Operations | Monitoring | ITSM | DevOps | Cloud

February 2022

Best alternative to CloudWatch: Cost-Effective, Simple, Complete AWS Monitoring

Trace root cause of performance issues with AWS Application monitoring. Get flexible deployment models for hybrid infrastructure eG Enterprise supports all the major technologies you use for infrastructure, digital workspaces and applications with AWS Monitoring It's a single-pane-of-glass that monitors your entire IT deployment, understands all your interdependencies and gets you to the root cause of performance problems faster.

End-to-End Application Performance Monitoring

In this blog, I’ll cover a real-world example of application performance troubleshooting a Java web app, hosted on JBoss Wildfly using Microsoft SQL as the backend database, including details of the analysis and diagnosis we had to perform in order to identify the root-cause of, and resolve, the performance issue.

Server Uptime Monitoring: What, Why, and How?

In an earlier blog post, we had discussed how server performance monitoring is not just about monitoring CPU, memory, and disk resources anymore. There is more to server performance monitoring than just three resources or metrics. That blog post covered several key performance indicators (KPIs) that IT teams must track to ensure that their servers are performing well. In this blog post, we focus on another KPI – server uptime.

Azure AD Monitoring Tips and Strategies

The Azure Active Directory (Azure AD) is Microsoft’s cloud-based identity and access management (IAM) service and an identity provider (IdP). Azure AD is the backbone for authentication in Microsoft 365 and for thousands of cloud-based SaaS applications. Azure AD provides several features for your organization and one of the features is the Microsoft Identity Platform.

Monitoring and Managing Azure Active Directory Users

This blog post is part 2 of our Monitoring Microsoft Azure Active Directory series. Managing Identity is a big challenge in a cloud environment, especially when users can potentially log in from anywhere. Additionally, users can often use different types of devices to log in and access cloud-hosted resources. Without a central Authentication and Authorization source, it is very difficult to manage who can login to what and who can do what with a cloud resource.