Latest Blogs

What are CDN Logs and Why Do They Matter

Content Delivery Network produces numerous log files called CDN logs to deliver video across the internet to our homes and mobile devices. These logs contain crucial information about the CDN servers' performance and video streaming quality. Also, it contains terabytes of data, which has its own set of hurdles in terms of handling it in real-time and performing analytics to understand user experience and network concerns.

Sponsored Post

TOP 10 IT Trends

Observability has gained a lot of momentum in the past year, be it full stack observability or data observability. Modern complex IT systems using clouds, microservices and serverless are easy to develop and deploy but extremely difficult to observe. These systems generate tremendous amounts of data and need an automated way of handling the volume. The next era of delivering customer experience is underpinned by the full stack observability capability.

Datadog NPM now supports Consul networking

Consul is a service networking platform from HashiCorp that helps you manage and secure communication between microservices. You can use Consul with Kubernetes, and it supports on-prem, hybrid, and multi-cloud architectures. Consul service mesh provides a control plane which allows you to automate the management of traffic between your services via features like service discovery, DNS, load balancing, and routing.

How to Improve Your Digital Workplace

Over the past couple of years, the workplace has gone digital. Yep, that's right: millions of employees now work from home through their computers and other devices. In addition to this, employees that have remained in the office are also highly reliant on digital tools. Unless there's a giant earthquake that wipes out the world's internet servers, it's safe to safe that the digital workplace is here to stay - and it's something you should be very excited about (especially if you're a business owner).

Monitoring AWS Spot instances using Sumo Logic

Spot worker nodes on EKS (Elastic Kubernetes Service) are a great way to save costs by allowing customers to take advantage of unused capacity. With Sumo Logic, we have experimented with and adopted spot worker nodes for some of our EKS clusters to see if we can pass along the same benefits. We decided to share some of the learnings, challenges, and caveats with using spot instances along with the monitoring setup.

Is Your Zero-Trust Solution Missing Half Your Network?

With hybrid work environments on the rise, enterprise networks are dealing with multiple remote connections, increasing the risk of breaches and other attacks. One way to mitigate these risks is by implementing Zero Trust Architecture (ZTA) into the enterprise network. Unfortunately however this does not address the full set of threats to the enterprise, as many of the zero-trust service providers and on-premises network solutions do not address the voice network.

Ask Miss O11y: Long-Running Requests

You need not fear a long-lived streaming workload. A few simple tricks can transform a request that may not ever terminate for hours or days into something you can get regular health and status updates on. We in fact have one of those continuous processing services—Beagle, our Service Level Objective stream processor—which we’ve instrumented in this fashion.

AI-Powered Monitoring Could Have Saved Millions for Global Bank

As most people were preparing to celebrate the new year, the UK’s Santander Bank was dealing with a crisis. On Christmas day, roughly 75,000 people who received payments from companies with accounts at Santander Bank received a duplicate payment transaction. The total damage amounted to £130m, and recovery in these situations is a painful process for both the bank and its customers.

End-User Monitoring: How it Can Impact Your Business

After the global pandemic and lockdowns, most businesses look onward to online solutions for their applications. They want to take their business online by creating mobile or web applications. Companies are looking to monitor every aspect of the application, including deployment, bugs, API failures, etc. But the most important thing is how the application behaves when it goes into the hands of the end-users.