How to Recover or Remove Orphaned Virtual Machines (VMs)
When using a Hyper-V, VMware, or other hypervisor, you’ll occasionally see a virtual machine marked “orphaned.” Virtual machines in this state are unusable, and you have two main options when dealing with them: recover them or remove them. This process is usually done manually through the hypervisor itself, such as through VMware vCenter server (part…
What Is a JBoss Application Server? Ultimate JBoss Tutorial
If you’re as tapped in to the computer software community as I am, you might’ve noticed some chatter about JBoss. Red Hat, ASRC Federal Holding Company, and other multimillion-dollar software companies use JBoss application server as a framework for their products. So, what is the JBoss enterprise application platform? How do you use a JBoss…
Windows Server Logs Management
Every event on your network is recorded as a log. Because logs use a standard data format, you can easily search and analyze them to troubleshoot problems or catch security issues. If you efficiently manage your Windows Server logs, you can help your business with profiling, auditing, and creating statistics for growth. It’s possible to…
Event Viewer Logs: How to Check the Server Event Log
Looking at the server event log is a critical part of taking care of your Windows servers and your network as a whole. Without keeping track of logs, you can miss important issues in your IT environment, and you won’t be able to troubleshoot problems as quickly. With server event log software, you can stay…
Best Practices and Standards for Logging and Monitoring
In a world with data flowing constantly through our devices, efficient logging practices have become a fundamental tool for modern businesses. By using logging best practices, logging data can give your business valuable insights, and you can use these logs and the information they hold for several purposes. With efficient logging tools and best practices,…
SNMP Traps Explained: How to View SNMP Traps
Devices enabled for using the Simple Network Management Protocol (SNMP) send out various SNMP messages to convey information. SNMP traps are a particular kind of message including information on alerts and problems. It’s important to be able to view and use these pieces of information when managing your data ecosystem, as they provide critical device…
How to Check Hard Drive Health
Your computer’s hard drive is one of the most important components of your machine. Without it, you can’t run an operating system or keep any data. And if it dies unexpectedly, you could end up with massive data loss if you haven’t created a backup (and even then, backups can become outdated). That’s why it’s…
How to Monitor and Manage VMware ESXi
VMware products are well known and fairly easy to explain. The VMware ESXi server, however, is one of the more complicated and lesser-known VMware products. To help you understand the VMware ESXi server, how to monitor ESXi, and VMware ESXi management, this guide will answer the following: What is a VMware ESXi server? What is…
How to Check, Measure, and Improve Server and Application Response Time With Monitoring Tools
In server and application monitoring, response time is one of the most critical attributes to track because it tends to have the biggest effect on end users. If a server response time is slow, then so are the applications or websites, regardless of how well-tuned your other resources are. It’s important to use ongoing server…
8 Best WMI Tools: Windows Management Instrumentation
Although Windows Management Instrumentation (WMI) is widely used by websites and software providers to communicate event publicity and error details to Windows computer users, WMI monitoring is often overlooked. WMI can be a source of valuable system information for commercial network administrators and private computer users, but it often results in an unnecessary flood of…
Make the most of your HTTP check: best practice for optional settings
People using our services would be very familiar with our basic HTTP Uptime check by now. After all, it’s our most used feature. Something a lot of our users might not know is that you can make the HTTP checks more advanced by using the Optional settings of the check. You find these settings under…