Related Articles
SCOM – How Data is Encrypted
Recently I got a question from a customer how SCOM traffic is encrypted. Well, I knew that the traffic IS encrypted, but how the encryption works, that is a different story. First we need to know, about what traffic we are talking about. Is it the communication between agents , respectively healthservices? Is it the […]
Azure Monitor – Install AKS Monitoring Grafana Dashboard With Azure AD Integration Using Helm
In my last post I showed you how to configure Kubernetes to configure Azure Monitor scraping to collect Prometheus metrics from a GO application. This time I would like to show you how to present this data properly in a nice dashboard. Luckily Microsoft has just released an awesome looking Grafana template… …which we will […]
SCOM 2012 R2 Java APM – MP Installation and Configuration (Part 3)
Finally we are going to install and configure Java APM management pack. Just for a small recap, we have a monitored Linux server and a fully functional Tomcat application server in place which is configured for deep monitoring. Cool, huh? Now we would like to get some hands on performance of one of the applications […]