Operations | Monitoring | ITSM | DevOps | Cloud

Skylight 5: Now with Source Locations!

This week we released Skylight version 5.0, which represents a major undertaking that has involved every person at Tilde and every part of our ever-growing stack. In addition to major internal refactors, this release also modernizes our native Rust code, and introduces Skylight's newest feature, Source Locations.

The Big SCOM Survey: Results and expert analysis

What’s the future of SCOM? How do others set up their SCOM landscape? What tools are SCOM Managers using to help streamline processes? The answers are all here. The Big SCOM Survey 2021 is the first of what we hope to be an annual survey where we measure the pulse of the SCOM community, get insights and share best practices. This year, we asked 27 questions and had 118 respondents – and we’d like to share our findings with you.

SLF4J Tutorial: Example of How to Configure It for Logging Java Applications

Logging is a crucial part of the observability of your Java applications. Combined with metrics and traces gives full observability into the application behavior and is invaluable when troubleshooting. Logs, combined with metrics shortens the time needed to find the root cause and allows for quick and efficient resolutions of problems.

5 Things to Know About the Orion Platform Database Today

1. It’s the Back End for 14 Products and Connectors The full list is published here. The key is, a lot of products all leverage this single database, though not every customer runs every product. Over 20 years, the Orion Platform has evolved into, well, a pickup truck. It’s a utility vehicle, doing the best job it can for everyone who needs a ride. As such, this pickup truck works great most of the time.

Using the Icinga Web API

Unfortunately, there is little to no documentation for using the Icinga Web API to perform monitoring actions such as scheduling downtimes. But it’s a simple thing and I’ll give you a quick example of how to do it. Using the Icinga Web API instead of the Icinga API gives you the advantages of the permission and restriction system, various authentication methods and auditing.

Visual Link Analysis with Splunk: Part 4 - How is this Pudding Connected?

I thought my last blog, Visual Link Analysis with Splunk: Part 3 - Tying Up Loose Ends, about fraud detection using link analysis would be the end of this topic for now. Surprise, this is part 4 of visual link analysis. Previously (for those who need a refresher) I wanted to use Splunk Cloud to show me all the links in my data in my really big data set. I wanted to see all the fraud rings that I didn’t know about. I was happy with my success in using link analysis for fraud detection.

Splunking AWS ECS And Fargate Part 3: Sending Fargate Logs To Splunk

Welcome to part 3 of the blog series where we go through how to forward container logs from Amazon ECS and Fargate to Splunk. In part 1, Splunking AWS ECS Part 1: Setting Up AWS And Splunk, we focused on understanding what ECS and Fargate are, along with how to get AWS and Splunk ready for log routing to Splunk’s Data-to-Everything Platform.

How to monitor website availability

“100% website availability.” Which webmaster would not want to see this availability report? Every website owner would like their website available for users to be 99.9% all of the time. Without a website that is accessible and running smoothly at any time of day, all web-related investments will go to waste. That is why website availability monitoring is so important.

Everything you need to know about the Malwarebytes hack

We’ve all become more conscious of the risk of online scammers and hackers, especially since we put more and more of our personal information into websites and apps on a daily basis. We’ve become more knowledgeable on the likes of data protection through EU regulations like GDPR and learned about how we “drop” cookies as we surf the web.