Operations | Monitoring | ITSM | DevOps | Cloud

Challenges in Monitoring Applications That Use OAuth

OAuth (Open Authorization) has become a critical component in enabling secure and third-party access to APIs which makes it one of the most widely adopted authentication protocols for modern applications. From allowing users to sign into apps using their Google or Facebook accounts to enabling third-party service integrations, OAuth simplifies the process of granting access to resources without compromising security.

Operational excellence in the age of AI and Automation

The future of operations is here with PagerDuty's groundbreaking AI and automation innovations. Learn how PagerDuty AI agents, powered by PagerDuty Advance, and new use cases like security incident management and LLMOps can help your organization achieve operational excellence to reduce cost, mitigate the risk of outages, and accelerate innovation.

COREDUMP #004: The Future of Edge AI and What it Means for Device Makers

Join the Founders of Memfault as they dive into this trend alongside special guest Alexander Samuelsson, CTO and Co-Founder of Imagimob (an Infineon Technologies company). This conversation on The Future of Edge AI and What It Means for Device Makers will explore how advancements in Edge AI are reshaping the embedded landscape, from hardware design to edge AI model development.

Former Pebble Engineers Discuss The Evolution of Pebble's App Sandbox

When Pebble launched its SDK in 2012, it started as a pile of Python scripts. That was just the beginning. Memfault founders, François Baldassari and Chris Coleman, along with Brad Murray of Beeper, discuss the evolution of Pebble’s app sandbox, the challenges of early firmware development, and how a passionate developer community helped shape the platform.

What are Kubernetes audit logs and how to monitor them?

Security and compliance: Many industries, especially those governed by regulations like HIPAA, the PCI DSS, or the GDPR, require detailed logs for compliance and to trace security incidents. Troubleshooting and forensic analysis: If something goes wrong—whether due to accidental configuration changes or malicious activity—having detailed logs helps diagnose the root cause and quickly remediate it.

Using Amazon RDS for high availability: How monitoring ensures reliable failover

Database downtime can lead to significant disruptions, revenue loss, and frustrated users. Amazon Relational Database Service (RDS) provides a managed database solution with high availability and automated failover to minimize such risks. However, continuous monitoring is crucial to ensuring reliable failover and minimizing downtime by detecting potential issues before they impact operations.

Managing Multiple Service Instances with a Systemd Generator

When working with systemd services in Linux, you might encounter situations where multiple instances of a service need to be managed dynamically. When I had to develop a solution to monitor multiple Kubernetes clusters with Icinga for Kubernetes, I ran into exactly this challenge.

Why Context Matters: Mastering Serverless App Monitoring

Hi there, and welcome to the second video in this series on observing AWS serverless applications with Datadog. In this video, you’ll learn how important it is to add custom business context to the telemetry you send to Datadog and how you can use that inside APM to quickly diagnose and debug issues. You’ll walk away with an understanding of the importance of distributed tracing, as well as how you can add specific business context to the telemetry you send.