Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Strategies for Ensuring Compliance in Financial Messaging

In the ever-evolving landscape of financial services, institutions are under constant pressure to ensure their messaging infrastructures comply with a myriad of global regulatory requirements. Compliance with regulations such as the General Data Protection Regulation (GDPR), the Payment Services Directive 2 (PSD2), and other localized financial regulations is not just a legal necessity but a cornerstone for maintaining trust and integrity in the financial sector.

Splunk second thoughts? It's time for the cloud-native alternative

Back in September when Cisco announced they were acquiring Splunk, we explained how the market was consolidating with Sumo Logic ahead of the pack, challenging traditional vendors with our cloud-native platform. Now that the deal is complete and Splunk is officially a Cisco company, we’re hearing from more Splunk customers who are considering their options.

Boosting Application Security Using OpenTelemetry

Every day, we hear about new vulnerabilities or exploits that underline the importance of application security in today’s connected world. Such incidents put sensitive user information at risk and threaten applications’ infrastructure. Securing applications is therefore crucial not only from a technical standpoint but also to maintain user trust and ensure service reliability. The challenge lies in identifying and mitigating potential security threats before they can be exploited.

Using eBPF to Debug eBPF

In one of our latest posts, StackState Co-Founder Mark Bakker described how eBPF revolutionizes observability and how StackState’s agents rely heavily on eBPF to capture and analyze the data moving through your cluster. Today, we’re looking at an example where our eBPF code failed and — by diving deep into the intricacies of eBPF implementation in the Linux kernel — share the tale of how we fixed it using even more eBPF.

Advantages of an AI-Powered Observability Pipeline

The expenses associated with collecting, storing, indexing, and analyzing data have become a considerable challenge for organizations. This data is growing as fast as 35% a year, multiplying the problems. This surge in data comes with a corresponding rise in infrastructure costs. These costs often force organizations to make decisions about what data they can afford to analyze, which tools they must use, and how and where to store data for long-term retention.

12 best practices for DevOps and IT teams to handle monitoring alerts

"Music is noise that makes sense," said author Yann Martel, implying that if a sound doesn't make sense, then it is perceived as just noise. Noise can thus be defined as any alert that affects our senses and disturbs our peace without adding any value. The digital age drowns us in stimuli of all kinds all the time, making the struggle to ignore noise in order to filter for sense harder than ever.

DNS Redirect - Redirect Domain To URL Using DNS Records

Domain redirection plays a crucial role in managing website transitions, consolidating content, and maintaining a seamless user experience. This article explores the various aspects of domain redirection, including the different types of redirects, DNS redirection, and best practices for preserving SEO value during the process.

Traceroute InSession: A traceroute tool for modern networks

This is a follow-up to our previously published post announcing Traceroute InSession, where we provided extensive technical details about how it works. In this series, we explore the challenges InSession addresses within modern networks and compare it to other traceroute variants. At Catchpoint, we pride ourselves on being traceroute experts. Why? We’ve run over 15 billion traceroutes over the last 15 years and more than 3 billion in 2023 alone!

Why you should monitor microservice mediator APIs

Microservice mediator APIs provide a flexible, scalable, and decentralized approach to microservices communication, enabling organizations to build robust, modular, and maintainable applications. They shield microservices from the details of the other implementations and promote loose coupling, helping to ensure autonomy, scalability, and independence among microservices.