Operations | Monitoring | ITSM | DevOps | Cloud

Introducing Cribl Stream

It took THREE rounds of approvals to say what we’re about to say: We’re dropping a Log 😳. Yes, we said it: we’re dropping the Log in LogStream. Cribl LogStream is now known as Cribl Stream to reflect the enhanced functionality it delivers. LogStream already processed a lot more than just Logs, so it’s now known as Cribl Stream. Today’s announcement isn’t just about a name change, though.

CI/CD Benchmarks for High Performing Teams in 2022

Software delivery has never been more critical to the success of business in every industry. It’s also never been more complex. With the growing challenges of complexity, how can engineering teams succeed? CircleCI examined 55 million data points from more than 44,000 organizations and 160,000 projects to help guide team development and software delivery decisions. Benchmarks from the report show that the highest performing teams prioritize being in a state of deploy-readiness, deploy more often and recover faster.

What are Suspect Spans?

Suspect Spans surfaces a list of spans that correspond to where the most time in a transaction is spent. Instead of clicking into every trace in an attempt to identify the bad actor, check out the Spans tab or Suspect Spans section in every transaction summary and jump directly to the span that needs your attention. In this video, we dive more into what suspect spans are, and we go through a demo of how you can also use Suspect Spans as a complement to your performance monitoring.

IT Heroes Podcast - EPS 06 SMB's response to a cyberattack

In this episode, Edgar hosts Andy Ellwood, VP of Product Marketing, Pulseway, and Giridhara Raam, Cybersecurity Evangelist, Pulseway to discuss why the cyber response is important for SMBs and how should SMB's react to a cyber incident - communication norms, response protocols, and tips to up their game on the reactive approach.