Operations | Monitoring | ITSM | DevOps | Cloud

Where is Your Next Release Bottleneck?

A typical modern DevOps pipeline includes eight major stages, and unfortunately, a release bottleneck can appear at any point: These may slow down productivity and limit a company’s ability to progress. This could damage their reputation, especially if a bug fix needs to be immediately deployed into production. This article will cover three key ways using data gathered from your DevOps pipeline can help you find and alleviate bottlenecks in your DevOps pipeline.

10 Elasticsearch Configurations You Have to Get Right

Elasticsearch is an open source, distributed document store and search engine that stores and retrieves data structures. As a distributed tool, Elasticsearch is highly scalable and offers advanced search capabilities. All of this adds up to a tool which can support a multitude of critical business needs and use cases. To follow are ten of the key Elasticsearch configurations are the most critical to get right when setting up and running your instance.

Boosting Monitoring Efficacy for Telecom via Correlation Analysis

In the first and second part of the blog series, we discussed the importance of correlation analysis in root cause analysis in general and in the context of promotional marketing. In a similar vein, in this blog we walk through how to leverage correlation analysis to address challenges in the telecom space.

Why do businesses need network mapping software?

Networks are rapidly becoming larger and more complex, with numerous different technologies playing into their expansion. Network mapping is increasingly important for network administrators tasked with handling these growing networks. Network mapping provides network admins with a visual map so they can check network performance, the status of connected devices, monitor the network, and analyse networks before initiating troubleshooting efforts.

ITOM basics: Process monitoring

Monitoring the performance of server infrastructure is crucial to any organization. While metrics such as health and availability will sometimes suffice for measuring overall efficiency, getting visibility into more details, such as the underlying processes, tasks, and scheduled jobs, is often crucial for not just identifying a performance problem but also isolating its root cause.

IT security under attack: Why are group memberships so crucial?

Security groups either make or break your IT security. Group memberships are responsible for administrative access in your your network and define access to other privileged resources and data on your domain. Ever wondered how a simple misconfiguration of a group membership could lead to a security incident? This blog elaborates the most common misconfiguration or security loopholes that can cause damage to the sensitive data in your network.

Five worthy reads: Decision intelligence for critical business moments

AI and analytics are playing critical roles in driving innovation among many businesses riding the digital transformation wave during this pandemic. Many business leaders realize that people are not wired to think exponentially, but incrementally in a linear world, unable to see the ripple effects of their actions. The pandemic has highlighted the enormous impact this has on the quality of decisions made, especially in the context of business.

Explore your data effortlessly with the Datadog Clipboard

When investigating a complex system—or learning about it for the first time—you need to explore metrics, traces, logs, and other kinds of data. But as you navigate across different views of your data in dashboards, alert notifications, flame graphs, and so on, it can be hard to keep track of what you have already seen. When a potential issue comes up and time is tight, the last thing you need is to spend time remembering a crucial graph or finding the right browser tab.

End-to-end application monitoring with Datadog

For complete visibility into the performance of your applications, you need telemetry data—traces, metrics, and logs—that describes activity across your entire stack. But if you’re using multiple monitoring tools, your data can end up in silos, making it difficult to troubleshoot issues that affect your user experience.

Why we helped AWS build its Prometheus service

During a re:Invent keynote on Dec. 15, Amazon announced its AWS Managed Service for Prometheus. The service is built using the CNCF’s Cortex project, the open source, horizontally scalable Prometheus-compatible project that I started with Julius Volz over four years ago. I’d like to take this opportunity to extend a warm welcome to the Prometheus-as-a-Service club! We think you’ve made a good choice choosing Cortex, and see this as a massive vote of confidence in the project.