Operations | Monitoring | ITSM | DevOps | Cloud

How to monitor vSphere with Datadog

In Part 2 of this series, we looked at how to use vSphere’s built-in monitoring tools to get insight into core components of your vSphere environment, including virtual machines and their underlying hardware. Next, we’ll show you how to use Datadog to get complete end-to-end visibility into the physical and virtual layers of your vSphere environment.

Key metrics for monitoring VMware vSphere

VMware’s vSphere is a virtualization platform that allows users to provision and manage one or more virtual machines (VMs) on individual physical servers using the underlying resources. With vSphere, organizations can optimize costs, centrally manage their infrastructure, and set up fault-tolerant virtual environments.

Preparing your website for Black Friday

Each year ecommerce sites are named and shamed for failing to prepare their website for Black Friday, sacrificing sales revenue and reputation. We explain changes companies can make in advance to mitigate outages, reduce shopping cart abandonment and improve digital experience in preparation for Black Friday 2020.

MetricFire vs. Datadog

Before we dive into the specifics of MetricFire vs. Datadog, let's address the most critical point: scaling. Datadog is great for users who need to do a little bit of everything, but Datadog's biggest weakness is scaling. Datadog can do logs, APM, time-series and more, but scaling time-series metrics, alerts, and servers will cause your monthly bill to escalate. The graph below shows what you pay at Datadog vs. MetricFire: Now, let's dive into MetricFire vs. Datadog, and their key comparisons.

Monitoring the London Underground with SCOM

This week I had the honour of speaking at Silect’s MP University and my hot topic was Cookdown’s free PowerShell Authoring MP. I was looking to make the session a little fun, in homage to the original “Fun SCOM Monitoring” video from CTGlobal on monitoring a coffee machine with SCOM 2007 R2. So, I thought what’s the next best thing after coffee? Beer!

How LM Logs Makes Data Meaningful

Before I get started on how excited I am to see LogicMonitor launching a logging product, here’s a little background information. This blog is probably a blast from the past for many longtime LM employees and customers. I served at the company for over seven years, starting from back when it was just a few of us trying to see if a SaaS monitoring product would be accepted in the marketplace (while seemingly crazy to say now, SaaS was a tough sell back in 2011).

Who Uses A Network Performance Monitor

Network performance monitoring has become a standard practice for modern businesses. With the shift towards large cloud-based applications, and hosted services, businesses rely on optimal network performance to sustain some of their key applications. Because of that, tools like network performance monitoring software have piqued the interest of users even outside of the IT team.

Introducing Agent Modes

Today we are introducing the Agent Modes to help our users to configure the client / server relation between monitoring agents. This article describes the differences between the old settings and the new one. The documentation on Agent Modes is available at Agent Modes. This article refers to old settings that are no longer available in the App and it should be read only by users used to these old settings.

Securing Kubernetes clusters with Sysdig and Red Hat Advanced Cluster Management

In this blog, we introduce the new integration between Sysdig Secure and Red Hat® Advanced Cluster Management for Kubernetes that protects containers, Kubernetes, and cloud infrastructure with out-of-the-box policies based on the Falco open-source runtime security project. Organizations are quickly growing their Kubernetes footprint and need ways to achieve consistent management and security across clusters.

Highlight Critical Security Attacks with Logz.io's New Alerts Correlation

The ever-evolving cloud-native landscape creates constantly changing attack surfaces. As a result, teams implement a whole suite of security tools to identify large varieties of vulnerabilities and attacks, as well as monitor more logs than ever to find malicious activity. But monitoring so much information can cause a barrage of notifications and alerts. Even if you’re identifying real security threats, it can be impossible to know where to start and where to focus.