Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

What is Network Management?

International businesses and near-citywide college campuses require effective network management solutions to minimize downtime, optimize performance and strengthen cybersecurity. In summary, network management helps maintain the efficiency, reliability and security of a local and/or cloud-based network. However, developing a viable network management strategy requires an understanding beyond its actions.

Get the Full Picture: AppSignal Adds OpenTelemetry Support

We're excited to officially launch our OpenTelemetry instrumentation. AppSignal is now able to expand our observability to a dozen popular languages, frameworks, and tools, giving customers the deep insights they need to monitor their entire stack. In this article, we'll show you how you can use AppSignal and OpenTelemetry to proactively monitor your app.

How DX NetOps Topology Streamlines and Optimizes Triage

Every network operator knows the feeling: a critical alert fires, and suddenly it’s all hands on deck. But instead of jumping straight to resolution, you find yourself sifting through irrelevant alerts, flipping between tools, and trying to assemble a puzzle with missing pieces. In today’s high-stakes, hybrid environments, that kind of delay isn’t just frustrating—it’s costly. When issues arise, fast, intelligent triage is a must.

What Your SD-WAN Isn't Telling You

Your SD-WAN is constantly making decisions. It assesses path quality based on metrics like packet loss, latency, and jitter, and steers traffic for your most critical applications accordingly. For this, it is an indispensable technology. But have you ever paused to ask a fundamental question: Is the path it chooses truly the best one available, or just the best one it can see from its limited vantage point?

Introducing our new notification logs

One of the core features of Oh Dear is that we can notify you whenever we detect problems with one of your sites. Our notification system is quite powerful. We support many different channels (like email, Slack, Telegram, ... and a whole bunch more), and have fine-grained control over which events should trigger a notification. Today, we've added notification logs.

Icinga DB Web Automation

Icinga DB Web Automation allows you to automate monitoring tasks and integrate them directly into your systems and workflows. It is possible to issue command actions without a browser. To do so, a form needs to be submitted by a tool such as cUrl. Every request you send follows the same permission rules and access restrictions defined in the web interface, so security and user roles still apply. Want to target specific hosts or services? Simply add filter parameters to the URL.

Network Visualization Tools: Key Features and Top 6 Tools in 2025

Network visualization tools are software applications that allow users to represent, explore, and analyze network structures graphically. These networks can include computer and telecommunication infrastructure, as well as social, biological, and organizational networks. Visualization is achieved by displaying nodes (entities) and edges (relationships), making complex datasets easier to interpret and manage.

Log Format Standards: JSON, XML, and Key-Value Explained

Your log format defines how your application records events. The structure you choose shapes how logs get parsed, indexed, and queried. It affects how quickly you can debug issues, build alerts, or control storage usage. In this guide, we'll take a look at the log formats developers typically use, the essential fields to include, and what trade-offs to consider before locking down a format for your system.

A guide to cloud unit economics

As you analyze your organization's cloud spending, you'll often find that stakeholders have different perceptions of what that spending brings you. This is especially true when overall costs are rising and it's hard to distinguish waste from valuable investments in growth. But when finance, engineering, and product teams can all connect cloud spending to specific business outcomes, you gain the ability to make data-driven decisions about how to maximize the value of that spending.

Prevent cloud misconfigurations from reaching production with Datadog IaC Security

Modern infrastructure is built and deployed faster than ever, but increased speed can elevate risk. Developers who work on cloud-native applications often use infrastructure as code (IaC) to define cloud resources in configuration files, which are then shared across teams and deployed automatically. Although this approach is efficient, undetected misconfigurations in IaC can quickly introduce security risks into production environments.