Monitoring is an important activity in IT operations, it’s essential for correlating the state of all the moving parts of our systems and applications and create a big picture of the health of the whole environment. Before going down the rabbit hole of complicated monitoring tools and techniques let’s start with define a that monitoring can be subjective and on a case-by-case can be very basic or detailed and can let you choose a specific tool or strategy. There is no one-size-fits-all. This week I needed to implement a custom check to monitor the network load/usage on any Windows OS and instead of looking for a third-party tool and deploying maybe another agent on servers I wrote a Powershell script to perform this activity.
I started reading this book during the holiday season with high expectations after reading The Phoenix Project a couple of years ago.
I must admit, I recognize myself at least in a couple of characters (Brett and Maxine) of this novel and a couple of my professional experiences are in some sort described in this book.
In this article, I want to focus on a cybersecurity topic but from an operations perspective and with a pragmatic approach to tactics that users can implement to implement the security strategy or principles with less friction as possible from the end-users. Continue reading “How to Manage Secrets and Passwords with CredentialManager and PowerShell”
I love Linux and I always considered myself an Open Source enthusiast. After reading “The Practice of System and Network Administration”, I decided to add this must-read book to my list.
The contents are well organised and good not only for beginners and junior system administrators but I think there are very interesting takeaways for more experienced professionals too. Continue reading “Book Review: UNIX and Linux System Administration Handbook, 5th Edition”