Operations | Monitoring | ITSM | DevOps | Cloud

WAN monitoring: changes associated with the Internet-based model

When we think about WAN monitoring we usually start from the basics: the behaviour of remote communication links will directly affect the performance of our applications. Therefore, we understand that if traffic over the communications link experiences high levels of latency this will negatively impact the response time that our users observe when accessing the applications.

How to Analyze Game Data from Killer Queen Using Machine Learning with Sumo Logic Notebooks

This year, at Sumo Logic’s third annual user conference, Illuminate 2018, we presented Sumo Logic Notebooks as a way to do data science within the Sumo Logic platform. Sumo Logic Notebooks integrate Sumo Logic data, data science notebooks and common machine learning frameworks.

Monitoring Kubernetes, part 1: the challenges + data sources

Our industry has long been relying on microservice-based architecture to deliver software faster and safer. The advent and ubiquity of microservices naturally paved the way for container technology, empowering us to rethink how we build and deploy our applications. Docker exploded onto the scene in 2013, and, for companies focusing on modernizing their infrastructure and cloud migration, a tool like Docker is critical to shipping applications quickly, at scale.

Visualize your Thundra Monitoring data with Honeycomb

Visualize your Thundra monitoring data with Honeycomb. Identifying critical issues in your stateless serverless environments can be difficult. Often, you are left guessing at where the problems may lie. Learn how to pinpoint critical issues in your AWS Lambda environment with the deep query and end-to-end tracing.

How to Troubleshoot .NET Application Performance Problems

Ready to know why your Microsoft .NET applications are slow? What is causing performance problems? Is there an issue in the .NET code? Developers and application owners often get involved in long war room sessions to isolate the root cause of application performance problems. With the right know-how, you can triage problems faster.

Conquer it with correlation-Part 3: Cryptojacking

In the previous posts of this blog series, we discussed advanced persistent threats and data breaches, highlighting the importance of data security in today’s times. In the final post of this series, we’ll talk about cryptojacking, a type of attack that can severely affect your network’s integrity, and how you can combat it with event correlation.