Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Why Your Website Host's "100% Guaranteed Uptime" Promise is Bogus - and What to Do About It

It’s been said that the devil is in the details. Well, along the same lines — and as we all know from miserable experience — when it comes to guarantees, the devil is in the small print. And there’s no better (or worse) example of this than with respect to the gleaming, confidence-inspiring claim by web hosts that they deliver 100% guaranteed uptime. Except, well, they don’t.

Debugging with Dashbird: Malformed Lambda Proxy Response

One problem that pops up quite frequently when people try to build serverless applications with AWS API Gateway and AWS Lambda is Execution failed due to configuration error: Malformed Lambda proxy response. There is nothing worse than generic error messages that don’t tell you anything you need to fix the problem, right? And AWS isn’t particularly known for its error message design, if you can even call it that, let alone for giving you the means of fixing the problem.

How to Monitor Amazon DynamoDB Performance

One of Amazon Web Services’ (AWS) most well-known services is AWS DynamoDB. Some of AWS’s most notable customers use DynamoDB for their database needs – companies such as Netflix, The Pokemon Company, and Snapchat. DynamoDB is relatively simple to set up and configure, and it integrates well with many web-based applications. DynamoDB supports technology solutions in gaming, retail, bank and finance, and the software industry.

Digital First, But With a Twist

A lot of very good writing from some reliable commentators has been suggesting that organizations have been forced into a digital-first environment. Covid has been the enforcer and business and public sector alike have adapted to having a distributed workforce by putting the infrastructure in where there were gaps. This is OK as far as it goes but it’s not quite right. The best organizations have not gone ‘digital-first’.

InfluxData closes 2020 with exponential cloud growth, expanding user base, and big new customers

SAN FRANCISCO — January 14, 2021 — InfluxData, creator of the time series database InfluxDB, today announced significant growth in 2020 across its cloud business, open source user base, and major new customers. Demand for the time series platform continued to climb across industry sectors, especially for IoT and data streaming use cases.

Active Directory Security Best Practices Includes Monitoring for Signs of Compromise

Fun Fact: Most types of network and computer compromises could have been discovered much sooner if the organization had enabled proper event log monitoring using an appropriate server monitoring solution that alerted them to the issue. Without such a software application or not taking the time to configure it correctly, it takes much longer to uncover the compromise if it is ever discovered at all.

NEW Feature: Journey Pre-Actions

We have released a new upgrade to our script editor which is part of our ongoing commitment to build the best Synthetic User Journey monitoring tool on the market – Journey Pre-Actions. This upgrade is simple but will be useful for those websites that require certain prerequisites in order to allow tests such as these to be run. As with many of our features here at RapidSpike, this was born from a real-world requirement from a number of our customers.

How to Use Mixins and Modules in Your Ruby on Rails Application

Modules and mixins are, without doubt, great resources that make Ruby so attractive. They give the application the ability to share the code that can be used with ease in other places. It also helps us organize our code by grouping functionalities and concerns, which improves the readability and maintainability of our code. In this article, we will go through the concepts behind modules and mixins.

Overcome security challenges with ServiceNow CMDB population

Networks always start off small and simple, but over time they can become increasingly complex. You start with a small network consisting of a simple Virtual Local Area Network (VLAN) with broad connectivity. However, once your security team get involved and add DMZs, routers, firewalls, etc you will find it hard to keep track of the intricate web you have created to support your business network.

Top integration tools to populate your CMDB

A Configuration Management Database (CMDB) is critical in supporting services such as Incidents and Change & Asset Management. Most companies dream of having a beautifully populated CMDB, but struggle with how to make this a reality as the process can be quite daunting! But never fear there are loads of tools you can buy to do just this! Typically, there are three types of solutions designed to populate your CMDB, these are either agent-based, scanner, or integration style tools.