Metrics At Scale: Understanding When A Spike in Sales Isn't Good News (Part 1)
Why could a spike itself not always be good news? Why is it so important to find the relationships between time series metrics at scale?
Why could a spike itself not always be good news? Why is it so important to find the relationships between time series metrics at scale?
For any company with an online presence, website traffic is important. The more visitors you attract, the more opportunities you’ll have to advertise your brand, establish relationships and ultimately sell your service or product. This is why a sudden drop in search engine traffic is a frightening prospect, since it ultimately leads to business losses and lower revenue.
We surveyed 1,264 chat users to find out, and we started with two seemingly simple questions. What we learned was fascinating and inspiring, so we gathered up the data and created the team chat guide.
With the proliferation of virtualization and high availability architecture, teams are chasing 99.999% uptime like knights of old hunted unicorns. Many site reliability engineers find more comfort in the Boy Scouts’ motto, “Always be prepared.” Your company’s Git server is mission critical to the daily operations of engineering and everyone they support. How do you create business continuity in the face of unpredictable circumstances?
This article explores integrating Google Pub/Sub with the world’s most popular open source log analysis platform — the ELK Stack, for deeper analysis and investigation.
We are excited to announce our recent support of .NET Standard 2.0 and ASP.NET Core 2 applications for Raygun Crash Reporting. The update is for developers needing to target the .NET Standard 2 APIs. Our new provider targets both .NET Standard 1.6 and .NET Standard 2.0, so it can be used with both .NET Core 1 and .NET Core 2 applications. At the time of writing, it is just the .NET Core provider and ASP.NET Core provider that are .NET Core 2 compatible.
The Linux Audit framework is a kernel feature (paired with userspace tools) that can log system calls. For example, opening a file, killing a process or creating a network connection. These audit logs can be used to monitor systems for suspicious activity.
As a long-time security professional, I’m always interested to hear about how companies like Datadog are keeping up with the changing security landscape. I can recall when the security organization was solely responsible for security, and we were focused on protecting the perimeter of our business. However, with the advent of the cloud, mobile, and web applications, that perimeter has disappeared.
Congratulations, VictorOps! OnPage would like to congratulate our contenders at VictorOps for their acquisition by Splunk. This acquisition of VictorOps validates the growing need for incident management and alerting platforms. As technology advances with sensors technology (IOT), and monitoring system utilizing AI, automation is necessary to achieve improved productivity and business resiliency. Therefore, incident management and alert automation is essential.