Operations | Monitoring | ITSM | DevOps | Cloud

Building a CloudWatch metrics pipeline: parsing OpenTelemetry data

AWS delivers CloudWatch metrics in OpenTelemetry format via Firehose, but AppSignal uses its own internal format. Building the parser to bridge these two formats presented several technical challenges. The metrics arriving through this pipe power AWS automated dashboards. When AppSignal detects metrics from a supported AWS service, it creates a dashboard for it automatically, with pre-built charts grouped by category: compute, databases, networking, messaging, storage, and others.

From Signal Corps to Space: Building Networks That Can't Fail with Troy MacDonald

What does it take to succeed in networking when complexity is constantly increasing, and change never slows down? In this episode of Next-Gen Network Heroes, host Bob Slevin sits down with Troy (David) MacDonald, a network engineer at Blue Origin and former U.S. Army Chief Warrant Officer, to explore a career that spans from infantry beginnings to designing and managing large-scale, mission-critical networks.

Optimizing Team Strengths for Effective Operations

Most people think great network engineers are defined by technical expertise. This episode challenges that idea. Because what Troy McDonald shows is that the real differentiator isn’t just technical skill—it’s the ability to translate complexity into clarity. From military operations to enterprise networks, one lesson keeps showing up.

Unlock telemetry value with a well-planned data lake

Your SIEM only holds a slice of your telemetry. Your data lake holds the rest. We'll show you how to use that to your advantage for investigations, threat hunting, and reporting. Why your data lake beats your SIEM for investigations – Your SIEM keeps a short window of expensive, filtered data. Your data lake keeps everything. When something goes wrong, that difference matters more than you think Threat hunting without the handcuffs – Hunting across months of data in a SIEM is painful and costly. We'll show you how a well-planned lake makes broad, deep searches practical and affordable.

Mini Shai-Hulud Explained: How the TanStack and RubyGems Supply Chain Attacks Worked | Harness Blog

Shai-Hulud is back - this time being lighter, faster and more automated than before. This new wave, termed as Mini Shai-Hulud, has affected a number of packages from tanstack, uipath, opensearch-project and mistralai among others over the past few weeks, with the latest series of major compromises coming on 19th May, 2026 on major organizations openclaw-cn and antv. Check an extensive list of affected packages here.

Why Artifact Repository Sprawl Slows Down Software Delivery | Harness Blog

Three weeks into a platform modernization project, this question landed in my inbox: "Why does our deployment pipeline take 40 minutes instead of four?" This is artifact repository sprawl in practice, and it does more than slow pipelines. It fragments your security posture, your compliance evidence, and your ability to answer basic questions like "what's actually running in production right now?".