Operations | Monitoring | ITSM | DevOps | Cloud

How to: Email Incident Stakeholders with conditions in FireHydrant

Our release of conditions in FireHydrant Runbooks has made it easier for teams who rely on email to communicate with key stakeholders or a distribution list. 💡If your team uses Slack, and you haven’t already installed our Slack integration, you should definitely check it out as it’s the easiest way to automate updates to channels when the status of an incident changes.

PostgreSQL vs MySQL

Despite all of the hype about NoSQL databases, MySQL and PostgreSQL are two database management systems that have truly stood the test of time. These systems were developed back in the mid 90’s, and they still consistently rank among the top 5 most popular databases across the internet. So why are they so widely used and how do they compare? Read on to find out!

Real User Monitoring for JavaScript with Retrace

Real User Monitoring, also known as End User Monitoring or RUM, is a way of monitoring the client side portions of an application. Real User Monitoring for JavaScript allows developers to have access to key metrics for load times and user paths being used in production as part of their application performance management (APM).

How to make snaps and configuration management tools work together

In environments with large numbers of client machines, configuration management tools are often used to simplify and standardize the target state of each host in a seamless, automated and consistent manner. Software like CFEngine, Chef, Ansible, and others offer a high degree of granular control over software packaging and system configurations.

Our IT transformationstrategyequals three zeros

When I joined ServiceNow, IT Operations had what I’d call a “best effort” strategy—push hard, keep things running, meet your SLAs, and so on. This worked well enough, but that was hardly a formula for long-term success at scale.   We needed a new way of thinking that would move us from our traditional role as incident firefighter to that

Solving Runaway Series Cardinality When Using InfluxDB

In this post, you’ll learn what causes high series cardinality in a time series database and how to locate and eliminate the culprits. First, for those of you just encountering this concept, let’s define it: The number of unique database, measurement, tag set, and field key combinations in an InfluxDB instance. Because high series cardinality is a primary driver of high memory usage for many database workloads, it is important to understand what causes it and how to resolve it.

Working in the SOC with Power Tools: Splunk and Polarity

Have you ever had to saw through a board by hand? I had to finish a partial cut by hand the other day while building a new mantle for my fireplace. It’s slow and difficult, and it often results in a lesser quality cut than one done with a power tool. It’s good exercise, though! We should all have to do it at least once so we appreciate our power tools more.

Sponsored Post

Reduce MTTR with Crowd-Sourced Analytics

The new normal for enterprises today is to witness the vast majority of its employees working remotely across multiple geographic locations and communicating through cloud applications such as Office 365, Slack, or video conferencing tools such as Microsoft Teams or Zoom. As more users feel the need to avoid travel and stay at home due to Covid19, it becomes critical that the underlying infrastructure monitoring these applications respond immediately to service disruptions and sub-optimal performance. The slower an application becomes, the more negative impact it can have on employee productivity and the firm's ability to conduct business smoothly.

Understanding how attackers move inside your organization

Cyberthreats have been coming at us from the left, right, and center. The number of cyberattacks is forever on the rise, and companies need to keep ramping up their security measures to protect themselves. It’s important that these measures cover every aspect of a network environment. To understand why monitoring your whole environment is so important, let’s take a look at what an attacker might do once they get inside your organization.

Monitor Auth0 with Datadog

Auth0 provides identity as a service (IDaaS), allowing you to secure your apps and APIs without having to write your own authorization code. Auth0 can work with social identity providers (IdP) like Google and Facebook so your users can access your app by using their existing accounts for authentication. You can also use an existing enterprise identity provider (e.g., LDAP) to allow your users to leverage single sign-on (SSO) across multiple apps.