Operations | Monitoring | ITSM | DevOps | Cloud

Blog

Selenium based functional testing & transaction monitoring

This functionality was frequently requested by our users and now we finally have it - automated synthetic monitoring using real browser! It allows you to periodically simulate user interaction with you web application by entering form fields, submitting forms, clicking links and buttons, etc. For list of currently available browser commands please visit our "Quick reference" section.

Best Practices for Incident Resolution

Believe it or not, there is a difference between incident closure and incident resolution. Incident closure ensures a problem has been addressed. Comparatively, incident resolution goes a step further by ensuring an incident is closed and all stakeholders are satisfied with the end results and agree with the incident closure.

Network Monitoring Comparison - Solarwinds and Netmon

Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even small organizations need visibility of what is happening within their network environment. This includes the ability to know what is happening with their servers, network infrastructure and the traffic that flows across the network and all connected network devices.

Configuring SYSLOG / Event Log on a Windows Device

Netmon’s complete Network Monitoring Solution can also be used as a centralized SYSLOG and Windows Event Log Server where you can quickly look through many Servers, Workstations or other Network devices’ SYSLOG and Event Log information without having to log into each individual device to see the same information.

Feature Spotlight: Transaction Check

Uptime’s transaction checks can continually monitor important functionality of your site. Specific steps within a Transaction Check can monitor nearly anything you have a test case for. So, this check is as good as the steps you configure for it. You can think of it as the first response or notification that a portion of critical infrastructure is down.

The Importance of Historical Log Data

Centralized log management lets you decide who can access log data without actually having access to the servers. You can also correlate data from different sources, such as the operating system, your applications, and the firewall. Another benefit is that user do not need to log in to hundreds of devices to find out what is happening. You can also use data normalization and enhancement rules to create value for people who might not be familiar with a specific log type.

How to replicate user errors without the user with Breadcrumbs and Sessions

If you need to replicate a user error, you’ll know how difficult it can be to pinpoint the cause. Usually, you’d look at the stack trace or ask the user themselves. However, that’s a lot of guesswork, especially if the stack trace is obfuscated. We’ll show you how to replicate the error faster using Crash Reporting’s Breadcrumbs and the Real User Monitoring Sessions feature.