Operations | Monitoring | ITSM | DevOps | Cloud

May 2022

Announcing HAProxy 2.6

HAProxy 2.6 is now available! As always, the community behind HAProxy made it possible to bring the enhancements in this release. Whether developing new functionality, fixing issues, writing documentation, QA testing, hosting CI environments, or submitting bug reports, members of our community continue to drive the project forward. If you’d like to join the effort, you can find us on GitHub, Slack, Discourse, and the HAProxy mailing list.

What is RMM? The Importance of Network Management

Remote monitoring and management (RMM) is software with a pretty simple mission: save IT pros time and effort. How? Instead of waiting for a user to report an issue, an RMM lets you automate responses and gain insights that can reduce issues down the road. Now, there are plenty of other software tools you could use to make life easier, and to be clear, RMMs aren’t the right tool for every job.

6 must-have features in network configuration management

Network configuration management is a function that comprises assortment, monitoring and storage of information about every component that forms a network. The true purpose of such a solution is to come alive in time of any eventuality; it could be the need to update, upgrade, recover or could even be disaster management. The solution will provide all pertinent information at the hands of the IT operations team, enabling them to decide the course of action going forward.

3 Cost Considerations For Your Multi-Cloud Environment

A multi-cloud strategy has become the status quo for many organisations. It provides access to the broadest range of cloud services and best-of-breed technologies, along with a reduced risk of vendor lock-in. As a result, most organisations will use a number of the most popular service options alongside more niche or localised offerings.

The 5 Levels of MSP Operational Maturity

Paul Dippell is the co-founder and CEO of Service Leadership, Inc., a company that measures IT and managed service provider (MSP) performance across the industry and annually publishes the results as the Service Leadership Index®. In this interview, we ask about his work using operational maturity in benchmarking managed service providers.

How to Troubleshoot Routing Problems

Routing problems tend to emerge when you’re first setting up a new piece of network equipment, and when something has failed. Usually, routing problems are caused by some sort of configuration or design error. Troubleshooting routing problems is tricky because the usual tools like ping and traceroute don’t always tell you what you need to know.

Network Fault Monitoring vs. Network Performance Monitoring

Every IT administrator knows that users typically complain of two things: the network doesn’t work or it’s slow. When your network isn't working, it’s usually because something is down and we can rely on Network Fault Monitoring tools to notify us. But where do we start when users complain of poor performance? And what tools are available to help us? In these situations, Network Performance Monitoring tools might be just what you need.

Charting a Course to Clearer Visibility | Discovering Observability: Session 1

As a monitoring professional, you’re responsible for tracking the elements in your infrastructure – regardless of where they live. You have the metrics, you’re collecting the logs, and you’re tracing the most important business processes, so you already have the critical parts required for true infrastructure visibility. But correlating the data, detecting anomalies, and being informed when things go awry is the challenge. Knowing a value is outside a threshold is great, but does that constitute a problem? Thankfully, SolarWinds® Hybrid Cloud Observability is here to give you that next level of insight.

How to Prepare for Peering Partner Business Review

Peering is more than just setting up sessions with any AS that will accept one. Peering can involve long-term relationships that require reviews and joint planning to grow synergy. A critical milestone in any peering relationship is the business review; and when it comes to business reviews, it’s all about preparation. Learn how Kentik can help you get ready to ace business reviews with peering partners. What you’ll learn.

NGINX Logging Configuration: How to View and Analyze Access and Error Logs

NGINX is one of the most widely used reverse proxy servers, web servers, and load balancers. It has capabilities like TLS offloading, can do health checks for backends, and offers support for HTTP2, gRPC, WebSocket, and most TCP-based protocols. When running a tool like NGINX, which generally sits in front of your applications, it’s important to understand how to debug issues. And because you need to see the logs, you have to understand the different NGINX logging mechanisms.

A Layman's Guide To HTTP/2

HTTP stands for Hypertext Transfer Protocol and is the backbone of the World Wide Web. HTTP/2 is the second major version of the HTTP protocol, which offers a performance improvement over its prototype. The new protocol has been in development for a long time, with the first draft published in 2012 and it was finalized in 2015. In recent times, HTTP is the obligation that boards almost all of the networks.

Round-Trip Time (RTT) - An Overview

A notable tool that renders the fortune of a web is Round Trip Time, which is also known as Round Delay Time. The time taken for a network request for a data packet and the flourishing of that data is the round trip time. The duration of RTT is calculated in milliseconds. RTT can be diagnosed and prompted by pinging a specific address. The time takes for an internet request to hit a destination and to lapse back to the primary resource.

From Baud to Awed: The History of the Modem

From 300 baud to multiple gigabits per second, it’s time to celebrate the history of the modem. It occurs to me that we will soon be entering a period where no one will remember the ear-shredding screech of a dial-up modem connecting their computers to the internet—all the while hoping no one picks up the phone and wrecks it. The humble modem is, at least as a device sitting on your desk alongside your computer, largely consigned to history—and more than a few recycling centers.

5 Executive Blindspots Around Hybrid IT Observability

For tech leaders, staying on top of hybrid and multi-cloud complexity with traditional monitoring tools is not easy task -- and can create distinct visibility gaps across your environments. SolarWinds Hybrid Cloud Observability can help put you on the path to better business outcomes.
Featured Post

Network topology software for your enterprise networks

Every network has a topology. It is the task of the network admin to discover and build upon it. So it's vitally important you have an extremely detailed understanding of your network topology. A network topology diagram graphically depicts the devices, connections, and paths of a network so you can see how the different components interact and communicate with one another. A network topology diagram is essential for creating and managing a network. Without it, even basic troubleshooting can become unnecessarily difficult.

Top Things To Consider When Connecting IoT Devices To The Cloud

Use cases for the Internet of Things (IoT) range from trucks, to shipping containers, to people, to cows. An organisation’s assets can be mobile, autonomous, even sentient - and the applications for tracking these assets are as limitless as the assets themselves. Analysts have identified asset tracking as the fastest growing industrial IoT market and it is expected that most connected devices will be location aware within the next decade.

Winning Over the Skeptics: How SD-WAN Is Transforming Government Networks

Are software-defined wide area networks (SD-WANs) worth the hype? Read below as our own Brandon Shopp details the value of this fast up-and-coming technology and how it can help. Public sector wide-area networks (WANs) are undergoing a transformation. The pressing need to support remote workers and a surge in demand for video conferencing, secure remote access, and cloud applications has seen public sector IT teams shift gears away from traditional, often multi-protocol label switching (MPLS)-based WANs.

Using Brotli Compression in NGINX

Brotli is gaining steam as the compression algorithm du jour for high performance websites. Created back in 2013 by Google to decrease the size of WOFF files, Brotli was standardized in 2016 as part of RFC 7932. The sales pitch for Brotli is better compression than Gzip - with similar CPU usage. Better compression leads to faster performance, but how much better is it?

Use the Proxy Protocol to Preserve a Client's IP Address

In this blog post, you’ll learn how the Proxy Protocol preserves a client’s IP address when that client’s connection passes through a proxy. You will also find resources for how to integrate the protocol into your own proxy or web server software. What is the Proxy Protocol? It is a network protocol for preserving a client’s IP address when the client’s TCP connection passes through a proxy.

Application connectivity in a hybrid cloud

A successful hybrid cloud architecture is one that addresses how to build, deploy, manage and connect a hybrid mix of applications across a hybrid infrastructure environment. These applications will span multiple infrastructure footprints—across cloud providers and customer datacenters and multiple Kubernetes clusters, as well as systems that run on vendor management systems (VMSs), bare metal and edge environments.

The 6 Fundamental Steps in a Network Monitoring Process

Network monitoring is vital for operating an IT environment at optimal performance. As a result, organizations can improve operational efficiencies with a well-managed network while proactively maintaining a secure network. While remote work has made the network monitoring process more challenging, new cloud-based tools have extended IT teams' reach into home and remote offices to ensure employees are secure and productive.

Top 5 Reasons for "Why AppNeta?"

AppNeta by Broadcom Software is a SaaS platform that enables large enterprises to gain visibility into their business-critical applications as experienced from remote offices and to understand how the networks that drive them operate. Because of our network focus we often get compared to traditional monitoring solutions, but with a quick overview it should be easy to explain to others in your organization how we differentiate.

How AppNeta Drives Business Value

While network and application performance grow increasingly business critical, IT’s ability to track and control service levels continues to be diminished. The shift to hybrid and remote work means users are now highly reliant upon public internet connections, which require additional security at the network edge. Plus, the majority of apps, internal or external, are now cloud hosted.

VLAN monitoring in OpManager

A local area network, what we know more commonly as a LAN, is a network that comprises devices based out of the same geographic location, enabling communication between them. The virtual counterpart of a LAN is a virtual LAN, or VLAN. A VLAN augments a LAN, offering flexibility in making changes, higher scalability, and better security.

2022 Unified NetOps Explainer Video

We continue to unify the DX NetOps platform built-on decades of expertise in the network monitoring space along with best-of-breed components you have used to manage the performance of your networks for years. As we welcomed AppNeta into the Broadcom Software NetOps family in 2022, we expanded our monitoring coverage into unmanaged networks like ISP, Cloud and SaaS environments.

Monitoring Azure and Your Entire Hybrid Infrastructure with DX UIM

While you often read about the move to “the cloud,” the reality is that most organizations aren’t moving to a single cloud, but multiple cloud environments from multiple providers. There can be a range of reasons for companies to use cloud services from more than one provider today.

Digitalization Is Key To Competing In This New Era Of Customer Experience

Customer experience (CX) is becoming an increasingly strategic part of any company’s brand as businesses become more customer-centric. And thanks to technologies that give customers more options than ever, right at their fingertips, consumers expect a flawless CX, anytime and anywhere, regardless of medium. In other words, customer retention and satisfaction is intertwined with CX.

Top 7 Key Features Your Network Monitoring Software Should Have

With the covid-19 pandemic, the demand for broadband communication services has soared and experienced a 60% increase in internet traffic compared to before the crisis However, with prolonged times spent at our homes during the lockdown, continuous network connectivity has become the need of the hour for the entire world.

How New Relic uses Kentik for network observability

New Relic is known for empowering the world’s leading engineering teams to deliver great software performance and reliability. And the network that delivers that service to New Relic’s users plays a critical role. Hiccups in the performance of the network between New Relic’s mission-critical service and their users can create a cascade of problems.

Enable Sticky Sessions in HAProxy

HyperText Transfer Protocol (HTTP), the protocol that defines the language browsers use to communicate with web servers, is stateless, meaning that after you make a web request and a server sends back a response, no memory of that interaction remains. To make anything more sophisticated than a static web page work, websites need other ways to remember previous interactions with users.

Securing SD-WAN in a Cloudy World

Today’s cloud-first enterprise must securely connect their workers to their applications, no matter where their applications may live. Only by transforming both the WAN edge and security architectures can the full promise of the cloud be fully realized. SD-WAN is your opportunity to re-architect, design and build a network that’s secure and fit for the future. Teneo Inc. and Silver Peak can help to make this a clear reality in our cloudy world.

How to prepare for a peering-partner business review

Peering is more than just setting up sessions with any AS that will accept one. Peering can involve long-term relationships that require reviews and joint-planning to grow synergy. A critical milestone in any peering relationship is the business review – and when it comes to business reviews, it’s all about preparation. So where to start?

Taking The Power Of Automation To The Edge

In this blog, Divesh Gupta, VP of New Technology & Sales Operations at Console Connect, and Co-Chair of MEF’s Test & Certification Committee, shares his insights on the work Console Connect is doing behind-the-scenes to extend our automation capabilities to the network edge. Service providers across the world now find themselves at different stages of their automation journey.

Supercharge Your SBC Call Detail Records

As Teams Phone becomes the norm in the Enterprise space, managing the quality of service delivery and user satisfaction, whether it’s cloud or connected to the PSTN, is mission critical. Teams PSTN calls are used for just about every type of meeting as well as for Contact Centers, Customer service, town halls and client pitches. Because of this ubiquitous usage, Enterprise IT needs analytics to understand how this service is performing for users and when problems are occurring.

Updates Paused: How are MSPs Navigating Today's Supply Chain Issues?

The last few years have thrown about everything they could at the status quo. Shifting climates, political instability, and a global pandemic have all contributed to a broad host of network device supply chain issues. Consumers all over the globe are still affected by computer chip shortages and many other items delayed by supply chain issues. And it’s not expected to end anytime soon.

Automation and transformation in IT infrastructure with Jordan Lowe

Co-founder and CEO of Deft, Jordan Lowe stops by Network AF to talk to host Avi Freedman about all things IT infrastructure. Previously known as ServerCentral, Deft continues to innovate on its services to make managing IT infrastructure a better experience for the business and those who run it.

Experience-Driven NetOps from Broadcom Software

Experience-Driven NetOps from Broadcom Software delivers the unified end-to-end network visibility needed to understand, manage and optimize the performance of your digital services - on whatever network they may be running on. The solution extends your monitoring reach into edge services, multi-cloud and SaaS, home wireless and ISP networks, letting you see every communication path and degradation point for the entire end-user experience.

Kubernetes Networking: How to monitor Kubernetes using synthetic testing

Kubernetes enables DevOps efficiency by streamlining application and service deployment and management. While this gives greater control, it also makes it harder to monitor the health of the applications and services. Synthetic monitoring simulates network conditions and user actions by running continuous tests from global locations before adverse conditions impact end users. What you’ll learn.

AWS NAT Gateway Pricing: How To Reduce Your Costs In 5 Steps

We are often asked about areas where customers overspend on Amazon Web Services (AWS). NAT gateway costs are high due to misplaced data transfers and are definitely near the top of our list. This article will walk you through five steps you can take to find out which data transfers you’re overspending on and how you can eliminate those excess charges.

Flowmon and WhatsUp Gold: Automatic Threat Detection Through Single Pane of Glass

Network Detection & Response (NDR) is a key element that provides an additional level of security across the company wide network through detection of threats that bypass traditional security measures and materialize in the company’s digital environment. Progress Flowmon ADS (Anomaly Detection System) is a typical representative of an NDR system that combines various detection techniques to ensure that malicious activity is recognized and flagged as a security incident.

Using synthetics to get the big picture

Nobody actually cares about the network. Provocative words coming from a network visibility company, you might be thinking. However, consider what you’re doing right now. You’re reading a blog on a website, maybe clicking around other tabs, possibly streaming some music, and likely keeping an eye on your work chat. These are all applications, and that’s what we all truly care about, not the plumbing that delivers them.

The value of performance mesh testing for ISPs, CDNs, telcos and cloud service providers

As a network service provider, you want your customer to see that you consistently deliver excellent performance. You send your customers periodic reports — but those only provide a snapshot. With synthetic tests, you can present your customers with a dynamic report through a public web page, linkshare or a customer branded portal. Watch this webinar replay to learn how Kentik’s API can be used with network performance meshes in Kentik's synthetic monitoring solution to build a live latency report. Kentik’s Anil Murty and Martin Machacek will show you.

Subnet Masking Cheat Sheet: A Beginner's Guide to Subnetting

Network engineers are constantly looking for ways to improve the security and efficiency of their IT networks. High latency can affect the user experience and security measures can have costly impacts on the organization. And splitting the organization’s assets into different networks instead of one single large network achieves this. It reduces network collisions and computing demands from the devices and improves efficiency and improves the user experience.

Compliance And The Cloud

Having achieved almost consumer-grade accessibility, public cloud adoption is increasingly driven by individual business functions. Enterprise teams no longer need to understand how the technology works, or even where the service operates from. To buy a cloud product they just need a web browser and a credit card. But this level of simplicity raises challenges of its own when it comes to regulatory concerns.

Looming 2022 (and Beyond) Network Security Threats

Every year hackers grow in numbers, aggressiveness, organization, and sophistication. And every year there are new attack types and new areas of IT infrastructure that cybercriminals target. 2022 is no different. We are about a third of the way in already and IT pros and security specialists already have their hands full with new attacks and new issues.

How to Import/Export Orion Custom Query Widgets

Advanced Orion Platform users are familiar with the power of the Custom Query widget, but getting started can be difficult. Thankfully, you can download pre-existing widgets directly from THWACK to get you started. Then, after you've crafted some of your own, you can return the love and share yours with the community.

The MSP Provider's Guide to Getting Hired

In the years that I’ve worked with large technology vendors and an MSP provider, there were a few common denominators between the ones that were successful. Partners that were consistently at the top of the food chain were the ones consistently providing value to their customers in some area other than just one specific product or service that was being offered.
Sponsored Post

WiFi Observability to Boost Employee Digital Experience

We are all moving towards a digital workplace - or a hybrid work scenario. Whatever be the case, you can expect end-users to call and complain about a poor WiFi experience. That's because network monitoring needs to be done from their standpoint, not from the enterprise end. And without the correct WiFi observability data, it's challenging to narrow down the root cause of the problem affecting remote employees. And those problems - poor WiFi performance leading to poor digital experience - can be pervasive and persistent.

5 Executive Blindspots Around Hybrid IT Observability

For tech leaders, staying on top of hybrid and multi-cloud complexity with traditional monitoring tools is not easy task -- and can create distinct visibility gaps across your environments. SolarWinds Hybrid Cloud Observability can help put you on the path to better business outcomes.