Operations | Monitoring | ITSM | DevOps | Cloud

Top 3 Reasons Why You Should Work with a ZTNA Service Partner

With remote and hybrid working now commonplace for organizations, many IT departments are weighing up the pros and cons of moving to a Zero Trust Network Access (ZTNA) model to replace traditional VPN, or other remote access approaches. While the benefits of moving to ZTNA are compelling: improving user experience, providing enhanced security, reducing management overhead, and increasing visibility and control, it can often be a challenge to select the best approach for your business.

How to Use Automation to Streamline IT Support

Though change is not a new concept in IT -- one might say it is intrinsic to the very nature of it -- the rate of change has accelerated dramatically over the last few years. We’ve recognized that people are everything and that we need to use technology to do more of the heavy lifting. This blog will look at how to automate customer service, streamlining IT support and improving your organization’s overall service delivery.

Monitor your AWS Lambda functions' ephemeral storage usage

AWS Lambda is AWS’s solution for highly portable, serverless computing. With Lambda functions, you can deploy and run business logic code without managing the underlying servers. Today, AWS announced that Lambda customers can now provision up to 10 GB of ephemeral storage for each of their functions, making them well-suited for new, data-intensive workloads—including machine learning inference, large media file processing, financial analysis, and more.

AWS Centralized Logging Guide

The key challenge with modern visibility on clouds like AWS is that data originates from various sources across every layer of the application stack, is varied in format, frequency, and importance and all of it needs to be monitored in real-time by the appropriate roles in an organization. An AWS centralized logging solution, therefore, becomes essential when scaling a product and organization.

InfluxDB as an IoT Edge Historian: A Crawl/Walk/Run Approach

The question of how to get data into a database is one of the most fundamental aspects of data processing that developers face. Data collection can be challenging enough when you’re dealing with local devices. Adding data from edge devices presents a whole new set of challenges. Yet the exponential increase in IoT edge devices means that companies need proven and reliable ways to collect data from them.

How to Lower CPU Usage

Is your Central Processing Unit (CPU) maxing out and slowing your PC to a crawl? There's a good chance you have experienced this issue if you run high-demand software for things like graphic design, video editing, or gaming. It can be frustrating enough without factoring in how hard it can be to trace down the source of the problem. In this article, we'll look at how to remedy high CPU usage on your machine or machines.

Advanced Automation in NinjaOne: Auto-Install Applications

This blog post is a companion piece to our Advanced Automation in NinjaOne webinar, providing step-by-step instructions for setting up the Auto-Install Applications example explored during that webinar. The full webinar recording provides multiple examples, tips, and suggestions. This blog post and webinar recording should be consumed together, click here to jump ahead to an in-depth explanation of the auto-install example or you can view the entire recording below.

Grok Pattern Examples for Log Parsing

Searching and visualizing logs is next to impossible without log parsing, an underappreciated skill loggers need to read their data. Parsing structures your incoming (unstructured) logs so that there are clear fields and values that the user can search against during investigations, or when setting up dashboards. The most popular log parsing language is Grok. You can use Grok plugins to parse log data in all kinds of log management and analysis tools, including the ELK Stack and Logz.io.