Operations | Monitoring | ITSM | DevOps | Cloud

Monitoring

The latest News and Information on Monitoring for Websites, Applications, APIs, Infrastructure, and other technologies.

How to Configure a Dynamic Server List Monitor

PA Server Monitor can use rule-based automatic monitor configuration, which makes configuring monitors for your environment almost effortless. The Dynamic Server List monitors are setup to detect specific server types. In addition, they ignore any servers that are tagged as being blocked from Automatic Configuration (more on that below). The Windows Server rule which will be applied to all computers that are marked as being Windows is shown below.

Page speed check: a comprehensive test of your site

Instant check You can run it any time from HostTracker main page for free - and it really helps to see how your website performs from different countries and find its weak spots, if there are any. Let us check what we see there, if we test google.com: Top line shows us basics about the loaded page: how many http requests have been made to complete it, if all of them were successful, its size and load time.

Don't let an expired SSL certificate stop your site's traffic

SSL (Secure Socket Layers) certificates tell your site’s visitors that you are whom you say you are and creates an encrypted connection between your domain (anexampledomain.com) and the visitor. If your domain doesn’t supply a valid certificate, the browser throws up a wall that warns the user that the site isn’t trusted. Many things may happen that tell the browser to issue the warning, but the most common reason is due to an expired SSL certificate.

Virtual Time Series Meetup - April 2020

Virtual Time Series Meetups are events for everyone who is passionate or curious about time series data and how it can be used. In the April edition of our meetup, special guest Saiyam Pathak shares the what, why and how of time series database InfluxDB. The talk features several demos on Kubernetes that can be performed by the viewers. Saiyam also discusses Telegraf, its plugins, and uses Kubernetes plugin during the demo(s).

Monitor employee productivity and analyze user behavior

The current sudden and forced work-from-home (WFH) situation has caught many organizations unawares. In fact, many are unprepared or underprepared when it comes to arming themselves with the right tools for a remote work model, leading to an increase in network vulnerability as users access data remotely. Employee productivity has also become a major concern among employers. Taking all of this into account, ManageEngine has decided to make AD360 free for organizations around the world.

We Need APM Now More than Ever

This is an unprecedented time for each one of us. Every organization wishes to continue providing value to their customers despite the current situation. We’re all ready to go that extra mile to achieve whatever is possible in this digital age. Organizations around the world are fully committed in maintaining their business operations at optimum levels. There are certain tools or software that can assist you in this process.

Are third-party tools necessary to monitor your VMware infrastructure?

Monitoring every resource in your VMware environment is crucial to avoid sudden issues and ensure proper capacity planning. Although VMware offers its own monitoring suite, organizations frequently seek out third-party monitoring tools. The start of this trend dates back to the early days of vSphere, and it has only continued to increase. This is because third-party tools provide monitoring for the compute, storage, network, and analytics aspects of VMware environments, all from a single interface.

CompareCamp awards ManageEngine's endpoint protection software for its great user experience

Vulnerability Manager Plus is ManageEngine’s enterprise security program that empowers system administrators with an essential set of tools for managing and mitigating threats and vulnerabilities across systems in IT infrastructure. This security solution features specialized tools that help enterprises improve their overall security posture. Some of its unique tools include its integrated patch management module, security configuration management, and prioritization of vulnerabilities.