Forward Foglight Alarms to a Pager
A customer would like to forward alarms from Foglight with all the appropriate information, such as alarm time, source, severity, message, and the rule name, to a pager script which in turn pages the ...
A customer would like to forward alarms from Foglight with all the appropriate information, such as alarm time, source, severity, message, and the rule name, to a pager script which in turn pages the ...
Foglight can now monitor the MS SQLServer BI stack – SSIS, SSAS, and SSRS. Foglight supports monitoring SSIS for MS SQLServer 2012 and above. For this SSIS monitoring, Foglight needs to access the SSI...
In my last post, I covered the four stages of capacity management, and talked about some of the reasons why managing your virtual capacity is equally as important as physical capacity management. Now...
Can Foglight run on a Raspberry Pi running Linux? This blog answers the question. Interestingly, I've been asked more than once recently if the Foglight Agent Manager can be installed on a Raspberry ...
As the old saying goes, “the one constant in life is change”, and this is especially true in database environments. There are many reasons why database environments experience change whether it be th...
Office 365 has three types of identity models for sign-in: cloud, synchronized, and federated. Cloud is the simplest, where users sign on directly. With synchronized sign-in, users are passed throug...
The need for virtual capacity management is on the rise. In Gartner’s ‘Market Guide for Capacity Management Tools’ report, published on January 30, 2015, it states “Through 2018, more than 30 percent...
SQL Performance Investigator (SQL-PI) is an extension to the standard Foglight for SQL Server Cartridge, and adds Real-time and historical data. If you have used Performance Analysis for SQL Server, t...
Quest is a Platinum sponsor of Microsoft Ignite 2016, September 26-30 in Atlanta, Georgia. It’s only the second year of the event, but the conference is sold out – which makes it even more exciting t...
The Application User Interface is simply Role Based Access control to the Function and Features of the Change Auditor when using client, it restricts access to the client interface based on permission...
As you might suspect, I had difficulty coming up with a witty title for this blog. However, I rather enjoy people rolling their eyes when I make bad jokes. Given the topic is about memory settings for...
In this blog series, I’ll cover why monitoring the Internet of Things (IoT) is important, along with how to go about doing it in a practical manner. What is the Internet of Things? The IoT is an ecosy...