Operations | Monitoring | ITSM | DevOps | Cloud

Monitor Kubernetes Hosts with OpenTelemetry

It’s 3 AM. API latency just spiked from 200ms to 2s. Alerts are firing, and users are frustrated. You SSH into the first server: top, free -h, iostat — nothing unusual. On to the next host. And the next. That’s how most of us learned to debug. The tools worked, and we got good at using them. But as infrastructure became distributed and dynamic, this approach started to break down. Modern monitoring needs more than SSH and top. It needs unified telemetry.

What does risk appetite mean?

Defining your risk appetite – the level of risk your organization is willing to accept – is one of the most important steps to adopting an exposure management strategy. If your risk posture’s out of line with your risk appetite, it’s time to take action. Ivanti’s Chris Goettl breaks down defining your risk appetite and how it helps you make informed decisions about remediating vulnerabilities.

Why Security Must Include Cost Accountability In The Cloud

A SaaS team once spotted their first breach not in a SIEM dashboard, but in their AWS bill. Their compute costs spiked by 400% overnight. Turns out, an attacker had spun up dozens of high-powered instances for crypto mining. Logs eventually confirmed the intrusion, but the cost anomaly was the first signal that something was wrong. This incident isn’t unusual. Cloud costs often reflect consumption, but they can also reflect compromise.

How SSL Certificate Monitoring Prevents Man-in-the-Middle Attacks

Man-in-the-Middle (MITM) attacks remain one of the most dangerous cybersecurity threats. In these attacks, hackers secretly intercept and sometimes alter communication between two parties. Without proper encryption, sensitive data such as passwords, credit card details, and personal information becomes exposed. SSL/TLS certificates encrypt this communication, preventing unauthorized access. However, certificates can expire, become misconfigured, or become compromised, creating security gaps.

Introducing Catchpoint Session Replay: See Digital Experience Through Your Users' Eyes

When was the last time you really saw what your customers experience on your site? We're excited to introduce Session Replay, a new capability in our Internet Performance Monitoring (IPM) platform that lets you step directly into the user's journey. Session Replay is so much more than a platform upgrade. It’s an opportunity to understand, fix, and even prevent the issues that lead to churn, missed conversions, and frustrated users, all from their point of view.

Global Online Meetup: K3k

Even though multi-tenancy isn't a new concept, when it comes to Kubernetes, implementing the concept can come with its own set of challenges - noisy neighbours, operational complexities, and, of course, security considerations. Sounds like a lot? Well, that's why it's essential to strike a balance between flexibility and optimising resource utilisation. Join Divya Mohan at 2 PM UTC on 25th September as she hosts Rossella Sblendido and Jean-Phillipe Gouin to explore how the K3k project from SUSE helps us achieve all this and more in this edition of the Global Online Meetup.

The Next Wave of Automation Makes More Room for Humans

When a system goes down, the impact isn’t just technical. It’s the people in the center of it who adapt, improvise, apply their judgment, and keep the business moving forward. I’ve worked in operations for more than 25 years, and one thing I’ve learned is that in any system, it’s the humans who are the truly resilient part.

Integrations Overview

This video provides a detailed tour of our integrations, including how to set up automated email, SMS, and phone call alerts. Learn how to connect with various trusted tools, tailor your alerts to your team's needs, and pass key data between Uptime.com and your favorite applications. Discover how to add and manage new integrations, create dedicated contacts, and assign integrations to specific checks. We also introduce our Zapier partnership, enabling connections to over 8000 additional services.

My Criteria for Automated Incident Response Tools

Managing incidents manually isn’t realistic when their number keeps growing. That’s where automated incident response tools come in. They handle routine tasks so you can focus on actual problem-solving. In this blog, I’ve put together a list of the 9 best automated incident response tools for you. I looked at each one based on four key areas of the incident response process. This will help you see how they handle everything from start to finish.