Operations | Monitoring | ITSM | DevOps | Cloud

February 2020

How to Stop the Use of Anonymizer Websites on Your Network With SolarWinds Security Event Manager

Your organization has internet use policies in place for multiple reasons: protecting your network against security breaches, keeping organizational costs down, and protecting your employees, end users, or customers. Anonymizer websites provide a workaround to these policies that can put your organization at risk. In this video we'll show you how to identify and stop the use of anonymizer websites on your network with SolarWinds Security Event Manager.

Performance Tuning a Rails App With AppOptics Dev Edition

The other day I found myself trying to tune a Ruby on Rails app I had written as a side project. (The app lets me keep track of my favorite eateries and pubs. It’s searchable, includes multiple images, and has stored locations.) On past projects, I relied on SolarWinds® Papertrail™, path testing, a lot of trial and error, and a general feel to try to improve performance. This time I thought I would give SolarWinds AppOptics™ Dev Edition a try.

How to Quickly Identify Suspicious Network Behavior With Intuitive Dashboards in SolarWinds SEM

Log and event data are a boundless and valuable resource for identifying suspicious network activity and stopping potential breaches. However, analyzing lines and lines of text-based data can make this resource more trouble than it's worth. In this video, we'll explore the different ways you can customize log data in an easy-to-understand and visual dashboard in Security Event Manager to help turn it into something you can act on.

SolarWinds Server Configuration Monitor Overview

SolarWinds Server Configuration Monitor (SCM) is designed to provide insights into Windows® server and application changes to help you pinpoint the root cause of performance problems faster. Detect, track, and receive alerts when changes occur, allowing you to correlate system performance against configuration changes, know who made changes, and compare configurations over time. SCM integrates with SolarWinds Server & Application Monitor, allowing you to extend troubleshooting of system and application performance from one unified console.

Papertrail + Python Logging = Super Powers

Design applications to be modular. It’s a software design best practice. Modular programming is writing multiple independent programs that perform a single function but work together to achieve an overarching outcome. The benefit to this design is the smaller parts can be easily created and tested. New functionality can be slipped into the larger whole without interfering with other functions.

Virtualized Database Performance Tuning

Virtualized database instances are becoming more and more common, but many DBAs try to avoid virtualized databases because of the added complexity they can bring to performance resolution. With the VMware option, SolarWinds Database Performance Analyzer (DPA) provides detailed information related to whether the culprit affecting database performance is located in the virtualization layer or inside the database itself.

Application Compatibility Issues Make OS Migration a Headache for 75% of IT Professionals

New findings released by SolarWinds, following a survey of just under 200 IT pros via its THWACK community platform, reveal that most IT professionals migrating OS due to Windows 7 EOL expect it to cause a myriad of problems.

SolarWinds Deepens Hybrid IT Database Portfolio With Database Performance Monitor for Cloud-Native Environments

Before-and-after analysis and one-second root cause granularity for open-source and NoSQL databases, including MongoDB and PostgreSQL; uniquely enabling SolarWinds customers to manage databases through single provider

How to Monitor User Permissions on Linux Servers With SolarWinds Server Configuration Monitor

Understanding who has permissions to what and how those permissions levels change over time is an important piece of the puzzle when it comes to protecting sensitive data from getting into the wrong hands. However, this can be a difficult task when dealing with permissions on Linux servers and files. In this video, we'll show you how you can see who has access on your Linux servers, monitor and alert on changes to those permissions, and track the changes over time for auditing purposes.

Preparing for the Unexpected: How to Monitor Logs for Anomalies

Hidden among your normal, everyday logs are any number of unexpected events and anomalies. These events can provide key insights when troubleshooting problems, tracing transactions, or monitoring performance and behavior. However, finding them can be challenging, especially if you’re unsure of what, or how, to look for them. Searching for unexpected events involves more than just searching for keywords like “error” or “critical”.