Operations | Monitoring | ITSM | DevOps | Cloud

Getting Started with Citrix in Splunk - [Part 1]

With most of the world on lockdown due to the COVID-19 virus, many aspects of IT services and digital transformation have been put into the fast lane. There are reports of massive surges in the use of tools such as Zoom, Microsoft Office 365, etc. in order to communicate and collaborate. At the same time organizations are required to scale up access to their internal applications.

Ransomware: How to Combat a Growing Threat to Your Organization

Ransomware is a serious threat to institutions of all kinds, resulting in mounting costs for organizations that must literally pay ransom to regain access to their essential systems. A ransomware attack takes place when a cybercriminal denies an organization access to the data it needs to conduct business, usually by encrypting the data with a secret key. The attacker then offers to reveal the encryption key in exchange for a payment. The payment can vary in amount or kind.

Keep Calm And Carry On Your Business Services

Businesses who operate along supply chains, like manufacturers, distributors, and retailers, have innovative systems and processes for predicting demand and keeping consumers satisfied. Until a crisis hits. When demand for essential SKUs spikes due to panic buying and fear-based hoarding, organizations in essential consumer categories can find themselves forced to make critical decisions without reliable information to base them on, significantly increasing their risk exposure.

Monitor application health with the new response codes tab in RUM

In this release, we’re bringing an all-new section to Real User Monitoring to provide another way for you to monitor application health; the Response Codes tab. Real User Monitoring now tracks the response codes from XHR/AJAX calls made in your web application using the JavaScript provider. You can now: Stacked view of your application’s response codes This feature brings vital insight into the health of your applications so you can deliver the software experiences your customers deserve.

Ruby performance tips - how to optimize code from the ground up

Over the last few years, more developers have taken Ruby as their staple programming language. Who can blame them? It certainly has a lot of appealing features. For one, the syntax is easy to read and debug. A default MVC architecture within most Ruby frameworks is another alluring factor that may have had you using it as well.

March 2020 Outage Report

It’s pretty safe to say that March was the month where everything changed for most of us. By now, enough has been said on coronavirus and we need not add to the pile. Our concern remains continuous uptime, and reporting on outages as teachable moments. During this time of heightened tensions, let’s take a few moments to do some post mortem work and see what we can learn from March’s outages.

SQL Server, Part 2: Authentication and authorization mechanisms in SQL Server, simplified

In the previous blog of this series, we discussed how monitoring SQL Server activities helps secure databases. The database security can further be reinforced by carefully configuring the authentication and authorization mechanisms for database accesses. In this blog, we’ll briefly explain the various authorization and authentication mechanisms of SQL Server and some best practices you can follow.

Your Status Page Deserves Its Own Domain

Public status pages have risen to become an essential requirement for all publicly facing web services. A well-constructed status page is a hallmark of a customer-centric organization. Status pages provide transparency and help reduce customer support requests during an inevitable outage. With sufficient component details, they can serve as useful information hubs for customers experiencing issues. There are numerous services to make setting up a status page simple and inexpensive.

Secured access to business-critical resources for your remote workforce

Over the past several years, telecommuting, or remote work, has gained significant traction across a wide variety of industries. According to a recent survey conducted by OWL Labs, 48 percent of employees worked from home at least once a week in 2019, and 34 percent were even willing to take a pay cut in order to work remotely.

BAM to achieve end to end visibility in a Azure Serverless Application

Looking for an end to end visibility on your Serverless Application made with Azure resources? This article is for you. Consider there is a transaction between the Azure Services. With the existing solutions offered by Azure, you cannot have the visibility on the transaction as well as the stages in the transactions. Here comes the Business Activity Monitoring in Serverless360. With a simple scenario, we will see how to use Business Activity monitoring and track business data.