Hosted Graphite

Hosted Graphite

Hosted Graphite takes the open-source metric graphing tool, Graphite, and adds Grafana dashboards, monitoring, alerts, integrations with all your favourite applications, secure & redundant data storage, simple migration, awesome support and customizable access features.

Avoid service interruptions, reduce lost engineer time and make monitoring a solution again, not another problem.

Features

  • Data Monitoring
  • Alerting
  • Metric Collection, Aggregation & Visualisation
  • Metric Storage with built-in redundancy
  • Integrations with all your applications
  • Added functionality eg CloudWatch
  • Customizable Data Views
  • Customizable Team Access

Benefits

  • Outsource all your metric monitoring, visualization and storage
  • Integrate with all your favourite applications
  • Reduce the cost and engineer time of running Graphite locally
  • Get better visibility of all your infrastructure and applications
  • Add alerts for all the metrics that matter to you
  • Increase functionality through integrations with eg CloudWatch
  • Control who has access to what with Team Access settings

Pricing

£15 per licence per month

Service documents

G-Cloud 9

467782890078288

Hosted Graphite

Joe Healy

+353872219196

joe.healy@hostedgraphite.com

Service scope

Service scope
Service constraints No constraints.
System requirements No System Requirements

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Standard Email Support is Mon-Fri 09.00 to 21.00, no extra cost.

Enterprise Customers can avail of 24/7 dedicated support, at extra cost.
User can manage status and priority of support tickets No
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard None or don’t know
How the web chat support is accessible We use ZenDesk for customers and LiveChat for site visitors
Web chat accessibility testing As above
Onsite support Yes, at extra cost
Support levels Standard Email & Phone Support is Mon-Fri 09.00 to 21.00, no extra cost.

Enterprise Customers can avail of 24/7 dedicated support, at extra cost.
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started For Enterprise customers we provide online training, user documentation and onsite training (at extra cost)

SaaS customers can avail of online training and user documentation
Service documentation Yes
Documentation formats
  • HTML
  • ODF
  • PDF
End-of-contract data extraction The extraction process is simple and offered as standard to all customers, typically via an AWS (S3) bucket nominated by the user.
End-of-contract process Enterprise customers typically have bespoke requirements and these are identified, agreed and priced in advance before the contract begins. Further requirements, can at the behest of the customer, be added mid-contract on same basis.

SaaS customers should expect no further incremental costs unless their usage increases to a new pricing tier.

Using the service

Using the service
Web browser interface Yes
Using the web interface Users have customisable settings and views.
Web interface accessibility standard None or don’t know
How the web interface is accessible Users have customisable settings and views.
Web interface accessibility testing N/a
API Yes
What users can and can't do using the API Metrics API
Alerting API
Grafana HTTP API
Annotations API
Aggregates API
API automation tools Other
API documentation Yes
API documentation formats
  • HTML
  • ODF
  • PDF
  • Other
Command line interface No

Scaling

Scaling
Scaling available Yes
Scaling type Manual
Independence of resources Users either operate in a shared environment (SaaS) or a dedicated cluster (Enterprise) but in both cases they are fully scalable to any requirement though large increases in usage are best advised and flagged in advance by the customer to ensure optimal service.
Usage notifications Yes
Usage reporting
  • API
  • Email
  • SMS
  • Other

Analytics

Analytics
Infrastructure or application metrics Yes
Metrics types
  • CPU
  • Disk
  • HTTP request and response status
  • Memory
  • Network
  • Number of active instances
  • Other
Other metrics
  • Any infrastructure metric the customer wishes to monitor
  • Any specific application metric the customers wishes to monitor
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Resellers
Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance Up to Developed Vetting (DV)

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations European Economic Area (EEA)
User control over data storage and processing locations No
Datacentre security standards Managed by a third party
Penetration testing frequency At least every 6 months
Penetration testing approach In-house
Protecting data at rest Scale, obfuscating techniques, or data storage sharding
Data sanitisation process Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach In-house destruction process

Backup and recovery

Backup and recovery
Backup and recovery Yes
What’s backed up
  • We provide full redundancy in our own Data Centres
  • Further back-up to AWS (S3) can be provided
Backup controls No, any additional back-ups must be requested by the customer and can be arranged without difficulty.
Datacentre setup Multiple datacentres with disaster recovery
Scheduling backups Users contact the support team to schedule backups
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • Private network or public sector network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Bonded fibre optic connections
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks Stunnel
Data protection within supplier network
  • TLS (version 1.2 or above)
  • IPsec or TLS VPN gateway
  • Legacy SSL and TLS (under version 1.2)

Availability and resilience

Availability and resilience
Guaranteed availability 99.9% uptime guaranteed per SLA. In the event these are breached, the user may receive an refund up to but not exceeding a GBP value equal to that month's related invoice.
Approach to resilience The service is split into microservices, which are spread across multiple data centres. All storage, data ingestion, web and API services and other support services are independent and location agnostic. All internal traffic is sent via secure channels. Full service SLA history is available upon request.
Outage reporting Email alerts, public dashboard and an API (using StatusPage.io).

Identity and authentication

Identity and authentication
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Access restrictions in management interfaces and support channels Management interfaces are limited to secure passwords and restricted via IP whitelisting.
Access restriction testing frequency At least every 6 months
Management access authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Dedicated link (for example VPN)
  • Username or password
Devices users manage the service through Directly from any device which may also be used for normal business (for example web browsing or viewing external email)

Audit information for users

Audit information for users
Access to user activity audit information Users contact the support team to get audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information Users contact the support team to get audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for User-defined

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations No

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach Regular audits, private-key only server access, security reviews of the service, least-privilege roles for all services, single-purpose microservices form the bulk of the application.
Information security policies and processes All security policies internally documented, any server updates done using automated processes (Puppet). Any potential incidents are dealt with by a core team who document the investigation and develop best practices based on the result.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach All changes are made using automated tooling (via Puppet), and any deployments are tested on development and staging environments before making it to production. Any changes are made in accordance with our overall security policy.
Vulnerability management type Supplier-defined controls
Vulnerability management approach All application changes are architected with security in mind from first principles.

Patches are applied once adequately tested on staging servers.

We follow industry leaders such as Kaspersky Labs and Bruce Schneier, and have contacts with white-hat hackers and penetration testers who keep us informed of the latest threats. One of our founders regularly attends the CCC conference in Berlin.
Protective monitoring type Supplier-defined controls
Protective monitoring approach As a monitoring company this is a core part of our business. We have real-time monitoring of all servers, and regular logging and usage pattern monitoring. We treat security incidents as critical events and investigate immediately.
Incident management type Supplier-defined controls
Incident management approach We keep extensive internal documentation of processes for common occurrences.

Users report incidents via email, phone or through in-app messaging.

We provide reports by email or blog / status reporting.

Secure development

Secure development
Approach to secure software development best practice Conforms to a recognised standard, but self-assessed

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart No

Energy efficiency

Energy efficiency
Energy-efficient datacentres Yes

Pricing

Pricing
Price £15 per licence per month
Discount for educational organisations Yes
Free trial available Yes
Description of free trial Full scope and scale as invoiced service, typical trial is 14 days but this may be extended on request at discretion of supplier.
Link to free trial https://www.hostedgraphite.com/accounts/signup/

Documents

Documents
Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑