Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

k6 extensions updates with Ivan Szkiba (k6 Office Hours #99)

In this episode of k6 Office Hours, Developer Advocates Marie Cruz and Paul Balogh are joined by Ivan Szkiba, the latest Grafanista of the k6 team, to discuss the latest developments on the k6 extensions. Links shared: List of templates and extensions discussed: ⏰ TIMESTAMPS.

Enriching your Search Results with Lookups

It’s quite common for data from a Search to contain references to information that is, well, unintuitive. Error or Message Codes, Port Numbers, Reference IDs, and Customer Numbers are all useful pieces of information, but far from being human-readable. That information is often available in a collateral location, often a spreadsheet or database, where it can be looked up with a “key” field.

Log Data 101: What It Is & Why It Matters

If you mention 'log data' at a crowded business event, you'll quickly be able to tell who's in IT and who isn't. For the average person, log data is about as thrilling as a dental appointment or reconciling a years-old bank account. At the mere mention of log data, their eyes glaze over as they search for an escape from the conversation. Conversely, IT professionals' eyes light up and they become animated when the topic of log data arises.

LogicMonitor Envision Dexda Demo

Watch this demo video to learn about our latest offering in AIOps, Dexda. Dexda ingests events from LogicMonitor Envision and seamlessly transforms them into episodes. Advanced machine learning techniques automatically identify features in the alert data to correlate the disparate alerts into connected insights based on time, resources involved, environment, and other significant features of the enriched alert data.

The Impact of Network Topology

When it comes to arranging your network architecture, there are different methods to consider, each with its own pros and cons depending on your business needs. The way you design your network can improve connectivity for data sharing or increase security. This arrangement of components and their proximity to each other is known as network topology. In this article, we’ll explore network topology, different types of topologies, and how they impact speed, reliability, security, and other functions.

This Month in Datadog: DASH 2023 Recap, featuring Bits AI, Single-Step APM Instrumentation, and more

Datadog is constantly elevating the approach to cloud monitoring and security. This Month in Datadog updates you on our newest product features, announcements, resources, and events. This month, we’re recapping DASH 2023..

How To Increase Revenue and Protect Your Business from Internet Disruptions with IPM

Over the last few months, we’ve been analyzing the thought-provoking findings of a recent study conducted by Forrester Consulting. This study illuminated the notoriously challenging-to-measure financial impact of Internet disruptions on eCommerce companies.