Operations | Monitoring | ITSM | DevOps | Cloud

How we got abused via OTP

Going through my emails, I saw several about Twilio's auto-recharge, and then something about a suspension. We were using Twilio to send SMS messages and phone call alerts. "That's odd, let me check!". I logged into Twilio from my phone and checked. Horror. Instant horror. The balance was insane. But negative. I told my friend I need to sit down and check something. Pulled out my laptop and logged in. Same information. Same insane balance. Right there and then I knew it... we've been abused.

Essential Steps for Troubleshooting Network Problems

Everyone has a story about that one road trip where traffic got backed up, making people late to the event. When you have network connectivity problems, your information highway gets clogged up, making it difficult for users to access resources efficiently. While network troubleshooting strategies may seem simple, a lot of nuance and complexity lies in the activities when you dig into your data.

Simplifying Multi-Node Setups with InfluxDB 3 Enterprise Modes

As your time series data grows, managing increasing workloads can quickly become a headache. High data ingestion rates, numerous (and complex) queries, intensive processing tasks, and routine maintenance like data compaction often compete for limited resources. This leads to unpredictable performance and slower response times, and common solutions often introduce operational complexity.

Email Marketing and Website Downtime: How to Ensure Landing Pages Are Always Accessible

You know how important ensuring your business's round-the-clock availability is, especially if you operate across different time zones. With online businesses, marketing and sales never stop, catering to consumers 24/7 through chatbots, AI assistants, and server redundancy.

Why clear success criteria are critical when evaluating incident management tools

Choosing the right incident management tool is more than feature matching. For site reliability engineers, it’s about providing your team with efficient workflows, clarity around roles during incidents, and integrations that match your operational realities, especially when things inevitably go wrong. We've helped hundreds of companies migrate from their existing tooling over to a modern incident management platform.

Cloudsmith introduces EPSS Scoring in Enterprise Policy Management (EPM)

Cloudsmith’s Enterprise Policy Management (EPM) now supports the Exploit Prediction Scoring System (EPSS), a data-driven metric designed to estimate the probability of a software vulnerability being exploited in the wild. Using EPM in Cloudsmith, you can now use a package’s EPSS score to inform your package workflows, including those around Package Promotion and Package Quarantine.

Investigating an '[Object] not found' error in Next.js with Tracing in Sentry

Breakpoints and console.log statements might save your sanity during local dev, but production issues are another story. In prod, your errors might be distributed across different microservices, or hidden in minified code. Good luck hunting those down. That’s where Sentry’s traces and spans come in, offering you easy visibility into every network request, API call, DB fetch and more in a full-stack, distributed environment.

Why Do You Need a Redis Monitor in Place?

Redis Monitor is a simple yet powerful command-line tool that displays every command processed by a Redis server in real-time. It provides visibility into exactly what’s happening inside a Redis instance as it happens. Running a single command can uncover hidden performance issues: The output reveals thousands of unexpected HGETALL operations on a key that should be accessed infrequently. This exposes a Redis call inside a loop, causing unnecessary database strain.