Operations | Monitoring | ITSM | DevOps | Cloud

December 2018

Simple Way to Add E-Mail Notifications

Foglight has a robust rules engine for alerting and notification. It's often the case that you can get to the same end zone in Foglight by many different plays. Using the Service Builder is an easy way to group "things" together. "Things" can be higher level objects like database instances or hosts, or very detailed objects like a set of disks or jobs that match a pattern.

May All of Your Lights be Green this Holiday Season

Creating your own dashboard in Foglight is as easy as putting up the Festivus pole. In this post, a service containing all MySQL instances was created. A great feature of Foglight is the ability to create your own custom dashboards and reports. Expand the right-hand panel, and select Create dashboard. I normally start with "Use All Data."

Foglight Container Management is available!

We’re excited to announce the general availability of a brand new product: Foglight Container Management – Part of the Foglight for Performance Management suite. oglight Container Management provides real-time and historical analytics of containers and their hosts, across physical, virtual and cloud environments. It identifies performance bottlenecks, failed containers and issues within the orchestration layer.

Monitor Postgres Disk Space Usage with Foglight

Many things can happen if the database runs out of disk space. None of them are good. DBAs understand that it is essential to monitor database disk space so that critical business processes are uninterrupted. Quest’s Foglight provides peace of mind by monitoring that space and alerting on the threshold well in advance of potential space issues.

MySQL DBAs Are Obsessed with This Freebie for Five Surprising Reasons

Hearing you’re getting MySQL is like hearing you’ve been “volunteered” to pet sit your neighbor’s rabid ferret: There’s confusion, mild panic and the frustrating realization that someone else is saving money because you’re doing all the hard work. Open source: fantastic for IT budgets, not so fantastical for DBAs.

Mitigating the insider threat, step 1: Understand and control privilege

What images does the phrase “insider threat” conjure up in your mind? A disgruntled admin actively sabotaging your systems just before penning a resignation letter? A highly privileged contractor installing spyware that will keep exporting sensitive data to him long after his project is complete?