Operations | Monitoring | ITSM | DevOps | Cloud

Outlier Detection: The Different Types of Outliers

Time series anomaly detection is a tool that detects unusual behavior, whether it's hurtful or advantageous for the business. In either case, quick outlier detection and outlier analysis can enable you to adjust your course quickly, before you lose customers, revenue, or an opportunity. The first step is knowing what types of outliers you’re up against. Chief Data Scientist Ira Cohen, co-founder of Autonomous Business Monitoring platform Anodot, covers the three main categories of outliers and how you'll see them arise in a business context.

Vulnerability Management with ManageEngine Vulnerability Manager Plus

Vulnerability management is the cyclical process of identifying, evaluating, treating, and reporting on threats and vulnerabilities across your network endpoints. In this video, we take an in-depth look at the exhaustive threat and vulnerability management features of ManageEngine Vulnerability Manager Plus.

Observability: is it a future of monitoring

As a concept, observability has been a relatively recent entrant into the world of information technology and cloud technology. The idea originated initially from controls system engineering. Observability refers to the concept of inferring the internal status of the system based on the outputs derived from the same. This is the conventional definition of observability.

Knowing How Much to Spend on the AWS Elastic Load Balancer

Load balancing is an element of most popular web applications. The reason for this is simple: Load balancers maintain application scalability and sustainability. It’s nearly impossible to imagine a modern application handling continuous traffic or periodic traffic spikes while relying only on a single running server’s capacity. As a result, load balancers have become a critical part of software development.

How to create fast queries with Loki's LogQL to filter terabytes of logs in seconds

LogQL, the Loki query language, is heavily inspired by Prometheus PromQL. However, when it comes to filtering logs and finding the needle in the haystack, the query language is very specific to Loki. In this article we’ll give you all the tips to create fast filter queries that can filter terabytes of data in seconds. In Loki there are three types of filters that you can use.

Securing Kubernetes using Egress Access Controls

A majority of existing workloads are non-Kubernetes, and for the platform teams involved, this creates challenges because the cluster will need to be securely connected to those resources. Calico Enterprise includes several features that enable fine-grained access controls between your microservices and databases, cloud services, APIs, and other applications that may be protected behind a firewall. There are different approaches to managing Kubernetes egress access, depending on your needs and where you want the control point to be

StackState

StackState provides unified observability across all IT components and environments, enabling customers to autonomously detect anomalies, pin-point root cause, and assess business implications of modern DevOps programs.