Operations | Monitoring | ITSM | DevOps | Cloud

Latest Blogs

Best Practices for Monitoring Azure Services

Monitoring your Azure cloud computing environment requires an understanding of each component of your Azure infrastructure and how they all interact. Cloud computing with Azure offers each of the three main advantages of cloud service providers: infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Combined, these three services provide a comprehensive cloud-based computing setup for any business.

3 Best Practices for Testing Your Website's Performance in 2020

For a website to succeed in 2020, it’s not enough for your content to be engaging. As we all spend more time online, we want websites to be fast and the experience to be seamless. Those that don’t will lose out on customers even if their content is top-notch. Cutting down on your website’s loading time is one of the best ways to improve the overall user experience (UX).

Be a Better Java Developer With AppOptics Dev Edition

Monitoring your Java applications is an essential part of ensuring high availability and good performance. And yet, many Java developers hold off on practicing application performance management (APM) until they’ve already deployed their application to a test environment, or even to production. Perhaps they don’t have access to an APM solution with the right insights, or maybe they don’t have the time or resources to deploy to a temporary environment and wait for metrics to come in.

SAML 2.0 and a UTC toggle make Papertrail even easier to use

SolarWinds® Papertrail™ now supports SAML v2.0, which makes Papertrail even faster and easier to access. Using SAML authentication you can log into your Active Directory domain or intranet and have immediate access to Papertrail, with no additional login required. The new SAML support also enables you to enforce user identity verification policies. If you are interested in enabling SAML authentication, select Settings and scroll down to the new security area.

Learning from Incidents - what to do after you write a postmortem?

For folks who’ve made post mortems more meaningful at your company, it is important that you spread that learning around. A lot of companies have teams that do postmortems really well and a lot of engineering managers(EMs) want to spread it organically, but writing and following postmortems is the kind of practice that a lot of devs really just don’t think about or care about and it can get extremely hard to force this practice, especially without support from upper management.

Trial by Fire: Making the Mobile Workforce Work

More people than ever are working remotely, and about one-third say the coronavirus pandemic was their first chance to do so. As companies return to a new normal, they are considering how to manage workers who are not in the office, and mobile workers add a unique challenge. The term “remote worker” includes work-from-home employees and mobile workers. Most employees who work remotely do both.

Canonical, Elastic, and Google team up to prevent data corruption in Linux

At Elastic we are constantly innovating and releasing new features. As we release new features we are also working to make sure that they are tested, solid, and reliable — and sometimes we do find bugs or other issues. While testing a new feature we discovered a Linux kernel bug affecting SSD disks on certain Linux kernels. In this blog article we cover the story around the investigation and how it involved a great collaboration with two close partners, Google Cloud and Canonical.

Preventing "copy-paste compromises" (ACSC 2020-008) with Elastic Security

The Australian Cyber Security Centre (ACSC) recently published an advisory outlining tactics, techniques and procedures (TTPs) used against multiple Australian businesses in a recent campaign by a state-based actor. The campaign — dubbed ‘copy-paste compromises’ because of its heavy use of open source proof of concept exploits — was first reported on the 18th of June 2020, receiving national attention in Australia.

HIPAA-Compliant Text Messaging: Best Practices and Policies

HIPAA compliant text messaging enables healthcare providers to securely communicate with patients and other healthcare providers. To ensure HIPAA compliance, you need to use HIPAA standards to create secure electronic data transmissions (in this case, text messages). The goal is to secure transmissions that contain protected health information (PHI).

Moogsoft Express Helps DevOps and SRE Teams Develop More and Operate Less

“Welcome to Tomorrowland.” That’s how Moogsoft Chairman and CEO Phil Tee kicked off the launch event of Moogsoft Express, the next-generation AIOps and observability solution built from the ground up for DevOps and SRE teams. The reference to a better future is fitting. With its arrival, Moogsoft Express helps these teams maintain visibility and control over increasingly complex CI/CD pipelines, so they can detect issues earlier, fix them faster and prevent outages.