Always Bee Tracing
If you are running a distributed system and have reached a point of scale where you’re running 5+ services, you are more than likely experiencing difficulties when troubleshooting. Does the following sound somewhat familiar?
If you are running a distributed system and have reached a point of scale where you’re running 5+ services, you are more than likely experiencing difficulties when troubleshooting. Does the following sound somewhat familiar?
Simple enough to be embedded in text as a sparkline, but able to speak volumes about your business, time series data is the basic input of Anodot’s automated anomaly detection system. This article begins our three-part series in which we take a closer look at the specific techniques Anodot uses to extract insights from your data.
It’s that time of year again–the temperature is dropping, snow is falling, and a new year has arrived. On the bright side, the end of 2018 brings the beginning of 2019 and a whole new list of tech conferences to look forward to.
Uptime Robot is already integrated with the major team communication apps and here is another addition: Google Hangouts Chat.
Have you ever worked on a team where it was a challenge to give constructive feedback or confidently share ideas? At PagerDuty Summit 2018, Patrick Lencioni, author of The Five Dysfunctions of a Team,1 spoke about the importance of encouraging a culture of teamwork, and the role trust and vulnerability play in creating that culture.
We finally made it to another new year, and that means it’s time to reflect on the learnings from the previous year while also preparing for many new opportunities and challenges ahead. The enterprise tech and security industry didn’t seem to slow in 2018, so there’s no reason we would expect 2019 to be any different. So what will those “hot button” topics be this year?
The inherent limitations of most log managers and the need to work within the constraints of your current hardware may force your enterprise to make some hard choices. Less useful data may be left unchecked, old information will eventually get deleted, and the amount of data that is accessed in real-time is sacrificed to reduce excess workload.
The impact of the colossal Starwood Hotels & Resorts data breach continues to reverberate across the global technology community. In its wake, the importance of log management and security information event management (SIEM) systems has once again come to the forefront. Let’s explore what SIEM is, the many acronyms emerging in the SIEM space and where logging fits into the picture.
What do you expect from a monitoring tool? What should you expect? The Blue Matador team has spent 2018 making a next-gen monitoring tool. Our design goals came from thrilled customers and lots of interviews.
There’s nothing more frustrating than a website crash if you don’t know the cause of it. When your business income depends on uptime, downtime can feel like a ticking clock. But why is your website down? What can you do to get it going again?