Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

How to Monitor IIS

IIS is very popular in part because it provides such a compact service with lots of features and configurations. Most enterprises that use Windows Server editions are hosting their websites using IIS. When hosting critical applications, many companies use monitoring software to keep their system administrators informed about the overall behavior of their systems. Such software provides configurable alerts for performance counters, services and applications. We will talk about how to monitor IIS, what the most important performance counters are, and what services should be monitored when talking about Internet Information services.

How to Monitor a Website

In this Power Admin video, learn how to monitor a webpage / website. Monitor one or many pages on a web site. Checks for positive cases (text that must be found), negative cases (alerts if error text found) and if the page has changed at all. Response times are checked and recorded, and reports can be generated to understand trends. The Web Page Monitor lets you define one or more web pages or web resources that should be checked. You can check return codes, data size, content on the page and/or changes in content size.

How to Monitor Services

Learn how to add a Service Monitor to your monitored server in PA Server Monitor. The Service Monitor watches the same system services that can be seen from the Administrator Tools Services applet (services.msc). If a service is not running, actions are fired (which could notify you and/or restart the service for example). The Restart Service action is typically attached to this monitor.

How to Configure a Dynamic Server List Monitor

PA Server Monitor can use rule-based automatic monitor configuration, which makes configuring monitors for your environment almost effortless. The Dynamic Server List monitors are setup to detect specific server types. In addition, they ignore any servers that are tagged as being blocked from Automatic Configuration (more on that below). The Windows Server rule which will be applied to all computers that are marked as being Windows is shown below.

HAProxyConf 2019 - RTL's Journey to Kubernetes with HAProxy with Vincent Gallissot

In 2018, we migrated several video-on-demand/replay platforms from on-premise to the AWS cloud. HAProxy was the key to this migration, allowing us to move safely and without any downtime. We’ll take a deep dive through the configuration used to secure our migration, highlighting aspects such as our use of the “observe layer7” keyword. I’ll also cover how we use GOReplay to replicate traffic and our use of the HAProxy Ingress Controller in front of our Kubernetes clusters.

Episode 17: User Sign Up and Simple Access Control

Request Metrics won’t be very successful if users can’t sign up! We recently completed cookie based user authentication and distributed session using Redis in ASP.NET Core but neglected initial sign up. Now we finally go back and write some boring forms and CRUD logic. A rich set of internal admin tools helps with customer support, system monitoring and visibility. We’ll start our suite of tools with a user admin page that lists all users in the system.