Operations | Monitoring | ITSM | DevOps | Cloud

January 2021

Connect S.P.A. ups its network performance management game with OpManager!

Connect S.P.A. is a European IT company offering services in networking, wireless, security, monitoring, data center, and servers. It has two data centers and nine servers. Before finding OpManager, the IT company was using a network monitoring tool, but it did not offer enough visibility into its network, which made it difficult to troubleshoot and fix recurrent network issues. This led to unpleasant network downtime experiences, especially since the tool Connect S.P.A.

Why do you need to monitor VPNs?

A VPN connection comes in handy to establish a link between private servers and remote users. As a protected data path, the presence of the VPN tunnel paves the way for improved data security. Therefore, data transmissions between the network and device have the additional security of data encryption. But at the same time many inappropriate IPs can access your VPN, putting data security at stake. So, how do you deal with such situations? You definitely can’t stop using VPNs right.

Protect Servers with HAProxy Connection Limits and Queues

HAProxy connection limits and queues can help protect your servers and boost throughput when load balancing heavy amounts of traffic. When you use HAProxy as an API gateway in front of your services, it has the ability to protect those servers from traffic spikes. By utilizing connection limits and queues, you can ensure traffic flows through your network at an even pace.

10 Best Network Monitoring Tools for 2021

There are plenty of options for network monitoring tools today, and that can make it hard to pick the right one for you. Here, we’ll help you sort through your options by taking a look at the 10 best network monitoring tools available today, provide a crash course on network monitoring, and explain what you should look for in a network monitoring tool.

Delivering the "Interconnected Enterprise": Console Connect reveals how tech will drive business change in 2021

Console Connect & Applied Futurist study explores the enabling role of technology in creating frictionless interfaces, breaking down geographical barriers and accelerating the enterprise transition from monolith to ecosystem.

5 Best Network Management Software and Tools

With IT technology continuing to rapidly evolve, networks are becoming increasingly complicated, sophisticated, and sizable. The accelerating growth rate of network technology is caused in part by the increased adoption of IoT, the cloud, and software-defined networking. In this environment, where technology is advancing with overwhelming speed, enterprises must adapt and be agile enough to manage network configurations for all their connected devices.

Network Discovery Software: Pros & Cons for 2021

Our current networking environments are accelerating the pace of change. The job of the network manager has become more complicated. There are many more devices to manage. There are more users and more applications to go along with all these devices. This is where network discovery software comes in. While the Network Field Report 2021 shows the average workweek of IT professionals has decreased over the past five years, our knowledge of the network hasn’t improved.

Evolving Your IT Skills in a SaaS World

Why SaaS could make your IT skills irrelevant. Headlines like this are scary, right? Well, that article was from back in 2008. Do you feel irrelevant? No, you say? That’s what I thought… There’s no binary transition point when a skill becomes totally irrelevant. IT is always evolving. This shouldn’t be scary. Imagine if you hadn’t evolved your skills since 2000. Or 2010. What are the things you’d be behind on now?

What Is Interconnection And Why Is It So Important To Enterprises?

Enterprise network connectivity has evolved in line with changing business needs over the last few decades and as we saw with the sudden shift to remote working in 2020, the evolution cycle is speeding up in response to environmental change. This makes interconnection more important than ever to the modern enterprise.

Announcing HAProxy Kubernetes Ingress Controller 1.5

We’ve released version 1.5 of the HAProxy Kubernetes Ingress Controller. This version unlocks access to the raw HAProxy configuration language for power users to gain more control. You can also enable mutual TLS authentication between the ingress controller and services, enforce Basic authentication, and return custom error pages to users.

OpsRamp Gives a Boost to Netflow and UC Monitoring

The modern enterprise network is akin to the transcontinental railroad system in the United States in the early 20th century: it was far-reaching and commerce depended upon the reliability of the rail service connecting crucial goods with Americans in every town and city. Likewise, networks today are intrinsic to commerce (and daily life) yet they are entangled and multi-layered.

Network Monitoring Enhancements - VirtualMetric Presents New Product Capabilities

As a customer-focused company, which pays a lot of attention to its client’s needs and requests, while keeping pace with the market dynamics, VirtualMetric has always followed the approach of continuous product development. Our ongoing improvement process allows us to develop, test and release new features and product capabilities of your all-in-one monitoring software at short time intervals.

How Service Providers Can Improve Network Performance in a Post-Pandemic World with Traffic Engineering

One thing that 2020 has clearly shown us is that communications services is a basic and fundamental driver of our global economy. During the COVID-19 pandemic, we realized that many tasks can be done at home, if access to communications services is sufficient. Many of us can work from home or other locations outside of the traditional office; students do not have to be physically present at school to participate in lectures; and we don’t need to go to movie theaters watch a new film release.

Introducing IPHost mobile client

We are glad to introduce IPHost mobile app (currently available for Android 4.4 or newer). To start using Push notifications on your Android device(s), please upgrade your IPHost installation to v5.3 or later version. You would also need an Android mobile device running free IPHost mobile app. We have added a quick start reference for IPHost mobile app; it typically takes less than 5 minutes to install the app, connect it to the IPHost desktop installation and commence receiving Push notifications.

How to collect HAProxy metrics

This article is a full tutorial on HAProxy monitoring and the best tools to get it done right. We will be looking into how to collect HAProxy metrics using a collectd daemon, push them into Graphite and visualize them in Grafana. To follow the steps in this blog, sign up for the MetricFire free trial, where you can use Graphite and Grafana directly in our platform.

Network Security: The Journey from Chewiness to Zero Trust Networking

Network security has changed a lot over the years, it had to. From wide open infrastructures to tightly controlled environments, the standard practices of network security have grown more and more sophisticated. This post will take us back in time to look at the journey that a typical network has been on over the past 15+ years. From a wide open, “chewy” network, all the way to zero trust networking. Let’s get started.

Networks at Risk Due to Widespread Gaps in Basic Network Management Activities: Report

A significant portion of companies have vulnerabilities in their network management practices. These vulnerabilities include a lack of network visibility, configuration backups, proactive network planning, and up-to-date documentation. Despite these vulnerabilities, the majority of IT pros report high confidence in their networks, indicating a potential mismatch between perception and reality.

Five Network Considerations For Remote Working

Many businesses put temporary measures in place last year to support remote working. With the shift to remote working appearing more long-term, businesses are now starting to think more strategically about how their networks can support a virtual workforce. Here we look at five network considerations to support your virtual workforce…

Monitor datacenters and network devices with Datadog

Modern datacenters can contain thousands of network appliances, such as routers, switches, firewalls, and servers, so it’s important for your monitoring strategy to provide comprehensive visibility into every piece of your infrastructure. Datadog Network Device Monitoring already allows you to collect a wealth of telemetry from all of your SNMP-managed devices, which are automatically discovered by the Datadog Agent.

Ribbon Rural Solutions

Ribbon is Ready to Help with Rural Broadband RDOF Funding? Secure & Trusted Act? COVID-19 Relief? Whatever the case, Ribbon is Ready. Ribbon has over 30 years of experience working with regional operators helping deploy rural services and much more. We can help you not only deliver the latest services your customers need but do so efficiently, effectively, and get you the most return on your time and monetary investments.

Telecom Review Leaders' Summit 2020 Panel Discussion - Wholesale and Capacity

The 14th Telecom Review Leaders' Summit 2020 Panel Discussion – Wholesale and Capacity: Managing the Explosion of Data Traffic discussion covers how the wholesale and capacity industry played a major role amid COVID-19, the impact of the pandemic on data traffic, challenges brought about by COVID-19 and more.

Distributed Network Monitoring: What is it & What are the Benefits?

Many businesses are embracing remote offices and working from home, storing their data in the Cloud, and ditching centralized data infrastructures. With distributed architectures becoming the new normal, it’s important to have a distributed monitoring solution that can keep up.

6 Best Network Mapping Tools

IT software technology is advancing at a rapid pace, with the internet of things, cloud, automation, and machine learning making networks and network management activities more complex and interdependent. As networks grow and become more complicated, it’s increasingly important for administrators to have access to the tools necessary to conduct essential network monitoring and management operations. One such tool is a network mapper, also known as a network topology mapper.

Top Networking Monitoring Tools

Businesses rely on accurate network monitoring data because the network is the backbone of your IT infrastructure. Lacking the means to communicate internally or externally about your network can be a disastrous situation, especially if you provide digital goods or services. Network monitoring tools shouldn’t be a “nice to have” thing which may or may not make this year’s department budget.

Circuit Breaking in HAProxy

With HAProxy, you can implement a circuit breaker to protect services from widespread failure. Martin Fowler, who is famous for being one of the Gang of Four authors who wrote Design Patterns: Elements of Reusable Object-Oriented Software, hosts a website where he catalogues software design patterns. He defines the Circuit Breaker pattern like this: The basic idea behind the circuit breaker is very simple. You wrap a protected function call in a circuit breaker object, which monitors for failures.

AIOps from Broadcom 5-Minute Demo

In this short demo, Sudip Datta, Head of AIOps and Automation at Broadcom, shares the key capabilities and differentiators of Broadcom’s AIOps solution. AIOps from Broadcom helps organizations achieve operational excellence through full-stack observability coupled with AI/ML that applies across modern hybrid cloud as well as legacy environments. Uniquely it ties these insights with intelligent automation to improve customer experience.

4 Predictions About What's in Store for IT in 2021

If this past year has proven anything, it’s that making long-term predictions can be a challenge. After all, who would have predicted a large portion of the workforce would be fully remote and we’d be staying six feet away from each other in grocery stores for most of the year? Even though a curveball like COVID-19 could happen at any time, it doesn’t mean we should completely stop forecasting what things will look like in IT and beyond over the coming months.

Network Usage Visibility from the Free InfluxDB sFlow Monitoring Template

As business-critical applications increasingly rely on network services, even a minor change in network usage can impact network performance and reliability, thereby also impacting business functions and network maintenance costs. sFlow (short for “sampled flow”) — by providing unprecedented visibility into network usage and active routes of high-speed and complex networks — delivers the data needed to effectively control and manage network usage.

Case Study: How Railway Corporation Unleashed Economies of Scale with Motadata

Motadata enabled a railway corporation, with headquarters in Navi Mumbai, Maharashtra, under the brackets of Ministry of Railways to monitor, analyze and resolve IT operational issues to establish a centralized modern infrastructure in their project. The project is one of the India’s most ambitious railway projects that runs through coastal western India, linking Mumbai to the western region of Goa and Mangalore. It covers about 170 railway stations under its remit.

5 Ways To Align Your Business With The New Interconnected Enterprise Model

Enterprise operations are becoming increasingly complex ecosystems, involving new technologies, larger supply chains and more partners than ever before. In a new report called ‘Building Tomorrow’s Interconnected Enterprise’, Console Connect and Applied Futurist Tom Cheesewright present a new interconnected enterprise model for the ecosystem-based future, where successful organisations will operate as a complex web of interactions rather than a monolithic whole.

What are MAC addresses? What are they for and how to find them?

At the shadow of the widespread IP addresses, MAC addresses say even more about our devices than its more popular sister. As a kind of “identity document for network devices”, a MAC address informs us about “who is who” when connecting to a network. Of course, remember that the one called “MAC” has nothing to do with Macintosh computers. In fact, you can find it on devices of any brand.