Operations | Monitoring | ITSM | DevOps | Cloud

Turn fragmented runtime signals into coherent attack stories with Datadog Workload Protection

Security teams face a constant trade-off between detection coverage and alert fatigue. Broad, rule-based detection approaches surface every possible indicator of compromise (IoC) but generate unmanageable alert volumes. Narrow, tightly scoped rules reduce noise but risk missing critical signals. And while individual indicators of compromise can highlight suspicious behavior, they often lack the surrounding context needed to tell a complete story of how an attack unfolded.

From Observability to Network Intelligence: How Kentik Built the Foundation for Networks That Think

The age of dashboards is ending, as observability has only created more noise for network teams to sift through. Kentik SVP of Product, Mav Turner, lays out why true network intelligence requires a clean, contextual data foundation to finally create a network that thinks.

Work Where Your Teams Already Are with PagerDuty's AI Agents for Slack

Modern operations happen in Slack, where teams spend their days collaborating, troubleshooting, and resolving incidents. And while many incident management tools offer Slack-friendly experiences, they lack end-to-end capabilities that teams need. During critical moments, other tools may require users to switch between Slack and their own interfaces, creating friction.

Hands on Exercises Overview | Grafana Alloy for Beginners Episode 13

The moment to test your mad Alloy skills is here! Join Lisa Jung and Mischa Thompson from Grafana Labs for an overview of the four hands-on exercises and see how much you’ve learned throughout the series. This hands-on exercise section consists of four missions: The Hidden Key The Cardinality Crisis Attribute Alignment Redact and Protect Your mission, should you choose to accept it, awaits you in the Mission section of the series repo.

Solutions to hands on exercises | Grafana Alloy for Beginners Ep 14

In this episode, Lisa Jung and Mischa Thompson reveal the solutions to all four hands-on missions, showing how Alloy can collect, process, and secure telemetry data with precision and style. From uncovering hidden keys to securing sensitive data this episode puts Grafana Alloy’s problem-solving skills to the test. This repo is a great resource for learning about the Grafana stack end to end, so check it out if you'd like a full end-to-end working example!

Can a Human Beat Grafana's AI at Its Own Game?

Grafana Assistant just went GA at ObservabilityCON, and it’s already changing how developers onboard, troubleshoot, and build dashboards in Grafana Cloud. In this video, we put it to the ultimate test — a head-to-head challenge between me and the Grafana Assistant. Who can onboard an app into Grafana Cloud faster and more accurately? Chapters: Watch as we explore: How the Grafana Assistant simplifies onboarding and setup Building dashboards for Redis, Kafka, and Postgres The power of using community dashboards vs. manual configuration Whether AI can truly speed up observability workflows.

SharePoint Storage Limit Warning

When your Microsoft 365 tenant reaches the SharePoint storage limit, the impact is immediate. File uploads start failing, Teams sites stop provisioning, indexing slows down, and storage overage charges begin applying automatically. For organisations storing large volumes of documents, drawings, media files, or project data, hitting the SharePoint capacity threshold can become a recurring and expensive problem—especially when underlying retention policies prevent deletion.

Not so "mini"-dumps: How we found missing crashes on SteamOS

We shipped an improvement to Sentry's game engine and native SDKs that most developers probably didn’t even notice until now – unless they were explicitly aiming to test their Windows-built games on Linux with Wine/Proton compatibility layers. That's exactly the point. While we were focused on improving our game engine SDKs, our learnings while investigating a mysterious issue are applicable for any Windows application running on Linux via Wine or compatibility layer.

Cybersecurity Monitoring Best Practices: Building a Stronger Defense Against Modern Threats

Let’s be honest—the cybersecurity battlefield keeps changing fast. Attackers evolve their tactics, networks expand, and data flows in every direction. If you’re responsible for protecting your organization’s security, staying ahead of cyber threats can feel like chasing shadows. This is where effective cybersecurity monitoring comes in.