Dear ITSM – We need to talk...

Dear IT Service Management, After ten years of working in different areas…

Latest Posts

Using Socat to Simulate Networking Traffic to Test and Debug

If you don’t know socat, you probably should. From its man: Socat is a command line based utility that establishes two bidirectional byte streams and transfers data between them. Because the…

Two Reasons Why Threshold-Based Monitoring Is Hopelessly Broken

Why is a threshold-based alert such a disaster? There are two big reasons. Thresholds are always wrong. They’re worse than a broken clock, which is at least right twice a…

A Sure-Fire Recipe For Monitoring Disaster

In this post I’ll tell a story that will feel familiar to anyone who’s ever monitored MySQL. Here’s a recipe for a threshold-based alert that will go horribly wrong, beyond…

Why You Should Almost Never Alert On Thresholds

This post is part of an ongoing series on the best practices for effective and insightful database monitoring. Much of what’s covered in these posts is unintuitive, yet vital to understand. Previous…