Operations | Monitoring | ITSM | DevOps | Cloud

Resource Management, Images, and more with ServiceDesk Plus 11.1

The user education team at ServiceDesk Plus brings you a close-up on all the great features built into ServiceDesk Plus 11.1. Learn how resource management helps you distribute tasks among your techs; add images to your service templates; customize your application pages by user, and much more.

Send Custom HTML Email Notification with Power Automate Outlook Connector

Two years ago, I wrote a similar post on Microsoft Flow: How to pass the SQL data table results in a Markdown-formatted table into an Email notification or Approval Requests. It is still quite up to date, i.e., it is an excellent solution that you can still use today. The only problem with that article is that I was using “send an email” action in Power Automate Outlook connector that is currently deprecated.

Azure Monitor (Part 2): Azure Monitor Logs-Getting Started

In our previous post, we discussed the question: 'What is Azure Monitor and how does it work?' and also covered the two types of data it stores, at a high level. In this part, we will get ourselves started with Azure Monitor Logs. More specifically, we'll discuss how Logs are collected by Azure Monitor or, in other words, what options you have to add data sources to Azure Monitor so you can display that data in a way that makes sense to you.

Istio vs. Linkerd vs. Envoy: A Comparison of Service Meshes

In a previous article, we examined service meshes in detail. Briefly, a service mesh takes care of network functionality for the applications running on your platform. As Kubernetes has matured as a technology, service meshes have become a hot topic, with various products being developed to solve the challenges associated with areas like traffic management, security, and observability. This article will compare three service meshes.

How to Quickly Identify Suspicious Network Behavior With Intuitive Dashboards in SolarWinds SEM

Log and event data are a boundless and valuable resource for identifying suspicious network activity and stopping potential breaches. However, analyzing lines and lines of text-based data can make this resource more trouble than it's worth. In this video, we'll explore the different ways you can customize log data in an easy-to-understand and visual dashboard in Security Event Manager to help turn it into something you can act on.

SolarWinds Server Configuration Monitor Overview

SolarWinds Server Configuration Monitor (SCM) is designed to provide insights into Windows® server and application changes to help you pinpoint the root cause of performance problems faster. Detect, track, and receive alerts when changes occur, allowing you to correlate system performance against configuration changes, know who made changes, and compare configurations over time. SCM integrates with SolarWinds Server & Application Monitor, allowing you to extend troubleshooting of system and application performance from one unified console.

Papertrail + Python Logging = Super Powers

Design applications to be modular. It’s a software design best practice. Modular programming is writing multiple independent programs that perform a single function but work together to achieve an overarching outcome. The benefit to this design is the smaller parts can be easily created and tested. New functionality can be slipped into the larger whole without interfering with other functions.

Citrix Monitoring in 2020

Now how many of you have better monitoring as part of your New Year’s resolution? You want to implement better monitoring into your Citrix environments, right?You want your end-users to experience less technical faults by having a system in place that allows you and the team to be more proactive. OK, probably not what you have been thinking as the clock struck midnight, but it should be part of your professional goals for 2020.