Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Dashboard Server Learning Path

Hey everyone! It’s been a while since we've gone on a learning journey together, after the Azure Monitor Learning Path. I’m thankful for the love that series received, and since then, I've been looking for another opportunity to take on something new and share my learning experience with you all. Finally, the time has come!

Grafana 7.5 released: Loki alerting and label browser for logs, next-generation pie chart, and more!

Grafana v7.5 has been released! This is the last stable release before we launch Grafana 8.0 at GrafanaCONline in June. Register for free now, so you won’t miss the great sessions we’re planning around all things Grafana. And if you’re doing something special with Grafana that you’d like to share with the community, the CFP for GrafanaCONline is open until 06:59 UTC on April 10! Now, back to 7.5.

Detecting rare and unusual processes with Elastic machine learning

In SecOps, knowing which host processes are normally executed and which are rarely seen helps cut through the noise to quickly locate potential problems or security threats. By focusing attention on rare anomalies, security teams can be more efficient when trying to detect or hunt for potential threats. Finding a process that doesn’t often run on a server can sometimes indicate innocuous activity or could be an indication of something more alarming.

Which Event Log Events Should You Worry About?

When you are configuring your event log monitor settings, you need to decide which event log events you need to worry about. Event logs are generated for a wide array of processes, applications, and events. Logs will record both successes and failures. As such, you need to decide what data is most vital and needs your immediate attention.

Using Sentry Performance To Make Sentry Performant

Like many companies, Sentry uses feature flags to determine when certain users see certain features. Recently, we decided to switch our feature flag software to an open-source system called Flagr. And while implementing Flagr, we used our new Performance tools to find — and ultimately fix — a serious issue in how we were fetching our flags.

Debugging with Dashbird: Lambda Configuration Error

It shouldn’t be a surprise that Lambda configuration error is one of the most common error messages, and we all know AWS error messages aren’t known for being especially detailed. Oftentimes you will come across other vague error messages like “encoding not enabled,” or “stream is failing,” and depending on the context, this could mean your services could be completely down.

SaaS vs. PaaS vs. IaaS: What's the Difference?

Every service you acquire to use temporarily and let go of when you’re done can use the “as a service” suffix. A cab is a vehicle as a service. Rather than buying a car, you merely pay to have another person’s car move you from one point to the next. IT services embody the same model. Browser-based text editors alleviate the need to install fully-fledged word processors on computers.

How to Achieve Unified IT Observability Amidst the Global Pandemic

The concept of unified IT observability has gained newfound importance in today’s world of remote work, hybrid infrastructures, and technological convergence. In this video, Christina Kosmowski, President at LogicMonitor, shares five tips on how to power your business forward and achieve unified IT observability during uncertain times.

Stop Onboarding Like It's 2019

First impressions matter. The first day of a new job can be daunting, especially in a post-2020 world. Back in 2019, you might have asked yourself questions like: is this office going to be open-concept or a bunch of cubicles? Will I get to sit near a window with some natural light or are they going to stick me next to the bathroom? Now new hires ponder questions like: what will my digital work environment look like? Will IT send me a new laptop, camera, and speakers?

Automated Patch Management and Team Swarming are Key Security Practices

In the blink of an eye, you can miss a new business disrupting security incident. We all recognize that cybersecurity breaches are increasing in volume and sophistication. How we respond to them is critical. Security vulnerabilities force organizations to go outside of their daily activities to execute out-of-band responses. We face numerous challenges in managing security risk.