested from third-party tools.

Introducing Datadog Synthetics

Datadog is pleased to announce the availability of Synthetics, a whole new layer of visibility on the Datadog platform. By monitoring your applications and API endpoints via simulated user requests, Synthetics helps you ensure uptime, identify regional issues, track application performance, and manage your SLAs and SLOs. By unifying Synthetics with your metrics, traces, and logs, Datadog allows you to observe how all your systems are performing as experienced by your users.

PHP monitoring with Datadog APM and distributed tracing

Since its release in 1995, PHP has been one of the most popular server-side languages for building web applications. It supports a wide range of web servers, databases, and operating systems. PHP developers use popular frameworks like Laravel, Symfony, and Zend to deploy and manage sites that serve high volumes of traffic. To help you monitor PHP performance, identify bottlenecks, and optimize your users’ experience, we’re pleased to announce APM & distributed tracing for PHP.

Announcing Sysdig Secure 2.3: NIST + PCI image compliance checks, Kubernetes and Docker remediation tips, and more!

Today we are very excited to announce our latest release — Sysdig Secure 2.3! In this version of Sysdig Secure, we have invested heavily in hardening the compliance posture of Kubernetes, Docker configurations, and container images. We have released a set of features that provide compliance focused image scanning, guided remediation, compliance dashboards, and more.

Getting Started with the LogicMonitor - ServiceNow CMDB Integration

A Configuration Management Database (CMDB) contains all relevant information about the hardware and software components used across an organization’s IT environment. Even more important, a CMDB defines the relationships and interdependencies between those assets. This makes it easy to understand, manage and report on the service being delivered.

Linux Kernel Observability through eBPF

Recent Linux kernel releases are coming weaponized with built-in instrumentation framework that has its roots in what historically was approached as BPF (Berkeley Packet Filter) – a very efficient network packet filtering mechanism which aims to avoid unnecessary user space allocations and operate on packet’s data directly in kernel land. The most familiar application of BPF powers is related to filter expressions used in tcpdump tool.

Rapitt chooses Mattermost for quick messaging and open source extensibility

Rapitt built their partner store app on top of Mattermost to create a platform that facilitates local commerce. Rapitt digitally connects local business owners with customers to enable specific use cases and transactions—like storing items for a period of time (e.g., a suitcase) and serving as a key-handling solution (e.g., Airbnb hosts can use Rapitt to provide keys to guests).

Eliminate Citrix Troubleshooting with a Proactive Citrix Monitoring Strategy

Daniel Feller, a lead architect at Citrix, recently posted a couple of very interesting articles relating to troubleshooting Citrix logon issues. These blogs highlight challenging Citrix issues and how to go about locating the root cause of these issues.