Operations | Monitoring | ITSM | DevOps | Cloud

How To Use Alloy and Hosted Graphite's Loki to Store and Visualize Logs

In a modern DevOps environment, having just metrics or just logs is like trying to navigate with half a map because you’re missing important context that makes decisions faster and smarter. Metrics tell you what is happening (CPU spikes, request rates, failed logins) but logs tell you why it’s happening, with the timestamps to prove it.

Your APIs are up, but did the payment go through?

If your challenger bank is built on composable core platforms like Mambu or Temenos, this one’s for you. Composable platforms enable API-first integration with modular services, letting you launch, adapt, and grow products quickly. That makes API health a top priority — and it shows in our State of API Reliability Report 2025 (we’ve pulled out the key fintech findings for APAC below).

Ready, steady, goa: our API setup

At incident.io, speed is essential. Our product is growing faster than ever; in scope, range of features and the number of people contributing to it. In the early days, when you’re a small startup with just a few hundred endpoints, a basic API setup gets you by. But as things scale, you need to make creating endpoints easy, fast, and reliable.

Learn OpenTelemetry tracing through a grand strategy game: introducing Game of Traces

A trace always remembers! Okay, okay. I will try to keep my Game of Thrones references to a minimum throughout this post, but there is a lot of truth to that statement. In observability, a trace is the “when” and “where” of telemetry signals, allowing us to track the state of interactions between services within a microservice architecture. This makes traces the ideal observability signal for discovering bottlenecks and interconnection issues.

A CISO's guide to Application Security best practices

When most people think about the most important ingredients of software, Application Security (AppSec) is unlikely to be at the top of the list… but it should be. Without AppSec, you face severe risks of data breaches, massive fines, enraged users, and severe financial losses.

Introducing Megaport IPsec Tunnels

Protect your network traffic from cloud, edge, or branch with Megaport’s new IPsec add-on for Megaport Cloud Router. If you’re managing a network across public cloud, private cloud, branch offices, disaster recovery sites, or remote endpoints, you’ve probably asked the question: How can I secure this entire environment without adding more hardware or complexity?

Top 7 Application Performance Monitoring Tools

Your application is under constant pressure to deliver low latency, high reliability, and a smooth user experience isn’t optional. When performance drops, every second matters. Application Performance Monitoring (APM) gives you the visibility to spot issues before your users feel the impact. It also helps you understand what’s happening inside your stack, so you can track resource usage, pinpoint bottlenecks, and keep things running at peak performance.

HTTP status codes? Here's a cheat sheet

Whenever you visit a website or click on a link, there’s a whole conversation happening behind the scenes between your browser and the web server. That conversation includes something called HTTP status codes and knowing what they mean can help you make a diagnosis, so to speak. Usually, everything goes smoothly (like a 200 OK), but sometimes things break (looking at you, 404 and 500).

Using DCIM to Consolidate and Drive Down Colo Costs

As colocation demand surges, space is becoming increasingly scarce and costly. According to CBRE, the average asking rate in primary wholesale colocation markets for a 250–500 kW requirement has climbed 12.6% year-over-year to a record $184.06 per kW/month, while vacancy rates have dropped to a record-low 1.9%. With vacancy rates low and power costs rising, doing more with less in your data center is essential.

Best Practices for Managing Multiple Vendor Dependencies

Modern businesses rely on dozens of third-party services to operate efficiently. From payment processors and cloud providers to analytics tools and communication platforms, these vendor dependencies form the backbone of your technology stack. When one fails, it can trigger a cascade of issues across your entire operation. Managing multiple vendor dependencies requires a strategic approach that combines proactive monitoring, clear documentation, and well-defined response procedures.