Operations | Monitoring | ITSM | DevOps | Cloud

SolarWinds

Tried and True Tech Tips

Anyone who’s worked in IT knows a great deal of the day-to-day work doesn’t come down to one secret trick—the job consists mainly of stringing together hard-won wisdom and convenient Google searches to solve problems. Working in IT is a little like parenting; when you’re first told you need to pick up your children’s LEGO bricks every day, you say, “Really? Is it really necessary to do it every single day?” But you only have to step on one at 1 a.m.

Lift the Haze of the Cloud With These 6 Considerations

Gartner says when COVID-19 hit the United States in March, 88% of businesses mandated or strongly encouraged employees to work from home. Sales, marketing, human resources, and most other business operations were all conducted from somewhere outside of the office. This drastic move required IT to accommodate employees in an entirely new way than what they had become accustomed to.

Using rKubeLog Collector for Aggregated Log Centralization

Debugging and resolving incidents in nodeless environments can be difficult, time-consuming, and most of all, frustrating. Exporting your logs from these ephemeral and disparate services to a centrally aggregated log is a great way to correlate information, quickly resolve incidents, and make your life a little easier.

Building a Zero-Trust Model With SolarWinds Security Tools - SolarWinds Lab Episode #92

The zero-trust model is critical for building a successful strategy to detect both internal and external cybersecurity threats. This approach requires setting and maintaining strict access controls and "no trust" as the default to all, including those already inside your network. There are several steps needed to properly evaluate your organization's current state before you can start implementing best practices.

How To Do Bulk Firmware Updates With NCM

As a network engineer, you're responsible for the uptime and stability of network infrastructure. One of the keys to keeping a happy and healthy network is making sure the devices are running firmware free of bugs and known issues. It may be tedious, but it's still relatively easy to do firmware upgrades if you only have one or two devices. But now, most environments have dozens of devices deployed at remote sites and branch offices. If you need to do a firmware upgrade on all of those, it's a whole different matter. This is where Network Configuration Manager can help by automating the normally manual process of firmware upgrades.

Why You Need Security Operations

A fully grown security operations center (SOC) was, until recently, a luxury, affordable for the largest organizations only, but even in global players, budget constraints are real. Unfortunately, the willingness to raise money for security seems to require an incident first. However, we often forget there’s no need for a dedicated war room, and it doesn’t always require a full team. Centralized security can be outsourced.

7 Tips to Make Digital Performance Monitoring More Effective

A poorly performing website or web application hurts the end-user experience and can result in lost revenue and customers. That’s why businesses seek better tools and processes to simplify digital performance monitoring to expedite detection and troubleshooting of performance issues. There are numerous website performance and availability monitoring tools available for this purpose.

Using SolarWinds Loggly With MongoDB New Structured Logs

Last month, MongoDB released v4.4 of their database; the new release contains several changes and improvements, but the introduction of structured JSON logging caught our eye, which makes it easier to extract valuable insights from the logs using products like SolarWinds® Loggly®. In this post, we’ll review how to get started sending your MongoDB logs to Loggly and some of the insights you can easily get from your server logs when you upgrade to the latest version.

Frequently Asked Questions About Application Performance

Digital transformation is changing the way companies do business, putting pressure on IT to continually monitor and manage the performance of applications delivering business-critical services. IT managers are responsible for making sure applications in today’s increasingly complex IT environment are running as fast and efficiently as possible. Poorly performing applications must be optimized for companies to leverage the benefits of digital transformation.

Go HAM on Your ITAM Strategy by Avoiding These 6 Mistakes

Okay, now we have you thinking about ham and that delicious holiday meal on the horizon. While not quite as delicious, hardware asset management, or HAM, is something IT should have on its plate this season. “What would it cost to replace all the desktops and laptops in your organization?” A hypothetical question posed on a recent webcast by Jon Hauser, IT director at the University of Washington School of Social Work.