Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Icinga 2.9.2 released

Icinga 2 v2.9 introduced performance related changes inside the configuration compilation and activation order. This was to ensure a) no unwanted notifications b) use available CPU resources to speed up the overall validation process. These changes had a bad effect on configuration depending on a specific activation order, and slowed it down with many config objects of a specific type. The Icinga Director depends on get_host() being called in service objects to support specific service set overrides.

USE, RED and real world PgBouncer monitoring

Brendan Gregg’s USE (Utilization, Saturation, Errors) method for monitoring is quite known. There are even some monitoring dashboard templates shared on the Internet. There’s also Tom Wilkie’s RED (Rate, Errors, Durations) method, which is suggested to be better suited to monitor microservices than USE. We, at okmeter.io, recently updated our PgBouncer monitoring plugin and while doing that we’ve tried to comb everything and we used USE and RED as frameworks to do so.

Get your own Uptrends Checkpoint

Your private network is teeming with web services (APIs), intranet, business applications like CRMs and ERPs, acceptance and preproduction environments, databases, and other servers. Your business relies on your network infrastructure to function every day. Each part of that infrastructure needs to be available, performing, and functioning well to keep your business humming along.

Reduce Noise in Your DevOps Toolchain

In an ideal world, your DevOps toolchain would be highly automated for incident management and allow your teams to resolve issues at DevOps speed. An alert triggered by monitoring tools like Datadog or AWS Cloudwatch would notify on-call engineers, kick your collaboration tools into gear (ChatOps, StatusPage, etc), and automatically document the issue in ITSM and ticketing tools.

Simplifying security auditing, part 5: Detecting network attacks

Anyone trying to access resources in your network needs to interact with your network devices: firewalls, routers, switches, and IDS/IPSs. Each of these devices generate syslogs that contain important security information and must be audited to gain complete visibility into the activities occurring in your network. Most SIEM solutions, including our own Log360, can collect and analyze syslogs in real time and instantly alert security teams if any security event of interest occurs.

The challenges of choosing an APM tool

How do you choose an APM tool? You search online and you see there is a lot of choice. But you can only choose one. And it's a big decision. You need to find a tool that can monitor your crown jewel applications. You know that the cost of an APM tool is high. And you know that it's going to be a challenging and lengthy process to implement it.

eG Innovations Introduces Monitoring Capabilities for Microsoft Office 365 at Microsoft Ignite 2018

Iselin, NJ – September 25, 2018 – eG Innovations, a leading provider of IT performance monitoring and digital intelligence solutions, announced today that it has expanded its monitoring portfolio to deliver performance visibility of Microsoft Office 365. The new capabilities will help organizations get in-depth insights into Office 365 access, usage, connectivity and performance, and enhance end user experience and business productivity.

PagerDuty Drives Digital Operations for Atlassian Users

IT Operations, DevOps, and Developer teams count on PagerDuty’s 300+ integrations to power their end-to-end real-time digital operations, no matter which tool stack they use. Because PagerDuty’s customers span all sizes, industries, and digital maturity levels, our product team is constantly talking to customers about which tools they use for needs like communications, APM, and IT Service Management (ITSM).