Operations | Monitoring | ITSM | DevOps | Cloud

The Advent of Monitoring, Day 9: Advantages of Multi-Step API Checks vs Original API Checks

This is the ninth part of our 12-day Advent of Monitoring series. In this series, Checkly's engineers will share practical monitoring tips from their own experience. As a Checkly user, you’ve always had access to our two core check types: API and browser checks. API Checks are much cheaper, and therefore only run a curl-like request against the endpoint of your choice.

What Is IPv6? Definition & Full Overview

Poised to redefine the landscape of digital communication stands the groundbreaking achievement that is IPv6, the sixth generation of the Internet Protocol. The evolution from IPv4 to IPv6 marks a pivotal shift in internet technology, driven by the increasing scarcity of IPv4 addresses and the expanding scale of the global network.

How to Deploy Microsoft LAPS

Securing privileged accounts is of utmost concern to cybersecurity professionals, and Active Directory, Microsoft’s identity and access management service, forms the backbone of the majority of organizations. Active Directory (AD) centralizes user accounts, computers, and resources, ensuring access control, and local administrator accounts wield substantial power within Windows systems.

What is SSH?

SSH stands for “Secure Shell.” It’s a network protocol used to securely access and manage devices and servers over an unsecured network. It provides an accurate form of authentication as well as encrypted communication between two systems, making it especially useful in environments where security is a concern. SSH is commonly used to access remote servers through a command line interface, but can also be used to securely transfer files (through SFTP or SCP).

What is the principle of least privilege (PoLP)?

The Principle of Least Privilege, also known as PoLP, is a computer security rule that states that each user or group of users must have only the necessary permissions to perform their corresponding tasks. In other words, the less power a user has, the lower the chances of them having a harmful impact on the business.

Product Release Notes November 2023

One of the major issues with first-generation cloud cost management platforms is their tendency to become shelfware. Low data quality, high barriers to entry for new users, and low signal-to-noise ratio made it hard to drive cost accountability among engineering teams — and pushed many organizations to nearly give up on it.

Monitor Docker With Telegraf and MetricFire

Monitoring your Docker environment is critical for ensuring optimal performance, security, and reliability of your containerized applications and infrastructure. It helps in maintaining a healthy and efficient environment while allowing for timely interventions and improvements. In general, monitoring any internal services or running process helps you track resource usage (CPU, memory, disk space), allowing for efficient allocation and optimization.

Fetch Waterfall in React

Have you seen this problem? Or maybe this one? You’ve most likely seen this: Hint: they’re all the same. The first image is Sentry’s Event Details page, the second is Chrome’s Network tab, and the code snippet is what causes it. If you can answer yes to any of these, then you need to keep reading. If not, you still need to keep reading, so your future self can thank you. This is called “fetch waterfall” and it’s a common data fetching issue in React.

What is QoS in Networking: Decoding Quality of Service

Network admins are no strangers to the challenges posed by the ever-growing demand for bandwidth, the diversity of applications, and the varying network traffic requirements. Amidst this complexity, one key player stands tall for optimal network performance – Quality of Service, also known as QoS. In networking, the term QoS holds significant weight, yet its true essence can sometimes elude even the most seasoned administrators.