Operations | Monitoring | ITSM | DevOps | Cloud

Blog

What to Do When You Have 1000+ Fields?

So you have been adding more and more logs to your Graylog instance, gathering up your server, network, application logs, and throwing in anything else you can think of. This is exactly what Graylog is designed for, to collect all the logs and have them ready for you to search through in one place. Unfortunately, during your administration of Graylog, you go to the System -> Overview screen and see the big bad red box, saying you are having indexing failures.

Understand Your Kubernetes Telemetry Data in Less Than 5 Minutes: Try Mezmo's New Welcome Pipeline

Most vendor trials take quite a bit of effort and time. Now, with Mezmo’s new Welcome Pipeline, you can get results with your Kubernetes telemetry data in just a couple of minutes. But first, let’s discuss why Kubernetes data is such a challenge, and then we’ll overview the steps.

Failure Metrics & KPIs for IT Systems

The game in enterprise IT is this: delivering amazing services to your customers while also reducing costs. That means the time it takes to respond to an incident is critical. Incidents can ruin service delivery and destroy your budget. Certain incidents almost surely deliver a poor customer experience. Response times, you hear? Yep, we’re talking about MTTR, but that’s not all.

Into the Labyrinth: Revealing the Mantic Minotaur

Few creatures from mythology have captured the imagination of mankind quite like the legendary Minotaur. A half-man, half-bull behemoth that is said to guard the halls of the impenetrable labyrinth of Crete. The ancient sagas stated that only the bravest of warriors would be able to match its incredible strength and escape its mystifying maze.

Your Self-Managed Journey to Digital Resilience

If you were one of the thousands of Splunk customers who joined us this year at.conf23, you heard our CEO Gary Steele say that Splunk's mission is to help you be digitally resilient. (And don't worry if you couldn't join us, because you can catch the keynote replays.) But what is digital resilience and how do you attain it?

Cloud storage for enterprises

Any data-centric organisation faces the prospect of data growth at some point in their existence; it is estimated that more than 2,500 Petabytes (PB) of new data is created every day. While only a few organisations will ever have to deal with that kind of scale, it is important to plan ahead for your own organisation’s growth. Legacy appliance-based storage systems where hardware and software are closely coupled can be expensive to maintain, expand, and difficult to operate.

Effective Logging in Node.js Microservices

Many modern software applications are built with a microservices architecture, and Node.js has become the runtime environment of choice for many developers building microservices. However, working with logs in microservices—especially as complex applications comprise dozens (or more) microservices—is a challenging and cumbersome endeavor. Logging is a crucial part of building and maintaining an application.

Cloud repatriation: What's behind the return to on-premises?

Find out why cloud repatriation is on the rise — and what makes on-premises the ideal approach for some businesses. Over the last ten years, the cloud has been touted as a game-changer. But, like magpies, have we all jumped on the “shiny object syndrome” bandwagon? Spending on public cloud services continues to show strong growth, with Gartner forecasting that by the end of 2023, worldwide end user spending on public cloud services will total nearly $600 billion.

Microsoft Dynamics Monitoring: CRM Performance Optimization

Microsoft Dynamics empowers enterprises with efficient customer relationship management (CRM) and enterprise resource planning (ERP) capabilities. As organizations increasingly rely on the seamless functioning of Microsoft Dynamics to drive their core processes, the need for robust monitoring practices has become paramount. This is where Microsoft Dynamics Monitoring steps into the spotlight, bridging the gap between uninterrupted productivity and potential disruptions.

Azure Key Vault: A Comprehensive Overview

Azure Key Vault is Microsoft’s dedicated cloud service, designed to safeguard cryptographic keys, application secrets, and other sensitive data. In an era where digital security is paramount, it functions as a centralized repository. Here, sensitive data is encrypted, ensuring that only designated applications or users can access them. Imagine having a hyper-secure, digital vault where you can store all your essential digital assets.