{"version":"1.0","provider_name":"E-Pulse Blog","provider_url":"https:\/\/www.extnoc.com\/blog","author_name":"Allan Stuke","author_url":"https:\/\/www.extnoc.com\/blog\/author\/allan-stuke\/","title":"What are the Best Practices of Server Monitoring?","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"p9EtnRJeAG\"><a href=\"https:\/\/www.extnoc.com\/blog\/server-monitoring-best-practices\/\">What are the Best Practices of Server Monitoring?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.extnoc.com\/blog\/server-monitoring-best-practices\/embed\/#?secret=p9EtnRJeAG\" width=\"600\" height=\"338\" title=\"&#8220;What are the Best Practices of Server Monitoring?&#8221; &#8212; E-Pulse Blog\" data-secret=\"p9EtnRJeAG\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.extnoc.com\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.extnoc.com\/blog\/wp-content\/uploads\/2022\/10\/What-are-the-Best-Practices-of-Server-Monitoring-og-2.jpg","thumbnail_width":1200,"thumbnail_height":630,"description":"Server monitoring is an essential tool for IT administrators. It helps them identify problems before they cause downtime or data loss. Read on to discover more about server monitoring best practices."}