Operations | Monitoring | ITSM | DevOps | Cloud

Using Network Visibility to Grow Your MSP Business

Selling cloud services is an opportunity to shift clients away from on-premises infrastructure towards a more scalable network architecture. But if you’re moving clients to the cloud, you better make sure they can always access the cloud. That means having deep visibility and control over network infrastructure so you can provide proactive service and keep clients connected. But not all network equipment or cloud solutions offer the same level of visibility.

Get Network Device Warranty & Software Status Automatically with Auvik & Cisco

Conducting a network assessment is a great way to fully understand a new client's network, and to provide tangible proof when you recommend improvements—like upgrading out-of-date infrastructure. Many steps in the assessment process can be automated, but sourcing warranty and patch information about each network device has traditionally involved MSPs looking up serial numbers one by one.

Prometheus and Docker: Monitoring Your Environment

Coming back from Monitorama, I had a chance to sit back and start playing with some tools to see how they worked. Prometheus is a pretty ubiquitous tool in the monitoring space, it's pretty easy to spin up, and is open-source. Having a very active community of engaged developers means finding help articles or guides is easy. We are also going to use Grafana to build nicer looking graphs based on API queries from Prometheus.

SaneBox: Using Artificial Intelligence for Smarter Email Services

We all struggle with overloaded emails and are always on the lookout for methods to ease this burden. To make a clutter-free inbox a reality, help comes in the form of Sanebox. This is a software program made especially to clean up and effectively organize the client’s inbox. This simple software program works by taking a complete overview of your email.

Why the LogDNA Agent Runs As Root

One question that customers often ask is “why does the LogDNA agent need to run as root?” With IT departments and DevSecOps teams pushing to secure systems against cyberattacks, running a cloud-based logging agent as root sounds like a huge risk. While it’s true that you should avoid running applications as root, there are several reasons why our agent runs as root out of the box and several ways that we reduce your risk of attack.

Write to S3 and call other Lambdas with Python

Many people writing about AWS Lambda view Node as the code-default. I’ve been guilty of this in my own articles, but it’s important to remember that Python is a ‘first-class citizen’ within AWS and is a great option for writing readable Lambda code. Take a look at these two starter examples of writing functionality in Python.