Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Building Auvik Into Your MSP's Standard Operating Procedures

Standard operating procedures—more commonly known as SOPs—are written, step-by-step instructions that describe how to perform a routine activity. While you can create an SOP for anything, SOPs that outline technical procedures are a well-known path to increasing efficiency in your MSP business. Whether you’ve got existing SOPs you’re interested in updating, or you’re looking for some basic steps to build brand new SOPs around, you’ve come to the right place.

Monitoring URLs With Query Strings

January is a good time for bug-fixing and we've spent the last couple of weeks making small tweaks and improvements to Downtime Monkey. We've focused on the kind of bugs that aren't urgent but shouldn't be overlooked and aim to continue this for a couple more weeks before starting development of the next major feature. We'll document each change in its own post. First up is an improvement to the range of webpages available for monitoring: webpages with query strings can now be monitored...

Introducing Agent v2 beta for Kubernetes

In the olden days, we used to have to get logs by putting our agent on one machine at a time, like hitching a horse to a horse-drawn carriage. But now, we’ve got Kubernetes. It’s like a horse factory, and we’ve got more horses than we know what to do with. In this wild west of containerization, we could quickly end up underneath more logs than our old-timey agent could keep track of! But now there’s a new sheriff in town.

S3 Bucket Lambda Function

AWS has a lot of services, and they all generate logs. A lot of logs. We’ve worked hard to make sure you can capture logs from every source and service on AWS, and today we’re happy to announce the final piece of our AWS logging puzzle: LogDNA’s S3 Collector integration. It’s an easy-to-use Lambda function that lets you ingest any AWS logs that get dumped to S3 – like logs from CloudFront and ELB.

Here's How the Internet of Things is Transforming Healthcare

Industry 4.0 technology is transforming industry all over the world. Digital innovations such as data, virtual reality, automation, and robotics are all helping brands create products and services and deliver them to customers in better and more efficient ways than ever before. One of the most useful elements of Industry 4.0 technology comes from the Internet of Things.

Announcing secrets management in Sensu Go

In order to determine the health and current state of your systems, monitoring by its very nature requires access to internal and external services. Traditionally, users have had to get creative in terms of how they expose sensitive information (secrets, like access credentials) to their monitoring tool; operators typically would leverage local environment variables or give up entirely by putting secrets in the monitoring configuration.

DevOps Incident Management: A Guide With Best Practices

This is the one post I hope you’ll never need. However, should you ever need it, this is your one-stop shop for understanding how to proceed with DevOps incident management. Have you just been attacked? Did the commit go wrong? A CI pipeline went haywire? Don’t worry. I got you.

The Data-to-Everything Platform: What It Is, What It Means

As a company leader, what value are you extracting from your business and IT? What about from security data lakes and processes? Are you able to drive speed for your business because of real-time, advanced analytic capabilities? Successful companies are making technology architecture their business architecture—aligning stakeholders, processes, data, and analytics in an integrated fashion to deliver faster, data-driven decisions that are more accurate than ever before.

9 essential UEM capabilities that empower your IT administration

Unified endpoint management (UEM) is an IT best practice and strategy for securing and controlling desktop computers, laptops, smartphones, and tablets in a connected, secure manner from a single console. It’s increasingly important for enterprises today because of the prevalence of corporate-owned, personally-enabled (COPE) devices, and bring your own devices (BYOD) policies.

Unpatched zero-day vulnerability in Internet Explorer exploited in the wild

Barely a week after Patch Tuesday, internet security company Qihoo 360 has discovered yet another vulnerability in Internet Explorer (IE), this time due to a remote code execution vulnerability in the jscript.dll scripting engine. The vulnerability, identified as CVE-2020-0674, is considered Critical for IE 11, and Moderate for IE 9 and IE 10.