Operations | Monitoring | ITSM | DevOps | Cloud

Creating your first health alarm in Netdata

The per-second metrics and interactive visualizations in the Netdata Agent don’t mean much if you don’t know what you should be looking at, or whether anything is going wrong on your node in the first place. That’s why Netdata has a built-in health watchdog to notify you when metrics show an anomaly or full-blown incident that demands your immediate attention. Every Netdata Agent comes with hundreds of preconfigured charts that you don’t need to edit in order to take advantage of, but you may want to create your own based on your infrastructure, node, workload, or applications.

Telecom Review Leaders' Summit 2020 Panel Discussion - Wholesale and Capacity

The 14th Telecom Review Leaders' Summit 2020 Panel Discussion – Wholesale and Capacity: Managing the Explosion of Data Traffic discussion covers how the wholesale and capacity industry played a major role amid COVID-19, the impact of the pandemic on data traffic, challenges brought about by COVID-19 and more.

Runtime Threat Detection on AWS

Join Sysdig and AWS experts to learn how to detect and respond to threats to your production applications running on services like AWS Fargate and Amazon EKS. With the rise of microservices and DevOps practices, new security threats put your infrastructure and applications at risk. Hear how to leverage signals from AWS CloudTrail and open source Falco to spot unexpected behavior, block threats, and validate compliance across your AWS environment.

Distributed Network Monitoring: What is it & What are the Benefits?

Many businesses are embracing remote offices and working from home, storing their data in the Cloud, and ditching centralized data infrastructures. With distributed architectures becoming the new normal, it’s important to have a distributed monitoring solution that can keep up.

Combining Progressive Delivery with GitOps & Continuous Delivery

Three phrases keep popping up when talking about modern workflows, development, and deployment techniques... While these three practices and the tooling behind them are focusing on specific areas, the "real" benefits are obtained when they are combined. Nevertheless, many have not yet reached that stage yet. Each of these practices alone can be daunting and, frankly, scary. Yet, we should go a step further and explore how to combine them together and see the benefits such a solution might provide.