Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

Introducing: Business Impact Alerts

Anodot is the only monitoring solution built from the ground up to find and fix key business incidents, as they’re happening. As opposed to most monitoring solutions, which focus on machine and system data to track performance, Anodot also monitors the more volatile and less predictable business metrics that directly impact your company’s bottom line. Now there’s an easy way to measure the business impact of every incident.

How Active Directory Management Tools Help Quickly Find and Troubleshoot Issues

Active Directory is part of Microsoft Windows software environments primarily for networks where some sort of domain control is required. The service is much more than just authenticating and authoring access to network resources. Active Directory is also used to enforce various network security policies, enable various processes, and enable various services. Active Directory consists of a logical structure that allows the server to execute the appropriate actions, authentication, services, and so on.

Best practices for monitoring authentication logs

If you are running a user-facing web application, you likely implement some form of authentication flow to allow users to log in securely. You may even use multiple systems and methods for different purposes or separate groups of users. For example, employees might use OAuth-based authentication managed by a company-provided Google account to log in to internal services while customers can use a username and password system or their own Google credentials.

Synthetic Monitoring: When Bad things Happen to Good Checks

Running synthetic monitoring thinking it will match up with a user’s reality throw for throw is a fool’s game. While you can test in prod, your testing parameters are limited by an insider’s knowledge of the transaction’s pathways – making true objectivity challenging to achieve in testing. Yet still, every transaction tells a story.

5 Takeaways from Gartner's 2020 IOCS Conference

I recently had the pleasure of attending the Gartner IT Infrastructure, Operations & Cloud Strategies (IOCS) Conference. Like most events in 2020, this event was virtual and brought together infrastructure and operations (I&O) leaders from across the world together to redefine, reassess, and prepare for what normal might be in the near future. Here are some of the major takeaways from my experience at this four-day event.

Introducing Monitoring Query Language, now GA in Cloud Monitoring

Developers and operators on IT and development teams want powerful metric querying, analysis, charting, and alerting capabilities to troubleshoot outages, perform root cause analysis, create custom SLI / SLOs, reports and analytics, set up complex alert logic, and more. So today we’re excited to announce the General Availability of Monitoring Query Language (MQL) in Cloud Monitoring! MQL represents a decade of learnings and improvements on Google’s internal metric query language.

How to Manage MSP Businesses More Efficiently

By leveraging specialist tools built to save time, money, and effort, MSPs can manage their business more effectively. There has been an increased demand for high-quality IT services and MSPs this year. Due to the pandemic, the majority of companies have been forced to adopt remote working conditions, which has led many to seek out support for their IT services that they haven’t necessarily needed in the past.

Improve DevOps Workflows Using SMLE and Streaming ML to Detect Anomalies

Modern IT & DevOps teams face increasingly complex environments — making it harder to quickly detect and resolve critical issues in real-time. To overcome this challenge, Splunk users can take advantage of ML-powered IT monitoring and DevOps solutions available in a scalable platform with state-of-the-art data analytics and AI/ML capabilities. In this blog, we deploy Splunk’s built-in Streaming ML algorithms to detect anomalous patterns in error logs in real-time.