Operations | Monitoring | ITSM | DevOps | Cloud

Cloud Cost Management Demo

Growing cloud costs are a new constraint and challenge for many DevOps, FinOps, and Cloud Platform teams. Cloud Cost Management delivers granular cost data, scoped to the services developers own, so that engineers can take action on cost data. By unifying cost and observability data, engineering teams can quickly understand the root cause of cost changes, identify wasteful spend in their environment, and empower everyone across their organization to become a cost owner.

Kentique - The Fragrance of Observability

What does observability smell like? For ages, humans have relied on sight to observe network, cloud, container, and data center traffic. Kentik is proud to usher in the next step in the evolution of network observability. Welcome to the age of scent! Introducing Kentique, a new fragrance from the creators of Kentik. Whether managing network infrastructure in the server room or entertaining guests at an AWS re:Invent afterparty, you need to smell the part – an aromatic infusion of routers, clouds, clusters, and telemetry dancing in a symphony of observability.

RCA Series: Root Cause Analysis in Observability with Elastic AIOps (2/4)

Root cause analysis empowers you to prevent issues from recurring that were revealed by your monitoring IT systems and online applications including eCommerce sites. See Elastic engineers walk you through applying four AIOps capabilities and accelerate MTTR by automatically categorizing logs, explaining log rate spikes, visually inspecting anomalous components in their context, and correlating slow or failed transactions with potential root causes.

RCA Series: Accelerate security investigations w/ machine learning and Elastic (3/4)

Comprehensive security requires multiple layers of threat protection. Sophisticated threats exploit idiosyncrasies in your environment. Unsupervised machine learning identifies patterns of normal activity from your data, and therefore can catch attacks that standard approaches to threat hunting, such as pre-defined rules, are likely to miss. This video explains how machine learning adds a layer to your threat protection, and how interactive tools offered in the Elastic Security solution accelerate the investigation of security incidents.