Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Introducing Uptime.com's New UI

We want to begin this post by thanking our long-time Uptime.com members for bearing with us through the transition to our new user interface. You have no doubt noticed the changes. The adjustments to the UI are small, but some important features are now in a different place. Our intent was a more intuitive design. Today, we’ll walk you through some of our most important decisions in this post. First, we’ll document some changes to be aware of.

Feature Spotlight: Email Server Checks

Because email is communication is prevalent in today’s business landscape, use Uptime.com’s email server checks to continually monitor email server status. Let’s get familiar with the three different types of email checks you can implement. Simple Mail Transfer Protocol (SMTP) checks monitor the flow of email across the Internet.

Feature Spotlight: DNS Checks

The Domain Name System (DNS) is brilliantly designed as a hierarchical structure, ensuring that any single point can fail with the system remaining relatively intact. There are some nuances to this statement, like caching issues that arise from outages, but the overall focus is on uptime. This is why the DNS check is a critical part of your IT uptime monitoring process.

Feature Spotlight: Domain Blacklist Check

Domain Blacklist checks from Uptime.com will check your site once each day against approximately 100 of the most well-known spam blacklists to determine if your mail server appears on them. Your domain may be flagged as a spam website for sending too many emails, for sending spam emails, or due to repeated reports by email recipients that the site is spam.

Feature Spotlight: Malware / Virus Checks

Malware / Virus checks from Uptime.com checks your site against two major malware databases. Malware is any type of unwanted or malicious code. Malware includes viruses, which are malware designed to replicate and spread, as well as spyware, adware, trojans and more. A Malware / Virus check uses the Google Safe Browsing List and the Yandex Safe Browsing List to determine if your site has malware.

Feature Spotlight: TCP/UDP Checks

We live in an incredible global economy where workers from all over the world pitch in to complete major products, develop new technology, and change the world. Here at Uptime.com, our workforce is spread across the globe, and we know many of you reading probably have a similar setup. The benefits of hands on a website at all hours of the day are numerous, so long as connectivity remains alive and well. That’s where a TCP/UDP Check provides immeasurable value.

Amazon Prime Day Downtime Blues

For about 3 hours at the very beginning of Amazon Prime Day, Amazon’s website experienced outages on both the East and West coasts of the US. Even the world’s largest retailer isn’t prone to technical mishaps. In fact, Amazon’s server infrastructure is reasonably stable. This particular outage is a fascinating study in how Amazon’s website downtime affects a business in real time.

Feature Spotlight: Transaction Check

Uptime’s transaction checks can continually monitor important functionality of your site. Specific steps within a Transaction Check can monitor nearly anything you have a test case for. So, this check is as good as the steps you configure for it. You can think of it as the first response or notification that a portion of critical infrastructure is down.