Operations | Monitoring | ITSM | DevOps | Cloud

Automation Mistakes: The Anti-Patterns Holding IT Back

In a world where AI and automation are redefining enterprise IT, there’s one harsh truth that often gets overlooked: most automation initiatives fail before they begin. Not because the technology isn’t ready, but because the strategy isn’t. Too often, teams fall into well-worn traps—automation anti-patterns—that stall progress, waste resources, and fail to deliver meaningful impact. Let’s call them what they are: automation mistakes.

Reality Bites: 7 Key Disadvantages of Real User Monitoring

Real estate professionals have said for years that the three most important factors about a property are location, location, and location. Well, for organizations with a web presence — which these days is the vast majority, and 100% of e-commerce companies — the three most important factors about their site are visitor experience, visitor experience, and (let’s all say it together!) visitor experience.

COREDUMP #008: Navigating the Changing IoT Security Landscape: A Survival Guide for Product Leaders

In today's Coredump Session, we dive into the evolving landscape of IoT security regulations with Giovanni Alberto Falcione, CTO at Exine. From the impact of the EU's CRA to the complexities of OTA updates, Giovanni, François, and Thomas unpack what these new requirements mean for product engineers and how to navigate the increasingly stringent security landscape. Speakers: Key Takeaways: Follow Memfault.

How to easily connect Prometheus to Grafana Cloud

Prometheus is one of the most popular open source monitoring tools due to its powerful flexibility for collecting time series metrics. But raw metrics aren’t always helpful on their own. That’s where Grafana Cloud comes in. By connecting Prometheus to Grafana Cloud, you get rich visualizations, alerts, and dashboards that make your data actionable without having to manage any additional infrastructure.

Visualize Databricks in Grafana: write custom SQL queries, build interactive dashboards, and more

As part of our big tent philosophy at Grafana Labs, we think you should be able to dig into your data and find meaningful insights — wherever that data happens to live. For many of our users, that data lives in Databricks, the open analytics platform for building, deploying, sharing, and maintaining enterprise-grade data, analytics, and AI solutions at scale.

Your incident response plan is obsolete-unless it includes agentic AIOps

Why are we still handling IT incident response like it’s 2014? Every day, ITOps teams are flooded with alerts, spread thin across hybrid systems, and stuck trying to stitch together visibility from solutions that don’t talk to each other. The incidents keep coming, but the tools aren’t getting smarter—and the humans are burned out. Even with best practices in place, response is often slow, inconsistent, and reactive. You chase symptoms instead of solving problems.

Navigating GCP Instance Types: What To Use And When

Google Cloud Platform (GCP) might not always be the loudest name in the cloud room. But it’s gradually become a powerhouse for organizations running data-intensive, AI/ML, and global-scale applications. We also can’t ignore that GCP offers a backbone powered by Google’s own infrastructure (the same one that runs YouTube, Gmail, and Search).

Sensitive Action Log in Redgate Monitor Enterprise

I’m excited to announce a new capability in Redgate Monitor Enterprise: the Sensitive Action Log. As infrastructure becomes more complex, it’s more critical than ever to maintain control over how your monitoring environment is configured and accessed. Whether you’re responding to internal compliance policies, preparing for audits, or simply tightening operational security, it’s key to understand who did what, when.

Debug Logs and Analyze Trends with Log Data Rehydration

Everyone in your organization needs logs to perform the critical functions of their job. Developers need them to debug their applications, security engineers need them to respond to incidents, and support engineers need them to help customers troubleshoot issues. These various use cases create general requirements for enriched log data, often including accessing insights from outside typical retention windows.