Operations | Monitoring | ITSM | DevOps | Cloud

Blog

OnPage's New Integration With ServiceNow

If you’re an IT professional who has followed our blog, you’re familiar with OnPage and ServiceNow’s integration and their shared commitment to ensuring that critical alerts are never missed. But, did you know that OnPage and ServiceNow just took this powerful integration to the next level? The latest release of the integration provides significant enhancements. It’s also fully certified by ServiceNow and available on the ServiceNow Store.

User experience monitoring with Datadog browser tests

Datadog’s new automated browser tests enable you to automate your user experience monitoring and ensure that your users can complete actions like signing up for a new account or adding items to a cart. Anyone on your team can record and automate multistep browser tests in minutes. Once you create a test, Datadog uses machine learning to detect changes to your application and automatically update your tests accordingly.

Correlate request logs with traces automatically

When your users are encountering errors or high latency in your application, drilling down to view the logs from a problematic request can reveal exactly what went wrong. By pulling together all the logs pertaining to a given request, you can see in rich detail how it was handled from beginning to end so you can quickly diagnose the issue.

NiCE Oracle Management Pack 5.00

Oracle database availability and performance is key. Gain insight into what happens within your Oracle environment. Using the NiCE Oracle Management Pack for Microsoft SCOM, advanced monitoring has never been easier. The NiCE Oracle Management Pack smart algorithm determines problems and their severity way upfront. Leverage your existing investment, reduce costs, save time and build efficiencies that will last beyond your expectations.

Track the status of your SLOs with the new monitor uptime and SLO widget

Service level objectives are an important tool for maintaining application performance, ensuring a consistent customer experience, and setting expectations about service performance for both internal and external users. We are very pleased to announce the availability of a new monitor uptime and SLO widget that makes it simple to monitor the status of your SLOs and communicate that status to your teams, executives, or external customers.

Monitor AIX with the Datadog Unix Agent

Even in an era where container, serverless, and cloud-computing technologies garner considerable attention, many companies continue to run a sizeable share of their mission-critical applications on highly resilient, fault-tolerant systems such as IBM AIX on Power-series hardware. AIX, one of the most popular Unix-based operating systems, is trusted by large companies that process critical data such as medical health records and banking transactions.

Toughening Security for Linux Servers

As with any other operating system, security is a prime concern with Linux network hardware. In this article, we’ll be giving some recommendations on how to toughen the security posture of your Linux servers. Screenshots and example syntax relate to systems running Kali Linux, CentOS, RHEL, Ubuntu, and Debian-based Linux distributions.

Breaking Down the Barrier Between Employees and IT

In the traditional enterprise architecture, IT departments are far removed from employees and often even viewed as a secluded area of the business. Sure, IT would come help you relatively quickly if your computer wasn’t working or an application kept crashing, but for the most part, the IT employees kept to themselves, working hard to keep the network up and running and ready to put out the occasional fire when called upon.

Understanding RBAC in Sensu Go

Regulating access to resources is a fundamental measure for enterprises to ensure the security and reliability of a system. The last thing you need is a stolen or weak password to give up the keys to the proverbial kingdom. With role-based access control (RBAC), this risk is mitigated by providing only the necessary access so a user in your organization doesn't have more access than needed.