Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

From black box magic to automation transparency

The CFEngine policy analyzer is an awesome new service introduced in CFEngine 3.13. The policy analyzer allows you to quickly debug policies and inspect what is going on under hood of CFEngine. A known challenge with CFEngine, and most DSL based automation tools, relates to understanding what is actually going on during live operations. Many users view it as “black-box magic”. Unfortunately, the amount of magic and the size of the black box increases with the level of automation.

Monitoring Unicast Flooding Traffic

Unicast Flooding Traffic is associated with the learning process of network switches. In fact, with this method, switches identify the MAC addresses of the devices that are accessible by each of their ports, thus constructing a table that will then be used to decide the destination of each frame that arrives at the switch.

The True Cost of "Search-First" Problem-solving on Your Production Systems

The search-first problem-solving approach—meaning “open up the log search tool” (Splunk, ELK, Loggly, SumoLogic, Scalyr, etc)—is a costly and time-consuming operation during which the true source of a problem is rarely pinpointed in short order. Log search tools require work by the user to transform text strings into fields that are ready for statistical analysis.

Web performance monitoring load-time variations: Causes & fix

When looking at the performance of your website, web service,or API over a span of time, you will notice variations in the performance reported by the monitor. You may also notice inconsistencies between the performance reported from different monitors. Why? Why do you see spikes in your charts?

Toward Holistic Visibility: Gartner's Key Trends to Watch in IT Infrastructure Monitoring

It has been clear to many IT practitioners for a while now that the fundamental nature of IT infrastructure monitoring is transforming, right alongside the rest of the IT landscape. Gartner’s latest Market Guide for IT Infrastructure Monitoring Tools does a great job of mapping out evolving trends in the space.

How to Decrypt/Encrypt WebLogic and Datasource Password via WLSDM?

We prepared how to decrypt WebLogic passwords and how WLSDM decrypt WebLogic passwords(even other domains passwords) easily. Where do we use this feature? Consider a scenario you have one domain cloned by another domain and you have to add datasources to new domain. In this scenerio use WLSDM Decrypt/Encrypt feature and get WebLogic data source username and passwords quickly!

How to create server/machine disk usage dashboard and trigger "delete logs" DevOps action automatically?

“Oracle WebLogic Server has quite a number of log files that are generated which naturally tend to grow. Without any type of log rotation, archiving, or purging set up, your file system can be filled up rather quickly and eventually pose stability issues to your application environment.” Fortunately, WLSDM can create “Generic DevOps Mbeans” to prevent this scenario. It is also extremely simple.

Mattermost 5.7: The most secure way to adopt ChatOps, performance improvements and more

Happy New Year! Mattermost 5.7 includes a number of user experience improvements designed to increase team productivity. Try these new features by downloading Mattermost 5.7 today. Since it includes security updates, upgrading is recommended.