Want to know how much website downtime costs, and the impact it can have on your business?
Find out everything you need to know in our new uptime monitoring whitepaper 2021



Today we’ve got a few new additions to take you through, and you can expect some other changes still to come as the week progresses!
The bulk upload tool (“Bulk add when creating a new uptime test) now supports all test types apart from DNS and PUSH. Previously only HTTP tests were supported for use with this tool, however, that’s now been expanded to all test types where possible.
Bulk Update is now supported for the following test types: HTTP, HEAD, TCP, PING, SMTP and SSH.
We’ve also just introduced support for SSL access to StatusCake Pages. This means that much like our recently introduced public reporting addition, you can now set up CNAME records to access your StatusCake Page via https://
You can now take the customization and branding of your StatusCake Page a step further with our new custom logo upload functionality. This allows you both to insert and choose the position of your custom logo on the page.
We are pleased to be once again offering a monitoring location based within Israel, this testing server is based in the Tel Aviv area. You can find the up to date information on IP addresses and other factors via our online locations list. The new IP address for use with whitelisting will be: 193.182.144.211
Share this
6 min read The Real Cost of Owning Monitoring Isn’t Code — It’s Everything Else In Part 1, we explored how AI has dramatically reduced the cost of building monitoring tooling. That much is clear. You can scaffold uptime checks quickly, generate alert logic in minutes, and set-up dashboards faster than most teams used to schedule the kickoff
5 min read AI Has Made Building Monitoring Easy. It Hasn’t Made Owning It Any Easier. A few months ago, I spoke to an engineering manager who proudly told me they had rebuilt their monitoring stack over a long weekend. They’d used AI to scaffold synthetic checks. They’d generated alert logic with dynamic thresholds. They’d then wired everything
3 min read In the previous posts, we’ve looked at how alert noise emerges from design decisions, why notification lists fail to create accountability, and why alerts only work when they’re designed around a clear outcome. Taken together, these ideas point to a broader conclusion. That alerting is not just a technical system, it’s a socio-technical one. Alerting
3 min read In the first two posts of this series, we explored how alert noise emerges from design decisions, and why notification lists fail to create accountability when responsibility is unclear. There’s a deeper issue underneath both of those problems. Many alerting systems are designed without being clear about the outcome they’re meant to produce. When teams
3 min read In the previous post, we looked at how alert noise is rarely accidental. It’s usually the result of sensible decisions layered over time, until responsibility becomes diffuse and response slows. One of the most persistent assumptions behind this pattern is simple. If enough people are notified, someone will take responsibility. After more than fourteen years
3 min read In a previous post, The Incident Checklist: Reducing Cognitive Load When It Matters Most, we explored how incidents stop being purely technical problems and become human ones. These are moments where decision-making under pressure and cognitive load matter more than perfect root cause analysis. When systems don’t support people clearly in those moments, teams compensate.
Find out everything you need to know in our new uptime monitoring whitepaper 2021