Operations | Monitoring | ITSM | DevOps | Cloud

Configuring Slack notifications with Argo Workflow - a learning experience

The acquisition of Codefresh gave me an exciting opportunity to learn new tech. Initially, I thought Argo was just Argo CD. I didn’t realize that Argo consists of 4 distinct projects: A key feature of the Codefresh product is Promotion Flows, which makes heavy use of Argo Workflows. Promotion Flows add the ability to assign Pre and or Post Actions to the process called Promotion Workflows, which are Argo Workflows with some annotations added.

Interacting With Log Data in Security Event Manager

SolarWinds Security Event Manager is designed to give users a centralized view of logs and events occurring across their network, and quickly and easily recall specific logs and identify suspicious patterns and behaviors in that data. This video gives a quick overview of the features in SEM, making it easy for users to view and interact with their log data.

Introducing ZTB - Defining Zero Trust for Bring Your Own Cloud (BYOC)

Isn’t the "Bring Your Own Cloud" (BYOC) model the latest hot topic in the evolution of cloud-native architecture, especially for companies offering cloud-hosted platforms that must be deployed in the customer’s cloud for privacy, control, or compliance reasons? Over the past few weeks, we have been rigorously researching and discussing how to build a secure BYOC model.

Leading the Way in Accessible Innovation: Voice Input for the AI Platform

What if a broken arm didn't break your workflow? Follow Alice as she faces tough circumstances, but still gets the job done. Nursing a broken arm in a sling, she uses built-in accessibility features like Voice Input for Now Assist to set up the ServiceNow AI Platform for a new client—hands-free. This is how we turn accessibility into opportunity—building forward-lthinking features that solve real problems and work better for everyone.

Why do hotel rooms have smoke detectors in every room, not just one on every floor?

Early detection matters. When a problem occurs, you want to know immediately, not after the damage is done. Monitoring isn’t just about visibility; it’s about precision, speed, and proximity to the problem. Just like smoke detectors, you need to monitor in the right places: close to your critical infrastructure, applications, and end users. The sooner you detect issues, the cheaper and easier they are to fix. And that’s where real resilience begins.