Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Auvik Use Case #4: Support All the Network Equipment Your Clients Have

It would be ideal if every network device you managed across all your client sites was from the same manufacturer, but for most MSPs that’s not the case—over 75% of MSPs manage four or more network vendors for their clients, and some manage upwards of 20. Even though taking care of diverse networks is standard procedure for most service providers, managing gear from multiple vendors is still, well, complex. It means handling different operating systems, different languages, and more.

New Horizons for Mobile Edge Computing (MEC) and IoT

As mobile and IoT deployments play an increasing role in enterprise networks, organizations are looking to more appropriate architecture—such as edge computing—to relieve their security and device management burdens. Edge computing is still in its relative infancy, and the platforms and services needed to orchestrate edge deployments are evolving themselves. In this article, we’ll be looking at some of the issues and available options.

Filters: valves for the Sensu monitoring event pipeline

Filters, the mechanism for allowing and denying events to be handled, have been given a refresh in Sensu Go. These new and improved JavaScript filters give you a way to express business logic through filtering, giving you more awareness of your environment, reducing alert fatigue, and improving performance. In this post, I’ll share what’s new with filters, using examples in Sensu Go. (If you haven’t already, you can download it here.)

Browser market share 2018: Safari on the rise

Our Real User Monitoring (RUM) product gathers performance data from actual user experiences from all around the globe for enabled pages. For 2018 that meant we collected data from thousands of worldwide users. In this blog, we take a look at the users’ browser choices, the page performance as experienced by the users, and their choices in device types.

Increased Test Credits for Everyone

After learning more about how our users use test credits to diagnose and troubleshoot network issues, we realized that we needed to make credits more affordable so we significantly increased the number of credits included with each credit package. See the new options below. We hope this change allows you to continue running cost effective network tests.

Top 5 Open-Source HIDS Systems

The threat landscape has become increasingly diverse and the systems used to attack are more sophisticated than ever before. In 2018, enterprises and organizations of all sizes and across all industries faced serious data breaches (information leaks were experienced by Aadhar —1.1B users; myFitnessPal —150M; Quora—100M; Facebook—29M and many more). One of the biggest victims was Marriot.

Cachebuster - A Pro Tip for Bypassing Cache

Caching is a great way to improve website performance and minimize the load. An ideal cache displays the cached version until the content changes and flushes the cache when there is a change. Yet, there may be cases where the cached version is not the most up-to-date one (if there is a DB error on the site or the caching is only time-based..).

Can we talk about SCOM Overrides?

If you’ve ever had a well-planned Operations Manager tuning session end in frustration, you are not alone. With everyone in IT seemingly always short on time, scheduling a meeting with multiple teams can kick-off things with some tension, and the process of walking through overrides hasn’t even started. There are useful resources available, depending on what pack your installing and tuning.