Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Releasing Icinga Director Branches v1.3: Enhanced Branching for Better Configuration Management

If you’re an Icinga user, you already know the importance of having a streamlined and efficient configuration management process. With the release of Icinga Director Branches v1.3, this process just got even better! In this latest version, Icinga Director introduces several enhancements to its branching system, making it even easier to manage and deploy your Icinga 2 configurations.

Complete Guide on Docker Logs [All access methods included]

Docker logs play a critical role in the management and maintenance of containerized applications. They provide valuable information about the performance and behavior of containers, allowing developers and administrators to troubleshoot issues, monitor resource usage, and optimize application performance. By capturing and analyzing log data, organizations can improve the reliability, security, and efficiency of their containerized environments.

Profiling Beta for Python and Node.js

A couple months ago, we launched Profiling in alpha for users on Python and Node.js SDKs — today, we’re moving Profiling for Python and Node.js to beta. Profiling is free to use while in beta — more updates to come when we near GA. Profiling is a critical tool for helping catch performance bottlenecks in your code. Sentry’s profiler gets you down to the exact file/line number in your code that is causing a slow-running query.

Democratizing Machine Data & Logs: How Infor saves millions by leveraging Sumo Logic's data-tiering

Infor developed a decentralized governance model for managing the vast Sumo landscape. A landscape with thousands of users, tens of thousands of Collectors, petabytes of log ingestion. By democratizing log management, we implemented a decentralized governance model for our Sumo account. Consequently,, we succeeded in doubling our log ingestion year-over-year, while reducing our log ingestion cost by more than 50%.

Data Gravity in Cloud Networks: Achieving Escape Velocity

In an ideal world, organizations can establish a single, citadel-like data center that accumulates data and hosts their applications and all associated services, all while enjoying a customer base that is also geographically close. As this data grows in mass and gravity, it’s okay because all the new services, applications, and customers will continue to be just as close to the data. This is the “have your cake and eat it too” scenario for a scaling business’s IT.

How Security Engineers Use Observability Pipelines

In data management, numerous roles rely on and regularly use telemetry data. The security engineer is one of these roles. Security engineers are the vigilant sentries, working diligently to identify and address vulnerabilities in the software applications and systems we use and enjoy today. Whether it’s by building an entirely new system or applying current best practices to enhance an existing one, security engineers ensure that your systems and data are always protected.