Operations | Monitoring | ITSM | DevOps | Cloud

Routing OpenTelemetry logs to Sentry using OTLP

If you've already instrumented your app with OpenTelemetry, you don't have to rip it out to use Sentry. Two environment variables and your logs start flowing into Sentry, no SDK changes, no re-instrumentation. Here's how to set it up in a sample app, and when the native Sentry SDK might be the better call.

Practice Vs. Performance: Two Reports On The State Of FinOps

This month, two FinOps research reports landed in close proximity. One from the FinOps Foundation — their 6th annual State of FinOps, drawing on a broad global practitioner community. One from CloudZero: FinOps in the AI Era: A Critical Recalibration, built on responses from 475 senior leaders at cloud-mature, AI-active organizations, with a focused lens on how AI is reshaping cloud cost management. Read each alone, and you get a useful snapshot for your business.

Your Questions About AI-Assisted Development Answered

We recently hosted a webinar on AI-assisted development with DORA, and the audience had a lot of questions—far more than we could get to in an hour. I picked out six that get at the stuff people are wrestling with day to day. These aren't the easy questions, and I don't think there are necessarily easy answers, but I've spent the past year building and shipping with AI coding tools and observing (literally) what happens when that code hits production. Here's what I have.

Deterministic Simulation Testing in Diskless Apache Kafka

Aiven put Diskless Kafka through 2,200 logical hours of chaos testing using Antithesis. Here's how it held up. Testing is a necessary pillar in any software development lifecycle. At the same time, it's a fundamentally incomplete process - a cat-and-mouse game. You can't test what you can't imagine and distributed systems have a nasty habit of producing failures that no one on the team imagined.

Transform or Fade: What 2026's Booming Digital Economy is Teaching Us

That is the defining business tension of 2026. A vanguard of roughly 12% of global enterprises, per PwC's 29th Global CEO Survey of 4,454 chief executives, has managed to deliver both revenue growth and cost reductions from AI simultaneously. These organizations are not just ahead. They are structurally pulling away. For everyone else, the 56% of CEOs who report no significant financial benefit from AI despite sustained investment, the clock is compounding against them.

Meet the new Bits AI SRE: Deeper reasoning, twice as fast

When we announced Bits AI SRE at DASH 2025, we introduced an autonomous SRE agent that investigates alerts the moment they trigger. Bits AI SRE reads the same telemetry data as your team, understands your architecture, and follows your runbooks to identify likely root causes before you even open your laptop. It’s your AI teammate that’s always on call.

AI-ready sovereignty playbook 2026: how to run gen-AI workloads (ethically) in the EU

Sovereignty is a concept that can have shown nuances in the way it is currently used by states and industry to describe some services. The term “strategic autonomy” has also been used, as to describe the need for governments to ensure that they have a hand on the full value chain (or at least know the gaps and accept the risks) and can apply their rules while it seats in its jurisdiction (autonomy derives from the greek autos (self) nomos (rule).

From Reactive to Predictive: Preserving BESS Uptime at Scale

Battery Energy Storage Systems (BESS) operate as revenue-generating grid assets that capture surplus electricity, deploy power during demand spikes, and support frequency control. By shifting energy across time, they stabilize grid conditions, enable renewable integration, and execute market dispatch commitments. When systems respond as designed, stored capacity becomes a flexible, monetizable supply. But BESS performance depends on precision and availability.

Who Owns Endpoint Management? Defining Security and IT Governance

Endpoint management is one of the most critical — and most contested — areas of enterprise governance. Every organization depends on endpoints, yet many still struggle to answer a fundamental question: who actually owns these devices? In many environments, IT and security teams are both confident they’re doing the right thing, yet still talk past each other. Security looks at a scanner and sees 10,000 critical vulnerabilities; IT looks at a patch report and sees everything deployed.