Join our next Live Demo on Mar 30th!

Resource Blog News Customers Stories

Updated: Mar 20, 2026 Upd: 20.03.26

2 min read

Snowflake Disaster Recovery

Zack Bentolila

Zack Bentolila

Marketing Director

Snowflake Disaster Recovery

ControlMonkey now supports Snowflake Disaster Recovery, enabling teams to automatically back up and restore critical Snowflake configurations including roles, warehouses, schemas, and access policies when mistakes or incidents occur.

Snowflake powers some of the most critical data workloads in the cloud, yet its configuration layer is rarely protected by a cyber resilience solution.

Introducing Snowflake Configuration Disaster Recovery

ControlMonkey helps teams safeguard Snowflake environments by protecting the operational configuration that keeps data platforms running.

Examples of protected Snowflake configurations include:

  • Roles and grants controlling data access
  • Warehouses powering compute workloads
  • Databases and schemas organizing data environments
  • Resource monitors and policies managing usage and governance
  • Platform configuration settings critical to operational stability

With this capability, teams can:

  • Automatically back up Snowflake configuration
  • Track configuration changes over time
  • Recover quickly from accidental changes or deletions
  • Reduce operational risk across data infrastructure
  • Restore Snowflake environments without manual reconstruction

How Snowflake Disaster Recovery Works

ControlMonkey connects to Snowflake using secure APIs and automatically discovers configuration assets across the Snowflake environment. This discovery process maps the operational structure of the data platform, including access controls, compute resources, and governance settings.

These configurations define how Snowflake environments operate and are essential for governance, access control, and workload management.

Snapshot and Backup

ControlMonkey continuously captures the configuration state of Snowflake resources and creates versioned snapshots of those configurations.

This provides a reliable historical, good-know state record of Snowflake configurations.

Recover – Roles, Warehouses, Schemas, and Policies

If roles, warehouses, schemas, or policies are deleted or misconfigured, teams can quickly restore them from a known-good snapshot, recovering Snowflake configuration in minutes.

This eliminates the need for manual reconstruction of complex platform settings.

Review & Govern

The ControlMonkey Cloud Resilience Dashboard provides visibility into disaster recovery readiness across cloud infrastructure, observability platforms, and SaaS tools like Snowflake.

Teams can monitor protection coverage and identify resilience gaps before incidents occur.

Stay Ahead with Snowflake Disaster Recovery

Data platforms like Snowflake are critical to modern cloud operations. Yet while organizations protect data, the configuration layer often remains vulnerable.

ControlMonkey ensures Snowflake configurations are protected alongside infrastructure and SaaS platforms. By continuously backing up configuration states and enabling rapid restoration, teams can recover quickly from ransomware, cyber attacks, AI agents and configuration mistakes and maintain operational continuity.

Ready to be Cyber Resilient?

Explore Snowflake Disaster Recovery with ControlMonkey today.

Bottom CTA Background

A 30-min meeting will save your team 1000s of hours

A 30-min meeting will save your team 1000s of hours

Book Intro Call

Author

Zack Bentolila

Zack Bentolila

Marketing Director

Zack is the Marketing Director at ControlMonkey, with a strong focus on DevOps and DevSecOps. He was the Senior Director of Partner Marketing and Field Marketing Manager at Checkmarx. There, he helped with global security projects. With over 10 years in marketing, Zack specializes in content strategy, technical messaging, and go-to-market alignment. He loves turning complex cloud and security ideas into clear, useful insights for engineering, DevOps, and security leaders.

    Sounds Interesting?

    Request a Demo

    Resource Blog News Customers Stories

    Updated: Mar 25, 2026 Upd: 25.03.26

    3 min read

    Disaster Recovery for Observability: Dashboards, Alerts, and Monitors

    Zack Bentolila

    Zack Bentolila

    Marketing Director

    Disaster Recovery for Observability: Dashboards, Alerts, and Monitors

    Observability Disaster Recovery is the new addtioan to Controlmonkey DR Soultion. Modern cloud operations rely heavily on observability. During incidents, dashboards, alerts, and monitoring rules are often the first place engineers turn to understand what’s happening.

    Yet the configurations behind these systems – dashboards, alert policies, monitors, and escalation rules – are rarely protected by disaster recovery.

    Introducing Observability Configuration Disaster Recovery

    ControlMonkey now extends Cloud Configuration Disaster Recovery to observability platforms, protecting monitoring environments across Datadog, New Relic, Dynatrace, Grafana Cloud, and Splunk.

    ControlMonkey automatically captures daily snapshots of observability configurations so teams can restore monitoring environments and maintain operational visibility during incidents.

    Observability DR Key capabilities:

    • Protect operational knowledge
      Backup dashboards, monitors, alert rules, and escalation policies created over years of operational tuning.
    • Restore monitoring environments quickly
      Recover observability configurations from versioned snapshots instead of rebuilding manually.
    • Detect configuration drift in monitoring systems
      Track changes across observability platforms and identify unexpected modifications.
    • Ensure monitoring visibility during incidents
      Maintain access to critical dashboards and alerts when diagnosing outages.
    • Extend disaster recovery beyond infrastructure
      Protect the broader cloud control plane including infrastructure, network, and observability configuration.

    How does Observability Configuration Disaster Recovery Works?

    ControlMonkey Cloud DR solution continuously captures configuration snapshots from supported observability platforms.

    Each snapshot records the structure and settings of monitoring environments, including:

    • Dashboards and visualizations
    • Alert rules and alert routing policies
    • Monitors across metrics, logs, and traces
    • Notification channels and escalation policies
    • Service monitoring and APM configurations
    • Click on the image to enlarge


    These configurations are versioned and stored securely, allowing teams to compare changes over time and restore previous configurations when needed.

    If dashboards are deleted, alerts are misconfigured, or monitoring rules break during an incident, engineers can restore observability configurations directly from a previous snapshot – without manually rebuilding monitoring environments.

    Why Disaster Recovery for the Observability Layer?

    Traditional disaster recovery focuses on restoring data, storage, and infrastructure.

    But modern cloud environments rely on far more than compute resources. The cloud control plane – including monitoring configuration – contains the operational knowledge engineers depend on to diagnose and resolve incidents.

    With ControlMonkey, teams can:

    • Maintain versioned backups of observability environments
    • Detect configuration changes and drift
    • Restore monitoring systems quickly during incidents
    • Ensure DR visibility by having clear Resilience Score

    By extending configuration disaster recovery to observability, ControlMonkey helps teams maintain operational continuity across the entire cloud environment.

    During incidents, engineers rely on monitoring systems to understand what’s happening – yet observability configurations themselves are rarely protected by disaster recovery. As a CTO, I know firsthand how valuable it would have been to restore dashboards and monitoring environments instantly instead of rebuilding them under pressure.

    Ori Yemini - ControlMonkey CTO Headshot Photo

    Ori Yemini

    CTO

    Real-World Impact: Datadog dashboards, monitors, and alerting policies

    Our Datadog dashboards, monitors, and alerting policies represent years of operational knowledge and tuning. Losing that configuration during an incident would significantly impact our ability to diagnose issues quickly. With ControlMonkey, we know our observability configurations are versioned and recoverable, ensuring we maintain visibility when it matters most<br />

    Doron Honeybook

    Doron Gutman

    Director of DevOps and DevSecOps

    Ready to be Cyber Resilient?

    Explore Cloud Configuration Disaster Recovery for Observability or schedule a demo today.

    Reference Table: Key APM Configurations Used in Observability Platforms

    ConfigurationDescriptionExample
    Dashboards & VisualizationsConfigurations that define how telemetry data is displayed.Dashboards
    Saved views
    Dashboard layouts
    Panels / widgets
    Visualization settings
    Graph queries
    Dashboard variables
    Alerts & Alerting RulesConfigurations that trigger notifications when conditions are met.Alert rules
    Alert thresholds
    Alert policies
    Alert conditions
    Alert templates
    Alert routing rules
    Alert severity levels
    Alert suppression rules
    Alert deduplication settings
    MonitorsDefinitions that evaluate metrics, logs, or traces.
    Metric monitors
    Log monitors
    Trace monitors
    Synthetic monitors
    Service health monitors
    SLO monitors
    Infrastructure monitors
    Notification & Escalation PoliciesConfigurations controlling how incidents are communicated.Notification channels
    Escalation policies
    PagerDuty integrations
    Slack / Teams alert routing
    Email notification rules
    On-call schedules
    Service & Application MonitoringConfigurations defining what services are observed.Service definitions
    Service maps
    Application performance monitoring (APM) settings
    Dependency maps
    Service tags / metadata
    Environment tags
    Metrics ConfigurationHow metrics are collected, stored, and analyzed.Custom metrics definitions
    Metric queries
    Metric tagging rules
    Metric retention policies
    Metric filters
    Metric rollups / aggregations
    Synthetic MonitoringTesting and uptime monitoring configurations.Synthetic tests
    API tests
    Browser tests
    Uptime monitors
    Test schedules
    Test locations
    Table: Core APM configurations used to manage observability, monitoring, and incident response
    Bottom CTA Background

    A 30-min meeting will save your team 1000s of hours

    A 30-min meeting will save your team 1000s of hours

    Book Intro Call

    Author

    Zack Bentolila

    Zack Bentolila

    Marketing Director

    Zack is the Marketing Director at ControlMonkey, with a strong focus on DevOps and DevSecOps. He was the Senior Director of Partner Marketing and Field Marketing Manager at Checkmarx. There, he helped with global security projects. With over 10 years in marketing, Zack specializes in content strategy, technical messaging, and go-to-market alignment. He loves turning complex cloud and security ideas into clear, useful insights for engineering, DevOps, and security leaders.

      Sounds Interesting?

      Request a Demo

      Resource Blog News Customers Stories

      Updated: Mar 25, 2026 Upd: 25.03.26

      2 min read

      Dynatrace Disaster Recovery

      Zack Bentolila

      Zack Bentolila

      Marketing Director

      Dynatrace Disaster Recovery

      Modern cloud operations rely on observability platforms like Dynatrace to detect incidents and maintain service reliability. But while infrastructure and data may be protected, monitoring configurations themselves are often not recoverable.

      With ControlMonkey, teams can now extend Cloud Disaster Recovery to Dynatrace configuration backup – ensuring dashboards, alerts, monitors, and metrics can be restored instantly in case of incidents, misconfigurations, or ransomware.

      Introducing Dynatrace Configuration Backup & Recovery

      ControlMonkey now protects critical Dynatrace configurations as part of its Cloud Disaster Recovery platform.

      Key capabilities include:

      • Automated backup of Dynatrace dashboards, metrics, monitors, and alerts
      • Versioned snapshots of monitoring configurations
      • Rapid recovery of observability environments after incidents
      • Resilience Score across monitoring platforms
      • Unified disaster recovery method across cloud infrastructure and SaaS tools

      How Dynatrace Disaster Recovery Works

      ControlMonkey continuously protects Dynatrace configuration so teams can restore their monitoring environment to a known-good state when incidents occur.

      Discover Dynatrace configurations

      ControlMonkey connects to Dynatrace using secure APIs and automatically discovers configuration assets including dashboards, monitors, alerts, and metrics.

      Snapshot and Backup

      On a continuous basis, ControlMonkey captures the exact configuration state of Dynatrace resources and creates versioned snapshots of those configurations.

      Recover 

      If dashboards, monitors, or alerts are deleted or misconfigured, teams can quickly restore them from a good known snapshot – recovering observability environments in minutes.

      Review & Govern

      The ControlMonkey Cloud Resilience Dashboard provides visibility into DR readiness across cloud infrastructure and SaaS tools, helping teams identify gaps before incidents occur.

      Stay Ahead with Dynatrace Disaster Recovery

      As a CTO, I’m proud to introduce this capability. In my previous roles, having the ability to quickly recover from mistakes and investigate configuration changes would have saved days of troubleshooting and manual work

      Ori Yemini - ControlMonkey CTO Headshot Photo

      Ori Yemini

      CTO

      Observability platforms are critical for detecting and resolving incidents. If monitoring configurations are lost during an outage or attack, recovery becomes significantly harder.

      ControlMonkey ensures Dynatrace configurations are protected alongside infrastructure and SaaS platforms. By continuously backing up configuration states and enabling rapid restoration, teams can maintain operational visibility even during critical incidents.

      This extends disaster recovery beyond data and infrastructure – ensuring the monitoring systems themselves are resilient.

      Ready to be Cyber Resilient?

      Explore Dynatrace Disaster Recovery with ControlMonkey today.

      Bottom CTA Background

      A 30-min meeting will save your team 1000s of hours

      A 30-min meeting will save your team 1000s of hours

      Book Intro Call

      Author

      Zack Bentolila

      Zack Bentolila

      Marketing Director

      Zack is the Marketing Director at ControlMonkey, with a strong focus on DevOps and DevSecOps. He was the Senior Director of Partner Marketing and Field Marketing Manager at Checkmarx. There, he helped with global security projects. With over 10 years in marketing, Zack specializes in content strategy, technical messaging, and go-to-market alignment. He loves turning complex cloud and security ideas into clear, useful insights for engineering, DevOps, and security leaders.

        Sounds Interesting?

        Request a Demo

        Resource Blog News Customers Stories

        Updated: Feb 18, 2026 Upd: 18.02.26

        2 min read

        Entra ID Backup & Disaster Recovery

        Zack Bentolila

        Zack Bentolila

        Marketing Director

        Entra ID Backup & Disaster Recovery

        Microsoft Entra ID configurations are too critical to leave not backup or unversioned. With ControlMonkey’s new Entra ID support, your identity layer now receives structured backup, visibility, and recovery coverage – just like your data and cloud infrastructure.

        Why Backup and Govern Your Entra ID?

        Entra ID defines who can access production systems, cloud resources, and business applications. Yet many identity changes still happen manually – without versioning, drift visibility, or rollback capabilities.

        Backing up and governing Entra ID ensures:

        • Configuration Cyber Resilience – Recover users, roles, groups, and policies after mistakes or incidents.
        • Change Visibility – Track and review identity configuration changes over time.
        • Drift Detection – Identify manual changes that bypass Infrastructure as Code.
        • Audit Readiness and guardrails  – Have a clear RTO/RPO number for your Idindy layer.  Apply the same compliance guardrails across identity and infrastructure.

        Introducing Support for Cyber Resilience

        ControlMonkey now supports Microsoft Entra ID backup and recovery.
        With this release, teams gain:

        • Entra ID Visibility Inventory – Full visibility into users configuration, groups, roles polices, enterprise applications, and policies.
        • IaC Blind Spot Detection – See which Entra ID resources are IaC-managed and which are not.
        • Daily Entra ID Backup Snapshots – Automated configuration backups.
        • Disaster Recovery Time Machine – Restore Entra ID to a previous known-good state 
        • Import to IaC – Bring unmanaged identity resources under IaC control.

        Daily configuration versioning allows teams to investigate access history, recover from misconfigurations, and ensure compliance without manual reconstruction.

        icon

        Identity Resilience Meets Cloud Governance

        See how ControlMonkey reduces risk and brings cyber resilience  daily backup to Entra ID. Turn your identity configuration into code – and your code into control.

        Bottom CTA Background

        A 30-min meeting will save your team 1000s of hours

        A 30-min meeting will save your team 1000s of hours

        Book Intro Call

        Author

        Zack Bentolila

        Zack Bentolila

        Marketing Director

        Zack is the Marketing Director at ControlMonkey, with a strong focus on DevOps and DevSecOps. He was the Senior Director of Partner Marketing and Field Marketing Manager at Checkmarx. There, he helped with global security projects. With over 10 years in marketing, Zack specializes in content strategy, technical messaging, and go-to-market alignment. He loves turning complex cloud and security ideas into clear, useful insights for engineering, DevOps, and security leaders.

          Sounds Interesting?

          Request a Demo

          Resource Blog News Customers Stories

          Updated: Feb 08, 2026 Upd: 08.02.26

          1 min read

          Introducing Azure Bicep Support

          Zack Bentolila

          Zack Bentolila

          Marketing Director

          Introducing Azure Bicep Support

          Azure teams often rely on Bicep alongside Terraform for managing their infrastructure with code, and without unified visibility, recovery gaps go unnoticed until it’s too late.

          ControlMonkey now supports Azure Bicep as part of its IaC coverage model, extending visibility and disaster recovery awareness to Azure-native infrastructure.

          This capability is available to all ControlMonkey customers starting today.

          Key benefits Azure Bicep Backup & Visibility:

          • Full visibility into Azure resources managed by Bicep
          • Clear separation between codified and non-codified infrastructure
          • Improved disaster recovery readiness for Azure-native stacks
          • Reduced blind spots during ransomware or cyber incidents
          • IaC visibility and recovery coverage across Terraform, CloudFormation, and Bicep

          Cloud Infrastructure with Full IaC Visibility

          Codified infrastructure can be restored after configuration loss or compromise. Unmanaged resources lack a reliable recovery path.

          By including Azure Bicep in its IaC coverage, ControlMonkey helps teams:

          • Understand recovery readiness across Azure environments
          • Identify hidden DR risks caused by non-codified resources
          • Strengthen cloud governance without forcing tool migrations
          • Plan incident response with confidence during cyber or ransomware event.

          This helps teams understand recovery readiness in environments that use multiple IaC frameworks.

          Ready to see what’s recoverable and what isn’t?

          Explore Azure Bicep visibility in ControlMonkey today.

          Bottom CTA Background

          A 30-min meeting will save your team 1000s of hours

          A 30-min meeting will save your team 1000s of hours

          Book Intro Call

          Author

          Zack Bentolila

          Zack Bentolila

          Marketing Director

          Zack is the Marketing Director at ControlMonkey, with a strong focus on DevOps and DevSecOps. He was the Senior Director of Partner Marketing and Field Marketing Manager at Checkmarx. There, he helped with global security projects. With over 10 years in marketing, Zack specializes in content strategy, technical messaging, and go-to-market alignment. He loves turning complex cloud and security ideas into clear, useful insights for engineering, DevOps, and security leaders.

            Sounds Interesting?

            Request a Demo

            FQA about Azure Bicep and Controlmonkey

            Resources managed by Bicep are codified and can be rebuilt. ControlMonkey helps teams identify which resources fall into that category and which do not.

            No. Azure Bicep support is limited to visibility and disaster recovery awareness. Terraform automation remains unchanged.

            Yes. Like CloudFormation, Bicep is included for visibility and disaster recovery coverage, not automation.

            Resource Blog News Customers Stories

            Updated: Feb 06, 2026 Upd: 06.02.26

            3 min read

            Time Machine for Cloud Architecture

            Zack Bentolila

            Zack Bentolila

            Marketing Director

            Time Machine for Cloud Architecture

            In most cloud environments, no system actually stores your cloud architecture relationships.

            Security groups, routing rules, IAM permissions, load balancers, and SaaS configurations exist – but the relationships between them are not saved anywhere. When a security incident or outage occurs, teams discover too late that there is no historical record of how resources were connected, what depended on what, or how access paths were structured at the time things worked.

            Introducing Architecture Time Machine

            Architecture Time Machine is a capability within the ControlMonkey IaC Automation Platform that preserves your cloud architecture and security posture on a timeline.

            Architecture Time Machine extends ControlMonkey’s Cloud Resilience platform by preserving your cloud architecture and resource dependencies over time, not just the resources themselves.

            With daily environment snapshots, you can move backward on a timeline and explore how your infrastructure was connected at any point in time.

            Key benefits:

            • Rewind cloud architecture in time – View how resources and dependencies looked on any given day.
            • Explore historical dependencies – Understand what was connected to what before a change or incident.
            • Speed up incident investigation – Quickly answer “what changed?” without guesswork.
            • Visualize complex environments – Interactive dependency graphs make large architectures easier to reason about.
            • Reduce recovery blind spots – Restore with architectural confidence, not assumptions.

            Who Benefits from Architecture Time Machine

            Cloud & DevOps Managers – Get immediate answers during incidents. Understand what changed without relying on tribal knowledge or manual reconstruction.

            Security & Compliance Teams – Validate historical configurations for audits (SOC, PCI, internal reviews) and investigate configuration drift over time.

            Cloud Architects – Review how architecture evolved over time, Identify unintended complexity, sprawl, or anti-pattern, Use historical views to guide standardization and governance decision

            CIO & CISO:

            • Gain confidence that cloud recovery is predictable and provable
            • Reduce operational and compliance risk tied to configuration loss
            • Understand recovery readiness without diving into technical detail

            Controlmonkey Cloud Disaster Recovery – for Configuration

            When traffic drops, services break, or behavior changes unexpectedly, the root cause is often a dependency change – a security group update, a route table modification, or a detached resource.

            Architecture Time Machine helps you:

            • Improve visibility into historical cloud states
            • Reduce risk during incident response and postmortems
            • Strengthen alignment between IaC, reality, and recovery
            • Scale cloud environments with confidence, knowing you can always look back

            Get Started: Cloud DR Readiness Assessment

            Before the next audit or incident, understand your real recovery risk.

            The Cloud DR Readiness Assessment gives security and compliance leaders a clear, executive-level view of cloud configuration recovery — without disrupting production.

            Bottom CTA Background

            A 30-min meeting will save your team 1000s of hours

            A 30-min meeting will save your team 1000s of hours

            Book Intro Call

            Author

            Zack Bentolila

            Zack Bentolila

            Marketing Director

            Zack is the Marketing Director at ControlMonkey, with a strong focus on DevOps and DevSecOps. He was the Senior Director of Partner Marketing and Field Marketing Manager at Checkmarx. There, he helped with global security projects. With over 10 years in marketing, Zack specializes in content strategy, technical messaging, and go-to-market alignment. He loves turning complex cloud and security ideas into clear, useful insights for engineering, DevOps, and security leaders.

              Sounds Interesting?

              Request a Demo

              FQA about Architecture Time Machine

              Cloud architecture is the structure and relationships between cloud resources, defining how systems are connected, secured, and dependent on one another.

              ControlMonkey captures the structure, configuration, and relationships between cloud resources – not just the resources themselves.

              This includes:

              • Network architecture (VPCs/VNets, subnets, routing, gateways)
              • Security and access controls (security groups, firewall rules, IAM roles and policies)
              • Traffic and exposure paths (load balancers, DNS, ingress/egress)
              • Resource dependencies (what was connected to what, and when)

              IaC and non-IaC resources (Terraform, OpenTofu, CloudFormation, and manual changes)

              Resource Blog News Customers Stories

              Updated: Jan 14, 2026 Upd: 14.01.26

              2 min read

              Fastly Backup: CDN Configuration Daily Snapshots

              Zack Bentolila

              Zack Bentolila

              Marketing Director

              Fastly Backup: CDN Configuration Daily Snapshots

              As CDN footprints grow, Fastly configuration becomes production-critical. A single accidental change or deletion can take performance, availability, and security with it – fast.

              Introducing Fastly Backup

              ControlMonkey now supports Fastly with daily backups designed to keep your CDN setup recoverable and governed.

              • Recover Fastly config fast when mistakes happen
              • Reduce outage risk from accidental deletions and misconfigurations
              • Protect WAF posture by backing up key Next-Gen WAF rules and thresholds
              • Keep teams aligned with consistent, auditable configuration state
              • Scale safely as services and edge compute expand

              Supported Fastly resource types (daily backup):

              • Next-Gen WAF Account Rule
              • Next-Gen WAF Threshold
              • Service
              • Compute service

              Benfits of Fastly and Controlmonkey Intergation

              Fastly often sits directly in the blast radius of incidents – because it’s on the delivery to your customers path. ControlMonkey Backup for Fastly turns a high-pressure scramble into a controlled recovery.

              With ControlMonkey, Fastly configurations are:

              • RTO-ready – restore from the latest daily backup (clear recovery point, predictable path)
              • More resilient – reduce impact from drift, bad changes, and ClickOps
              • Governed – strengthen alignment between running configuration and your IaC intent
              • Auditable – maintain a consistent record of what changed and when
              • Scalable – keep protection in place as you add services and edge workloads

              Ready to protect your CDN layer?

              Explore Fastly Backup today – your workflow infrastructure recoverable, governed, and under control.

              Bottom CTA Background

              A 30-min meeting will save your team 1000s of hours

              A 30-min meeting will save your team 1000s of hours

              Book Intro Call

              Author

              Zack Bentolila

              Zack Bentolila

              Marketing Director

              Zack is the Marketing Director at ControlMonkey, with a strong focus on DevOps and DevSecOps. He was the Senior Director of Partner Marketing and Field Marketing Manager at Checkmarx. There, he helped with global security projects. With over 10 years in marketing, Zack specializes in content strategy, technical messaging, and go-to-market alignment. He loves turning complex cloud and security ideas into clear, useful insights for engineering, DevOps, and security leaders.

                Sounds Interesting?

                Request a Demo

                FQA About Fastly Backup

                ControlMonkey performs daily backups of Fastly Service, Compute service, Next-Gen WAF Account Rule, and Next-Gen WAF Threshold resource types.

                Fastly configurations are backed up daily to ensure a consistent and recent recovery point.

                 Fastly sits directly on the delivery path. Accidental deletions, misconfigurations, or drift can immediately impact availability, performance, and security.

                Yes. Daily backups provide a clear recovery point, allowing teams to restore Fastly configurations quickly and predictably during incidents.

                Resource Blog News Customers Stories

                Updated: Jan 09, 2026 Upd: 09.01.26

                2 min read

                Temporal Backup & Governance 

                Aharon Twizer

                Aharon Twizer

                CEO & Co-founder

                Temporal Backup & Governance 

                As workflow-driven systems scale, Temporal becomes a core dependency for long-running processes and background jobs. If Temporal Cloud configuration is deleted or drifts unexpectedly, workflows can fail, environments can break, and recovery turns into manual rebuilds. ControlMonkey now supports Temporal Backup so teams can restore critical workflow infrastructure configuration from a known-good daily snapshot.

                Introducing Temporal Backup

                Temporal is a workflow engine for running reliable, long-running processes. It powers application workflows, stateful execution, and durable background jobs—at scale.

                With ControlMonkey support for Temporal Cloud, customers get daily backups of key Temporal Cloud resources, including:

                And additional supported Temporal Cloud configuration resources.

                ControlMonkey Backups are captured as IaC, so recovery is repeatable and auditable.

                Benfits of Temporal Backup

                Temporal Cloud configuration changes are operational risk – especially when multiple teams and environments are involved. Backups provide a safety net when something goes wrong.

                Temporal Cloud Backup helps teams:

                • Recover faster from accidental deletions and misconfigurations
                • Reduce risk from unmanaged changes and configuration drift
                • Keep IaC alignment for workflow infrastructure, not just application code
                • Audit changes and restore from known-good states

                Ready to gain Temporal Cloud backup?

                Explore Temporal Cloud Backup and keep your workflow infrastructure recoverable, governed, and under control..

                Bottom CTA Background

                A 30-min meeting will save your team 1000s of hours

                A 30-min meeting will save your team 1000s of hours

                Book Intro Call

                Author

                Aharon Twizer

                Aharon Twizer

                CEO & Co-founder

                Co-Founder and CEO of ControlMonkey. He has over 20 years of experience in software development. He was the CTO of Spot.io, which was bought by NetApp for more than $400 million. There, he led important tech innovations in cloud optimization and Kubernetes. He later joined AWS as a Principal Solutions Architect, helping global partners solve complex cloud challenges. In 2022, he started ControlMonkey to help DevOps teams discover, manage, and scale their cloud infrastructure with Infrastructure as Code. Aharon loves creating tools that help engineering teams. These tools make it easier to manage the complexity of modern cloud environments.

                  Sounds Interesting?

                  Request a Demo

                  Resource Blog News Customers Stories

                  Updated: Dec 30, 2025 Upd: 30.12.25

                  2 min read

                  New Relic Backup & Governance with ControlMonkey

                  Zack Bentolila

                  Zack Bentolila

                  Marketing Director

                  New Relic Backup & Governance with ControlMonkey

                  As organizations rely on real-time data pipelines, the configuration layer behind New Relic Disaster Recovery and Back-up is now available in ControlMonkey, giving DevOps teams a reliable way to back up and restore New Relic APM configurations just like they backup their cloud infrastructure.

                  New Relic is a core Application Performance Monitoring (APM) platform used for live operations – powering dashboards, alerts, and incident response during production outages. Losing or misconfiguring it means losing visibility when it matters most.

                  How ControlMonkey Protects Your New Relic Configuration

                  ControlMonkey’s New Relic integration delivers automated New Relic backup and disaster recovery, fully managed through Terraform or OpenTufo and aligned with your cloud resources.

                  ControlMonkey continuously discovers existing New Relic configurations and creates daily snapshots of the full APM configuration live state, and stores them as a governed, versioned source of truth. In the event of an outage, misconfiguration, or deletion, teams can restore New Relic configurations alongside the cloud resources they monitor.

                  ControlMonkey GUI Showinf New Relic Backup

                  What You Get with New Relic Backup

                  With ControlMonkey, you can:

                  • Automatically back up all New Relic configurations on a daily basis
                  • Restore dashboards, alerts, and APM policies after outages or human error
                  • Recover New Relic configurations tied to affected cloud resources
                  • Maintain a governed, auditable source of truth for observability infrastructure

                  Why New Relic Needs Backup and Disaster Recovery?

                  New Relic is used for ongoing application and infrastructure monitoring. If its configuration is deleted or altered, teams lose monitoring and alerting during incident response and then they face undefined RTO (Recovery Time Objective) for observability. Monitoring and alerting must be rebuilt manually, delaying visibility during active incidents.

                  New Relic disaster recovery defines and reduces observability RTO by enabling fast, consistent restoration of monitoring configurations.

                  Benefits of ControlMonkey New Release Integration:

                  ControlMonkey ensures your New Relic environment is:

                  • Recoverable – Restore full APM configuration from backups
                  • Resilient – Protect monitoring setups from deletions and misconfigurations
                  • Governed – Enforce IaC alignment
                  • Scalable – Protect New Relic as environments grow

                  Ready to protect your observability stack?

                  Explore New Relic Disaster Recovery with ControlMonkey today.

                  Bottom CTA Background

                  A 30-min meeting will save your team 1000s of hours

                  A 30-min meeting will save your team 1000s of hours

                  Book Intro Call

                  Author

                  Zack Bentolila

                  Zack Bentolila

                  Marketing Director

                  Zack is the Marketing Director at ControlMonkey, with a strong focus on DevOps and DevSecOps. He was the Senior Director of Partner Marketing and Field Marketing Manager at Checkmarx. There, he helped with global security projects. With over 10 years in marketing, Zack specializes in content strategy, technical messaging, and go-to-market alignment. He loves turning complex cloud and security ideas into clear, useful insights for engineering, DevOps, and security leaders.

                    Sounds Interesting?

                    Request a Demo

                    Resource Blog News Customers Stories

                    Updated: Dec 19, 2025 Upd: 19.12.25

                    2 min read

                    Confluent Cloud Backup & Governance

                    Aharon Twizer

                    Aharon Twizer

                    CEO & Co-founder

                    Confluent Cloud Backup & Governance

                    As organizations rely on real-time data pipelines, the configuration layer behind Kafka becomes a silent source of operational risk. A single unintended change – whether accidental, automated, or malicious-can degrade throughput, break integrations, or take entire workloads offline.
                    Modern platform teams need more than Kafka automation. They need a backup strategy and governance model for their Confluent Cloud configuration.

                    Introducing Confluent Support in ControlMonkey

                    ControlMonkey now brings full IaC governance and automated daily configuration snapshot to Confluent Cloud, giving teams a resilient, auditable, and restorable record of every streaming configuration.

                    Key Capabilities

                    • Complete Confluent Cloud asset inventory across clusters, networks, ACLs, role bindings, and private link access
                    • Daily Confluent configuration backup snapshots for disaster recovery and security investigations
                    • Disaster Recovery – Restore any configuration with a built-in time machine.
                    • Rapid Terraform import for every Confluent resource
                    • Governance guardrails with drift detection for unapproved or unexpected changes

                    Stay Ahead by Reducing Cloud Risk in Kafka Environments

                    Streaming systems are mission critical-and fragile when configuration changes go unnoticed.
                    With ControlMonkey, Confluent teams can:

                    • Establish a real backup strategy for all Confluent Cloud configurations
                    • Reduce operational and security risk from misconfigurations or privilege misuse
                    • Restore environments quickly with point-in-time snapshots
                    • Enforce IaC discipline and eliminate ClickOps exposure
                    • Replicate clusters and environments confidently using generated Terraform

                    This is cloud resilience for Confluent Cloud – finally applied at the configuration layer.

                    icon

                    Explore Confluent Cloud Backup & IaC Governance today.

                     Backup all Confluent Cloud configs with daily snapshots, IaC governance, and Terraform import from ControlMonkey.

                    Bottom CTA Background

                    A 30-min meeting will save your team 1000s of hours

                    A 30-min meeting will save your team 1000s of hours

                    Book Intro Call

                    Author

                    Aharon Twizer

                    Aharon Twizer

                    CEO & Co-founder

                    Co-Founder and CEO of ControlMonkey. He has over 20 years of experience in software development. He was the CTO of Spot.io, which was bought by NetApp for more than $400 million. There, he led important tech innovations in cloud optimization and Kubernetes. He later joined AWS as a Principal Solutions Architect, helping global partners solve complex cloud challenges. In 2022, he started ControlMonkey to help DevOps teams discover, manage, and scale their cloud infrastructure with Infrastructure as Code. Aharon loves creating tools that help engineering teams. These tools make it easier to manage the complexity of modern cloud environments.

                      Sounds Interesting?

                      Request a Demo
                      Cookies banner

                      We use cookies to enhance site navigation, analyze usage, and support marketing efforts. For more information, please read our. Privacy Policy