Operations | Monitoring | ITSM | DevOps | Cloud

The story behind Konstruct: Lessons learned scaling GitOps

In 2024, Civo acquired Konstruct (formerly Kubefirst) to reinforce our commitment to simplifying cloud computing complexities. When this acquisition was made, it began a whole new chapter for the team behind Konstruct. Over the years, we assembled our team by working with a community of thousands of engineers in what can be a very complex cloud native environment. We were fortunate to join forces with Civo as they aligned with our cloud native and portable vision.

Resolve's Agents of IT podcast - Ep. 13 - Ari's Secret Fortune (500)

In this episode of Agents of IT, we reflect on scale, strategy, and what it really takes to transform IT inside the world’s largest enterprises. Ari shares lessons from his work with Fortune 500 organizations, breaking down what separates automation pilots from true operational change. From navigating enterprise complexity to driving executive alignment, this conversation explores how large organizations move from reactive ticket management to intelligent, agent-driven operations.

Resolve Webinar: Automating Joiner, Mover, and Leaver Workflows with Agentic Orchestration

Still managing Joiner, Mover, Leaver workflows with tickets and manual handoffs? It’s time to automate them. In this fast-paced session, we show how enterprises use agentic AI and orchestration to eliminate repetitive JML tickets, enforce policy automatically, and deliver secure access from day one. Powered by Resolve’s Agentic Resolution Fabric, AI agents coordinate knowledge, automation, and technician assist to provision, modify, and revoke access without manual triage. Faster onboarding. Zero-delay changes. Audit-ready offboarding.

AI performance reviews for your app with the Flare CLI

The Flare CLI connects to your Flare performance monitoring data and uses AI to turn it into actionable insights, right from your terminal. In this video, you'll see how a single command pulls your real performance data from Flare, then generates a full review: identifying slow endpoints, spotting error trends, and suggesting concrete fixes. Links.

Fixing a production error with the Flare CLI and AI, from discovery to deploy

Using the Flare CLI and its agent skill to find, fix, and resolve a production error without leaving the terminal. The AI agent looks up the latest error on freek.dev via the Flare CLI, analyzes the stack trace against the local source code, generates a fix, deploys it using bash mode, and marks the error as resolved in Flare. Learn more.

Observability Self-Hosted 2026.1 - Server Configuration Comparisons

In this video, SolarWinds Evangelist Chrystal Taylor introduces server configuration comparisons, a new feature in Observability Self-Hosted 2026.1 and Server Configuration Monitor 2026.1. The key highlight is the ability to compare server configurations side by side, enabling users to identify differences in configuration files between nodes or against a defined ideal state. This new functionality aims to help users monitor configuration drift.

Incident Report: Exercises, Cleanups, and Evacuations

Every year, Honeycomb runs disaster recovery scenarios in multiple environments, including in production. Although each of our instances runs in a single region, on at least three Availability Zones (AZs), we have multiple plans for partial regional failures, and particularly, zonal failures. One of these tests was run on December 5th, and after its successful completion came its cleanup steps.

Alerting Is a Socio-Technical System

In the previous posts, we’ve looked at how alert noise emerges from design decisions, why notification lists fail to create accountability, and why alerts only work when they’re designed around a clear outcome. Taken together, these ideas point to a broader conclusion. That alerting is not just a technical system, it’s a socio-technical one. Alerting systems encode assumptions about how people behave, how responsibility is distributed, and how decisions are made under pressure.

Trusted Ownership: How Ivanti Application Control scales beyond allowlisting

Application control is one of those security topics where many people carry old assumptions. Traditional allowlisting feels safe but quickly becomes a maintenance burden. Blocklisting feels reactive and incomplete. And while tools like Microsoft AppLocker led many to believe that strict allowlisting is the gold standard, modern attacks have proven otherwise. Attackers increasingly rely on legitimate, signed tools — used in the wrong context — to bypass list-based controls entirely.