Operations | Monitoring | ITSM | DevOps | Cloud

How to

How to test and monitor your APIs with Playwright

In today's video, we explore a lesser-known feature of Microsoft's Playwright - API Testing. We'll illustrate how to use Playwright for testing GraphQL as an example of an HTTP-based API; RESTful APIs can be tested too. We'll explain the usage of the 'request' fixture with Playwright, parse responses and validate their correctness. Moreover, we'll delve into executing multiple API requests in a single Playwright test case while testing their responses.

How to Configure Kentik NMS to Collect Custom SNMP Metrics

Join Kentik's Leon Adato as he explains how to customize Kentik's NMS (Network Monitoring System) to collect specific SNMP metrics not covered by default settings. Learn how to add custom SNMP elements, navigate YAML configurations, and organize your data for clarity. With practical steps and a linked blog for detailed guidance, this video empowers you to enhance your network observability in Kentik NMS. Ideal for those looking to tailor their monitoring setup without getting lost in complexity.

Building an Internal Developer Platform for 20k Engineers on a Single Tenant with Will Stewart

Explore the world of Internal Developer Platforms (IDPs) with Will Stewart, co-founder of @northflank9144. Gain insights into developer experience, security, and scalability, drawing from Will's extensive expertise. Learn how IDPs empower engineering teams for enhanced productivity and innovation in modern software development environments. Dive into this comprehensive overview to unlock the potential of IDPs and optimize your organization's workflow.

Monitor Complex User Flows with Checkly's Multistep Checks

Learn how Checkly's new multistep checks help you to decrease incident response times with synthetic monitoring. Use multistep checks to chain and manage multiple API requests, run custom code for response validation, and get accurate alerts when incidents occur. This video explains how to create a multistep check to monitor a RESTful API from scratch. Do you have questions? Join our vibrant Checkly community on Slack and explore further!

What is Ransomware and how to prevent ransomware attacks

Find out what ransomware is and its types in this super easy beginner’s guide. This quick video guide explains how ransomware attacks work and the steps enterprises can take to mitigate ransomware. The video also answers questions on – what are the stages of a ransomware attack, what are the various ransomware encryption techniques, and best practices to prevent ransomware attacks.

Tech Talk: How To Navigate the Cyber Threat Landscape Next Year

Johan Dreyer, Field CTO, Mimecast joins Neha Kulkarni for a little serious and light-hearted conversation on the challenges and priorities of cyber threats and how to navigate these challenges. In this edition of Tech Talk, Johan discusses how the threat landscape is evolving in the backdrop of a hybrid workspace and the steps security teams can take to gain visibility into the state of remote endpoints. He also talks about the new-age tactics threat actors are implementing to execute a breach and building a security-first mindset.

SLA vs SLO vs SLI: Whats the Difference?

In this video, we cover the key differences between SLA, SLO, and SLI defining each term and giving real world examples of how they differ. This video was brought to you by PagerTree. On-Call. Simplified. Transcript: SLA vs SLO vs SLI Whats the difference? In this video, we will define these terms, compare them to one another and give real-world examples of how they work.