There are literally hundreds of possible types of log sources around your environment and choosing which bubble to the top of your IT consciousness can be difficult. In a job where everything seems to be a top priority, understanding all the log types and sources available for selection can be daunting. In your environment, some logs may be more valuable than others, but having general guidance about logging and what types of logs may be available to monitor can help make you a better technologist.
Since the release of SQL Server® 2017 on Linux®, DBAs have been waiting for a native release of SQL Server Management Studio (SSMS) on Linux. At this point, Microsoft has stated that they have no plans for a native Linux version of SSMS. However, they have just released a preview version of SQL Operations Studio, … Read moreFirst Look at SQL Operations Studio
Do you regularly clean up your Active Directory® (AD)? Have you set a weekly, bi-weekly, or monthly schedule, or do you wait until you receive a change request? If you neglect AD cleanup and maintenance, your environment will get cluttered and increasingly difficult to navigate. Accounts become inactive for a variety of reasons, such as … Read moreCentralized Active Directory Management and Clean-Up
<Syslog_output> <server> 192.168.1.1</server> </syslog_output> Many people are familiar with the above commands, which are used for forwarding syslog to the syslog server (192.168.1.1). However, do you know how syslog can be helpful? Read on to find out how and see some different use cases for enabling syslog in your infrastructure. The primary use of syslog … Read moreIs Syslog Useful?
The world may run on coffee, but it’s the alarm clock that gets us out of bed. It operates on a simple threshold. You set the time that’s important to you and receive an alert when that variable is true. Like your alarm clock, today’s tooling for web service alerting often operates on simple thresholds, … Read moreNo Need to Be Alarmed: Crafting an Effective Alert Strategy
Today’s technology is growing at an extraordinary pace, so it is important to follow industry influencers and thought leaders to stay in the loop and learn new trends and best practices. Keeping on top of things in the industry is a great way to make sure you are functioning most effectively every day.
We have compiled a list (in no particular order) of tech geeks from system, virtualization, storage, database, network, and security management domains, who we think are the top influencers and thought leaders you should follow.
Is there a silver bullet for making policy and risk compliance easier? While there is no single solution which will manage compliance end-to-end, the answer may surprise you. But first a little background. Introduction Risk Management is fundamental to maintain a successful enterprise. The purpose of Risk Management is to identify uncertainties, hazards, exposures, liabilities … Read morePolicy Compliance or Network Configuration Management?