Operations | Monitoring | ITSM | DevOps | Cloud

SQL Sentry Advisory Conditions Tutorials

As a customer success engineer, I hear directly from customers about what issues they need help solving with SolarWinds SQL Sentry®. This insight first motivated me to create posts for the SQL Sentry Tips & Tricks series, which explains how to get the most out of SQL Sentry. Now, I’d like to create more tutorials about what I consider to be one of the most powerful features in SQL Sentry: Advisory Conditions.

Shifting Left for DevSecOps Success

Not long ago, developers built applications with little awareness about security and compliance. Checking for vulnerabilities, misconfigurations and policy violations wasn’t their job. After creating a fully-functional application, they’d throw it over the proverbial fence, and a security team would evaluate it at some point – or maybe never. Those days are gone – due to three main shifts.

How to monitor RabbitMQ logs and metrics with Sumo Logic

As organizations have moved toward a microservices design pattern, the need for reliable and performant solutions that enable decoupled services to communicate with one another has grown. RabbitMQ is an open-source message broker designed for this purpose. We’ll discuss what RabbitMQ is, how it works, why it needs to be monitored and how Sumo Logic can effectively do this.

Why Uptime.com Chose Apdex as a Performance Monitoring Standard

Early Twitter was an adventure. Every day was an open question: would you be able to log in or did the next big story crash the platform? It was taking off and crashing and flying and crashing again. All in real time. It was an exciting time for the internet, and while everything has changed since then it got us thinking: why did we used to tolerate stuff just not working? And why do we still tolerate stuff not working?

AppScope 1.0: Changing the Game for Infosec, Part 1

This is one of a series of blogs in which we introduce AppScope 1.0 with stories that demonstrate how AppScope changes the game for SREs and developers, as well as Infosec, DevSecOps, and ITOps practitioners. In the coming weeks, Part 2 of this post will tackle another Infosec use case. If you’re in Infosec, at some point you’ve doubtless had to vet an application before it’s allowed to run in an enterprise environment.

Hot Storage vs. Cold Storage

When it comes to data storage, all data isn’t equal. After all, the data you use daily doesn’t need the same level of protection or ease of access as long-term hot storage vs. cold storage backup. A large percentage of a business’ data remains unleveraged due to data management and security challenges, which highlights the need to implement a data storage strategy.

SolarWinds Aims to Set New Standard in Software Development With Next-Generation Build System

At SolarWinds, we believe security should be a core competency of all organizations. The December 2020 SUNBURST cyberattack on the SolarWinds software build environment emphasized a concerning new reality for the software industry and illuminated the increasingly sophisticated threats made by outside nation-states to the supply chains and infrastructure on which we all rely.

Why is website monitoring so important?

Have you found yourself asking this question when seeing website monitoring solutions flash up on Google? Has your dev team been trying to convince you to get a monitoring tool but you’re not sure what the benefits are? Don’t worry, I’ve compiled a list of the top reasons why website monitoring is so important to you and your website. But you don’t have to take my word for it, read on and find out.

How to Detect Memory Leaks in Java: Common Causes & Best Tools to Avoid Them

There are multiple reasons why Java and the Java Virtual Machine-based languages are very popular among developers. A rich ecosystem with lots of open-source frameworks that can be easily incorporated and used is only one of them. The second, in my opinion, is the automatic memory management with a powerful garbage collector. The Java garbage collector, or in short, the GC, takes care of cleaning up the unused bits and pieces.