Operations | Monitoring | ITSM | DevOps | Cloud

A Look Back at 2025: Megaport's Biggest Updates

New capabilities, more capacity, global expansions, and plenty of exciting launches – it's been a big year for Megaport. Every year in the cloud world feels like a sprint. New architectures, new workloads, new ways to move data around. But when I look back at everything we delivered at Megaport this year, it’s clear why the pace felt so fast: We shipped a lot of things that genuinely change how people build and operate networks.

ShipTalk S4E6 | Beyond the Magic Box: Solving AI Hallucinations with Precision RAG

In this episode of the ShipTalk Podcast, host Dewan Ahmed (Principal Developer Advocate at Harness) sits down with Evgeny Ilinykh (Founder of GuidedMind.ai and former Tesla Engineering Manager) to move past the AI hype and get into the engineering reality of Retrieval-Augmented Generation (RAG). If your AI agents are hallucinating, the problem probably isn't your model—it’s your retrieval layer. Evgeny breaks down how to turn the "black box" of LLMs into a transparent, production-ready system that developers can actually trust.

NOC vs SOC: Understanding the Difference and Why Enterprises Need Both

A single data breach now averages a multi-million-dollar impact once you account for disruption, response, and long-tail regulatory and reputational damage. Business leaders are fighting on two relentless fronts: The Network Operations Center (NOC) is responsible for performance and availability. The Security Operations Center (SOC) defends the organization’s digital estate. The question isn't whether to choose NOC or SOC.

Securing customer logins with breach intelligence

Account takeovers (ATOs) are one of the most common threats facing online platforms. Attackers buy leaked usernames and passwords on underground markets then test them at scale across websites, hoping that password reuse will give them easy access. Today, ATOs have grown so sophisticated and fast-moving that manual incident response often can’t keep pace, requiring intelligent defense systems for detecting compromised credentials and preventing misuse at scale.

How microservice architectures have shaped the usage of database technologies

In the late 2000s, the big question in database design was SQL or NoSQL. While relational databases had long held their ground, document and key-value stores were emerging as serious alternatives. Many predicted a zero-sum, winner-take-all outcome. But when we look at how organizations are using database technologies today, no single tool or category has dominated the landscape.

Get started with Grafana Alerting: Link alerts to visualizations

In this tutorial you will learn how to link alert rules to time series panels for better visualization. Don't miss the rest of the "Get started with Grafana Alerting" series! Each part dives into a different feature to help you get the most out of alerting in Grafana.

Top 3 Trends Defining Network Observability in 2026

As we enter 2026, the dust has settled on the initial explosion of hybrid work and cloud adoption. The "new normal" is no longer new; it is simply operations as usual. However, the tools we use to manage this ecosystem are undergoing a massive correction. The fragmented, tool-sprawl approach of the early 2020s is proving unsustainable in the face of growing network complexity. Network operations teams are no longer looking for more data; they are looking for better answers.

Theory to Turbulence: Building a Developer-Friendly E2E Testing Framework for Chaos Platform

Chaos fault validation must be safe, predictable, and measurable. High setup friction blocks adoption and slows feedback loops. API-driven execution beats manual YAML workflows. Real-time logs and smart target discovery speed debugging. Dual-phase validation ensures impact and recovery. Strong DX enables faster, scalable chaos testing. As an enterprise chaos engineering platform vendor, validating chaos faults is not optional — it’s foundational.

New Option: Preserve URL Casing

Most web servers treat URLs as case-insensitive. A request to /About-Us lands on the same page as /about-us or /ABOUT-US. So when Request Metrics captures your traffic, we normalize all URLs to lowercase to prevent these duplicates from cluttering your reports. But not every system works that way. Some web frameworks (looking at you, Node and Python) treat URL casing as meaningful. /User/Profile and /user/profile might be completely different routes.