Operations | Monitoring | ITSM | DevOps | Cloud

SolarWinds

Papertrail + Python Logging = Super Powers

Design applications to be modular. It’s a software design best practice. Modular programming is writing multiple independent programs that perform a single function but work together to achieve an overarching outcome. The benefit to this design is the smaller parts can be easily created and tested. New functionality can be slipped into the larger whole without interfering with other functions.

Virtualized Database Performance Tuning

Virtualized database instances are becoming more and more common, but many DBAs try to avoid virtualized databases because of the added complexity they can bring to performance resolution. With the VMware option, SolarWinds Database Performance Analyzer (DPA) provides detailed information related to whether the culprit affecting database performance is located in the virtualization layer or inside the database itself.

Application Compatibility Issues Make OS Migration a Headache for 75% of IT Professionals

New findings released by SolarWinds, following a survey of just under 200 IT pros via its THWACK community platform, reveal that most IT professionals migrating OS due to Windows 7 EOL expect it to cause a myriad of problems.

SolarWinds Deepens Hybrid IT Database Portfolio With Database Performance Monitor for Cloud-Native Environments

Before-and-after analysis and one-second root cause granularity for open-source and NoSQL databases, including MongoDB and PostgreSQL; uniquely enabling SolarWinds customers to manage databases through single provider

How to Monitor User Permissions on Linux Servers With SolarWinds Server Configuration Monitor

Understanding who has permissions to what and how those permissions levels change over time is an important piece of the puzzle when it comes to protecting sensitive data from getting into the wrong hands. However, this can be a difficult task when dealing with permissions on Linux servers and files. In this video, we'll show you how you can see who has access on your Linux servers, monitor and alert on changes to those permissions, and track the changes over time for auditing purposes.

Preparing for the Unexpected: How to Monitor Logs for Anomalies

Hidden among your normal, everyday logs are any number of unexpected events and anomalies. These events can provide key insights when troubleshooting problems, tracing transactions, or monitoring performance and behavior. However, finding them can be challenging, especially if you’re unsure of what, or how, to look for them. Searching for unexpected events involves more than just searching for keywords like “error” or “critical”.