{"id":31229,"date":"2022-12-24T06:00:00","date_gmt":"2022-12-24T14:00:00","guid":{"rendered":"https:\/\/insidebigdata.com\/?p=31229"},"modified":"2022-12-22T12:41:11","modified_gmt":"2022-12-22T20:41:11","slug":"10-tips-to-ensure-effective-infrastructure-monitoring","status":"publish","type":"post","link":"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/","title":{"rendered":"10 Tips to Ensure Effective Infrastructure Monitoring\u00a0"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"200\" height=\"133\" src=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/12\/adrianphillips_headshot.jpeg\" alt=\"\" class=\"wp-image-31230\" srcset=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/12\/adrianphillips_headshot.jpeg 200w, https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/12\/adrianphillips_headshot-150x100.jpeg 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/><\/figure><\/div>\n\n\n<p><em>In this special guest feature,\u00a0Adrian Phillips who leads product marketing for the Infrastructure Monitoring solutions at <a href=\"https:\/\/www.dynatrace.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dynatrace<\/a>, believes there\u2019s too much at stake to allow an oversight to result in a security breach or downtime. In this article, you&#8217;ll discover 10 tips to ensure your infrastructure monitoring is effective. Adrian&#8217;s passion is helping customers transform the way they work using data, AI, and cloud-based software. He holds a degree in journalism, and loves being with his family, or competing in disc golf tournaments, when he&#8217;s home in Raleigh, NC.<\/em><\/p>\n\n\n\n<p>Few DevOps teams can afford to neglect a performance issue or security breach that can tarnish an organization\u2019s reputation. Nothing illustrates that fact more clearly than the emergence of <a href=\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/\" target=\"_blank\" rel=\"noreferrer noopener\">the Log4Shell vulnerability<\/a> earlier this year.\u00a0\u00a0<\/p>\n\n\n\n<p>Meanwhile, in an era of big data, multicloud infrastructure, and digital transformation, the complexities and demands confronting IT managers have intensified. In recent years, it has become clear that traditional monitoring tools and processes are no longer practical or effective.&nbsp;Many of these tools failed to keep pace with the rapid technological innovations and evolving business practices. To make up for the performance shortfall, organizations found they were continuously adding new tools. Eventually, this led to wasteful tool duplication, also known as tool sprawl.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-infrastructure-monitoring-2\/\" target=\"_blank\" rel=\"noreferrer noopener\">Infrastructure monitoring<\/a> is an organization\u2019s central nervous system. The purpose is to collect and analyze data from IT infrastructure, systems, and processes and assess system health.\u00a0<\/p>\n\n\n\n<p><strong>Modern problems require modern solutions<\/strong><\/p>\n\n\n\n<p>If a system performs outside a predefined range, that signals something is wrong and triggers alerts. But, as IT infrastructure becomes more distributed, traditional monitoring tools struggle to keep up. Too often, when it\u2019s time to scale or upgrade, these tools are too plodding and inflexible.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Additionally, organizations can\u2019t afford to wait for alerts in the event an application component or system fails, especially if they plan to honor end-user service-level agreements. Instead, they must adopt a proactive position and identify and resolve potential infrastructure problems before they affect users.&nbsp;<\/p>\n\n\n\n<p>To ensure systems, services, databases, and applications are secure and operate reliably, organizations need a harmonious implementation of modern tools and best practices. These include ensuring hardware performance, such as sensors, drive health, and battery life \u2014 are monitored regularly. It means prioritizing critical alerts and ensuring operating environments are properly updated and configured.&nbsp;<\/p>\n\n\n\n<p>Organizations also need information presented in a way that\u2019s consistent and understood at all levels of abstraction.&nbsp;<\/p>\n\n\n\n<p><strong>Nuts and bolts of effective monitoring&nbsp;<\/strong><\/p>\n\n\n\n<p>Still, there\u2019s much more to consider. Below are 10 tips for monitoring infrastructure&nbsp;effectively:&nbsp;&nbsp;<\/p>\n\n\n\n<ol>\n<li>Monitor components as well as the whole. Data and metrics from your backend systems, components, services, and the frontend application need to be included to get the full picture. You need to be able to monitor end to end and in real time, including ephemeral environments like functions-as-a-service (FaaS.)&nbsp;<\/li>\n\n\n\n<li>Configure alert thresholds to notify practitioners when performance varies from a baseline. Early identification of issues can help resolve problems before customers are affected.&nbsp;<\/li>\n\n\n\n<li>Conduct real user monitoring to gain an outside-in perspective. Capture metrics from real users to get the broadest coverage, and use those locations to influence where to capture synthetic measurements from.&nbsp;<\/li>\n\n\n\n<li>Measure performance among multiple connection types. Performance and availability can vary across connection types, and include a representative sample of users.&nbsp;<\/li>\n\n\n\n<li>Align metrics with business objectives. Why should others in the organization care about a metric? Describe how the monitoring data is relevant to objectives such as increasing customer loyalty, increasing revenue, or reducing costs.&nbsp;<\/li>\n\n\n\n<li>Re-evaluate strategy regularly. As a company grows or an application changes, monitoring strategy should be re-evaluated.&nbsp;<\/li>\n\n\n\n<li>Identify anomalies and outliers. We can learn more from the unexpected than from the everyday occurrences. Gaining insight into databases. Monitoring application performance in production is an absolute requirement to ensure business success. Look for tools that provide an AI-enabled approach to anomaly detection.&nbsp;&nbsp;<\/li>\n\n\n\n<li>Gain a single source of truth. A modern infrastructure monitoring approach brings together disparate data sources to provide a consolidated, end-to-end view of anomalies and activity throughout an environment. Think beyond the dashboard.<\/li>\n\n\n\n<li>Synchronize your toolkit. The reality is that organizations use myriad tools. Modern observability platforms can help sync data streams and tool workflows.&nbsp;<\/li>\n\n\n\n<li>Invest in the best monitoring tools, the kind that can oversee complex platforms and help prevent cyber-attacks from sophisticated threat actors.<\/li>\n<\/ol>\n\n\n\n<p><strong>End-to-end observability keeps everything running efficiently<\/strong><\/p>\n\n\n\n<p>Organizations now operate in multicloud environments and with cloud-native architectures. Therefore, they need to help their DevOps teams to simplify infrastructure management by providing end-to-end observability and automation where it makes sense.&nbsp;<\/p>\n\n\n\n<p>Finally, companies must empower IT teams to quickly understand how systems and components are operating on a moment\u2019s notice.<\/p>\n\n\n\n<p>This is how IT pros can keep apps, components, and systems operating at the highest levels.\u00a0\u00a0This also leads to rapid response times, improved computing processes, and eventually to satisfied customers.<\/p>\n\n\n\n<p><em>Sign up for the free insideBIGDATA&nbsp;<a href=\"http:\/\/inside-bigdata.com\/newsletter\/\" target=\"_blank\" rel=\"noreferrer noopener\">newsletter<\/a>.<\/em><\/p>\n\n\n\n<p><em>Join us on Twitter:&nbsp;<a href=\"https:\/\/twitter.com\/InsideBigData1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/twitter.com\/InsideBigData1<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on LinkedIn:&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/insidebigdata\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.linkedin.com\/company\/insidebigdata\/<\/a><\/em><\/p>\n\n\n\n<p><em>Join us on Facebook:&nbsp;<a href=\"https:\/\/www.facebook.com\/insideBIGDATANOW\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.facebook.com\/insideBIGDATANOW<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this special guest feature, Adrian Phillips who leads product marketing for the Infrastructure Monitoring solutions at Dynatrace, believes there\u2019s too much at stake to allow an oversight to result in a security breach or downtime. In this article, you&#8217;ll discover 10 tips to ensure your infrastructure monitoring is effective. <\/p>\n","protected":false},"author":10513,"featured_media":31230,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[65,115,87,180,61,183,56,97,1],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Tips to Ensure Effective Infrastructure Monitoring\u00a0 - insideBIGDATA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Tips to Ensure Effective Infrastructure Monitoring\u00a0 - insideBIGDATA\" \/>\n<meta property=\"og:description\" content=\"In this special guest feature, Adrian Phillips who leads product marketing for the Infrastructure Monitoring solutions at Dynatrace, believes there\u2019s too much at stake to allow an oversight to result in a security breach or downtime. In this article, you&#039;ll discover 10 tips to ensure your infrastructure monitoring is effective.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/\" \/>\n<meta property=\"og:site_name\" content=\"insideBIGDATA\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/insidebigdata\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-24T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-22T20:41:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/12\/adrianphillips_headshot.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"133\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Editorial Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:site\" content=\"@insideBigData\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Editorial Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/\",\"url\":\"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/\",\"name\":\"10 Tips to Ensure Effective Infrastructure Monitoring\u00a0 - insideBIGDATA\",\"isPartOf\":{\"@id\":\"https:\/\/insidebigdata.com\/#website\"},\"datePublished\":\"2022-12-24T14:00:00+00:00\",\"dateModified\":\"2022-12-22T20:41:11+00:00\",\"author\":{\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\"},\"breadcrumb\":{\"@id\":\"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insidebigdata.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Tips to Ensure Effective Infrastructure Monitoring\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insidebigdata.com\/#website\",\"url\":\"https:\/\/insidebigdata.com\/\",\"name\":\"insideBIGDATA\",\"description\":\"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insidebigdata.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9\",\"name\":\"Editorial Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g\",\"caption\":\"Editorial Team\"},\"sameAs\":[\"http:\/\/www.insidebigdata.com\"],\"url\":\"https:\/\/insidebigdata.com\/author\/editorial\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Tips to Ensure Effective Infrastructure Monitoring\u00a0 - insideBIGDATA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/","og_locale":"en_US","og_type":"article","og_title":"10 Tips to Ensure Effective Infrastructure Monitoring\u00a0 - insideBIGDATA","og_description":"In this special guest feature, Adrian Phillips who leads product marketing for the Infrastructure Monitoring solutions at Dynatrace, believes there\u2019s too much at stake to allow an oversight to result in a security breach or downtime. In this article, you'll discover 10 tips to ensure your infrastructure monitoring is effective.","og_url":"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/","og_site_name":"insideBIGDATA","article_publisher":"http:\/\/www.facebook.com\/insidebigdata","article_published_time":"2022-12-24T14:00:00+00:00","article_modified_time":"2022-12-22T20:41:11+00:00","og_image":[{"width":200,"height":133,"url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/12\/adrianphillips_headshot.jpeg","type":"image\/jpeg"}],"author":"Editorial Team","twitter_card":"summary_large_image","twitter_creator":"@insideBigData","twitter_site":"@insideBigData","twitter_misc":{"Written by":"Editorial Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/","url":"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/","name":"10 Tips to Ensure Effective Infrastructure Monitoring\u00a0 - insideBIGDATA","isPartOf":{"@id":"https:\/\/insidebigdata.com\/#website"},"datePublished":"2022-12-24T14:00:00+00:00","dateModified":"2022-12-22T20:41:11+00:00","author":{"@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9"},"breadcrumb":{"@id":"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insidebigdata.com\/2022\/12\/24\/10-tips-to-ensure-effective-infrastructure-monitoring\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insidebigdata.com\/"},{"@type":"ListItem","position":2,"name":"10 Tips to Ensure Effective Infrastructure Monitoring\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/insidebigdata.com\/#website","url":"https:\/\/insidebigdata.com\/","name":"insideBIGDATA","description":"Your Source for AI, Data Science, Deep Learning &amp; Machine Learning Strategies","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insidebigdata.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/2949e412c144601cdbcc803bd234e1b9","name":"Editorial Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/insidebigdata.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e137ce7ea40e38bd4d25bb7860cfe3e4?s=96&d=mm&r=g","caption":"Editorial Team"},"sameAs":["http:\/\/www.insidebigdata.com"],"url":"https:\/\/insidebigdata.com\/author\/editorial\/"}]}},"jetpack_featured_media_url":"https:\/\/insidebigdata.com\/wp-content\/uploads\/2022\/12\/adrianphillips_headshot.jpeg","jetpack_shortlink":"https:\/\/wp.me\/p9eA3j-87H","jetpack-related-posts":[{"id":24327,"url":"https:\/\/insidebigdata.com\/2020\/04\/23\/rubber-meets-the-road-reality-of-ai-in-infrastructure-monitoring\/","url_meta":{"origin":31229,"position":0},"title":"Rubber Meets the Road: Reality of AI in Infrastructure Monitoring","date":"April 23, 2020","format":false,"excerpt":"In this special guest feature, Farhan Abrol, Head of Machine Learning Products at Pure Storage, examines the disparity between the hype and what\u2019s been delivered, and where we\u2019ll see the most impactful advancements in efficiency and capacity in the coming year. The hype around artificial intelligence and machine learning\u2019s potential\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":23124,"url":"https:\/\/insidebigdata.com\/2019\/08\/20\/intelligent-operations-how-to-navigate-the-journey-from-manual-to-automated\/","url_meta":{"origin":31229,"position":1},"title":"Intelligent Operations: How to Navigate the Journey from Manual to Automated","date":"August 20, 2019","format":false,"excerpt":"In this special guest feature, Tom Pohlmann, EVP of Customer Success at AHEAD, discusses how the road to fully functional Intelligent Operations is bumpy, no matter what stage of digital transformation companies are currently in. Based on his experience, he offers five stages of maturity that organizations typically fall into.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":14418,"url":"https:\/\/insidebigdata.com\/2016\/02\/02\/rocana-one-it-monitoring-and-analytics-up-to-1tb-new-data-per-day-for-free\/","url_meta":{"origin":31229,"position":2},"title":"Rocana One:  IT Monitoring and Analytics up to 1TB New Data per Day for Free","date":"February 2, 2016","format":false,"excerpt":"Rocana, a pioneer applying big data to IT Operations, today announced Rocana One, a program that provides companies with their flagship product, Rocana Ops, for free for up to 1 Terabyte of new data every day.","rel":"","context":"In &quot;Big Data&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":23984,"url":"https:\/\/insidebigdata.com\/2020\/02\/13\/businesses-building-ai-applications-are-shifting-to-open-infrastructure\/","url_meta":{"origin":31229,"position":3},"title":"Businesses Building AI Applications Are Shifting to Open Infrastructure","date":"February 13, 2020","format":false,"excerpt":"In this special guest feature, Ami Badani, CMO of Cumulus Networks, suggests that as AI requires a lot of data to train algorithms in addition to immense compute power and storage to process larger workloads when running these applications, IT leaders are fed up with forced, expensive and inefficient infrastructure,\u2026","rel":"","context":"In &quot;AI Deep Learning&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":24287,"url":"https:\/\/insidebigdata.com\/2020\/04\/20\/is-open-source-analytics-in-your-budget\/","url_meta":{"origin":31229,"position":4},"title":"Is Open Source Analytics in Your Budget?","date":"April 20, 2020","format":false,"excerpt":"In this special guest feature, Thomas Hazel, Founder, CTO and Chief Scientist of CHAOSSEARCH, provide tips on how to evaluate the total cost ownership of open source solutions, examines the lifecycle of the solutions, from download through customization and ongoing operations, describes why some open source projects fare well and\u2026","rel":"","context":"In &quot;Analytics&quot;","img":{"alt_text":"","src":"https:\/\/i0.wp.com\/insidebigdata.com\/wp-content\/uploads\/2020\/04\/Thomas-Hazel_CHAOSSEARCH-Headshot-.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":18451,"url":"https:\/\/insidebigdata.com\/2017\/07\/26\/businesses-can-no-longer-ignore-iot-security\/","url_meta":{"origin":31229,"position":5},"title":"Why Businesses Can No Longer Ignore IoT Security","date":"July 26, 2017","format":false,"excerpt":"In this special guest feature, Srikant Menon, Practice Director of Internet of Things (IoT) at Happiest Minds Technologies, discusses how it is imperative for businesses to balance the massive benefits of IoT along with the security risks it poses. While millions of \u201cthings\u201d are simple in nature, IoT security is\u2026","rel":"","context":"In &quot;Analytics&quot;","img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/31229"}],"collection":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/users\/10513"}],"replies":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/comments?post=31229"}],"version-history":[{"count":0,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/posts\/31229\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media\/31230"}],"wp:attachment":[{"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/media?parent=31229"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/categories?post=31229"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insidebigdata.com\/wp-json\/wp\/v2\/tags?post=31229"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}