Operations | Monitoring | ITSM | DevOps | Cloud

July 2022

GigaOm, Again Names Broadcom Leader in Radar Report for Network Observability, 2022

Download your complimentary copy of the 2022 GigaOm Radar Report For Network Observability here. As the 2022 GigaOm Radar Report for Network Observability states, "Network observability is a category of platforms and tools that go beyond device-centric network monitoring to provide truly relevant, end-to-end visibility and intelligence for all the traffic in your network, whether on-premises, in the cloud, or anywhere else.".

How intelligent Automation helps in simplifying the customer service experience?

When running a business, the most crucial aspect for any entrepreneur or organization is to provide an exceptional customer experience (CX) and grow the business efficiently. Not only designing the best product or services but also a lot of things that an organization needs to take care of for delivering quality CX. In today’s digital world, customer retention is as necessary as customer acquisition, and organizations are working towards this path.

How to Scale with DX UIM's Monitoring Configuration Service, Part 2: Key Concepts

To contend with their escalating, intensifying demands, today’s operations teams must constantly be on the quest to boost efficiency. In my prior post, I offered a high-level introduction to DX Unified Infrastructure Management (DX UIM) Monitoring Configuration Service (MCS), outlining how its key features can significantly streamline administration in large-scale enterprise environments. In this follow up post, I’ll provide more details for teams looking to start working with MCS.

Looking Beyond SNMP

In a previous blog post, we dove into the wayback machine and looked at Simple Network Management Protocol (SNMP) Traps – a technology that allows devices (including network devices) to send alerts when specific thresholds have been reached. In this post, we are going to be a bit more forward looking and discuss some technologies that will, in theory, replace SNMP. It is important to keep in mind that the demise of SNMP has been predicted for years (actually decades).

Hybrid Network Triage for the New Enterprise Network

We all know that cloud and SaaS adoption continues to grow rapidly, often outpacing budgets. In fact, spending on IaaS and SaaS exceeded budgets in more than 40% of organizations in 2021. As a result, network traffic is now spending much more time on the internet than in our own data centers. The internet has become the new enterprise network.

Network as Code Explained: How Ansible & Automation Support Agile Infrastructure

When considering application source code, the way you maintain consistency throughout environments is mostly straightforward. You write application code, commit it to source control, and then build, test and deploy via a CI/CD pipeline. Since the application is defined by the source code living in source control, the build will be identical in all environments to which it’s deployed. But what about the infrastructure on which an application runs?

5 Reasons to Add Network Monitoring to Your Budget

For many companies, the beginning of October is also the beginning of the fourth and final quarter of the fiscal year. In IT, it’s a time to prepare for the new year by defining our priorities and setting our budget. COVID-19 threw a wrench into all of our 2020 plans last year and a lot has changed since then. But one thing that hasn’t changed is the need for a network monitoring system in your software stack.

Optimizing Security and Digital Experiences: Why User Experience Monitoring is Key

For just about any organization, there’s a balance that has to be struck between absolute security and absolute convenience. Seemingly, every new innovation that increases convenience also introduces new risks. On the other hand, every safeguard instituted can also create complexity, delays, or in some other way diminish the user experience. Either way, businesses are exposed, whether to the catastrophic consequences of breaches, or of an erosion of user productivity and customer retention.

Extending Visibility Beyond the Edge | Discovering Observability: Session 3

Success! Hybrid Cloud Observability is installed and running, but you’re still struggling to get that “single-pane-of-glass” experience between your on-premises infrastructure and cloud services. Managing two systems—even if they’re running the same software—is an unnecessary burden and we’re here to help you with the next steps. This session is about connecting your data between Hybrid Cloud Observability and SolarWinds-as-a-Service for combined insights and increased visibility.

Key metrics for monitoring Cilium

Cilium is a Container Network Interface (CNI) for securing and load-balancing network traffic in your Kubernetes environment. As a CNI provider, Cilium extends the orchestrator’s existing network capabilities by giving teams more control over how they build their applications and monitor traffic. For example, vanilla Kubernetes installations typically rely on traditional firewalls and Linux-based network utilities like iptables to filter pod-to-pod traffic by an IP address or port.

Monitor Cilium and Kubernetes performance with Hubble

In Part 1, we looked at some key metrics for monitoring the health and performance of your Cilium-managed Kubernetes clusters and network. In this post, we’ll look at how Hubble enables you to visualize network traffic via a CLI and user interface. But first, we’ll briefly look at Hubble’s underlying infrastructure and how it provides visibility into your environment.

Preserve Stick Table Data When Reloading HAProxy

With HAProxy situated in front of their servers, many people leverage it as a frontline component for enabling extra security and observability for their networks. HAProxy provides a way to monitor the number of TCP connections, the rate of HTTP requests, the number of application errors and the like, which you can use to detect anomalous behavior, enforce rate limits, and catch application-related problems early.

Operationalizing Experience in the New Enterprise Network

With the latest release of our network monitoring and digital experience monitoring software, we are proud to introduce an industry-first Experience-Driven NetOps solution, taking network visibility to the new enterprise network, expanding beyond the network edge to ISP and cloud providers. The DX NetOps 22.2 release will enable teams to operationalize the new enterprise network, focus on user experience, and avoid chasing utilization spikes.

What is User Datagram Protocol (UDP)?

One of the easiest transport layer protocols available in the TCP/IP protocol suite is the User Datagram Protocol (UDP). The communication mechanism involved is minimal. With UDP, neither the receiver nor the sender receives any acknowledgements of packets received. This protocol's shortcoming makes it unreliable and easier to process than many other protocols. Although UDP is considered an unreliable transport protocol, it uses IP services to ensure the best attempts are made to deliver data.

Agent vs Agentless Monitoring: Which is Best?

Agent-based and agentless monitoring are the two main approaches network monitoring tools use to capture and report data from network devices. As the names suggest, the difference between the two is pretty simple: someone has to install extra software(the agent) for agent-based monitoring to work. But, that doesn’t explain why an IT team or an MSP would choose agent-based or agentless monitoring.

Best Practice Series: Securing the Monitoring System

Network security makes the headlines at least once per day – and usually for the wrong reasons. In today's world, ensuring and maintaining a secure deployment is of utmost importance. Did you know that WhatsUp Gold provides several important security features that you can configure and manage to maintain a secure deployment? These features can help you to defend against unauthorized access to the WhatsUp Gold server as well as to devices monitored by WhatsUp Gold.

IPv4 vs IPv6 - What are the Differences?

An IP (Internet Protocol) address is a numerical label which is used for addressing he location and identification of the network interface for the devices connected to the computer network. The most used and popular IP version is IPv4 which uses 32-bit for IP addresses. Since the IPv4 became popular and the IPv4 addresses are getting depleted, Ipv6 is now used which uses 128-bit for the IP addresses.

How to Scale with DX UIM's Monitoring Configuration Service, Part 1: Introduction

For today’s IT operations teams, the stakes keep getting higher and demands only intensify. The services these teams are responsible for managing play an increasingly critical role in the prospects of the business, which means optimizing service levels is an absolute imperative. Meanwhile, the environments in play only seem to keep getting larger, more complex, and more dynamic. Given these factors, monitoring is a task that keeps getting more vital and more difficult.

Announcing HAProxy Data Plane API 2.6

In HAProxy Data Plane API version 2.6, we continued the effort of expanding support for HAProxy configuration keywords, as this has been the priority with this release cycle, and it will be in the next one too to meet our goal of achieving complete feature parity with both the HAProxy configuration and Runtime API. This will enable you to use HAProxy Data Plane API for configuring HAProxy without any gaps in functionality.

Phil Gervasi on Network Observability and Cisco Live | Network AF Episode 20

Phil Gervasi, Kentik's Head of Technical Evangelism stops by Network AF today to speak with host Avi Freedman about all things network observability and to recap their experiences at Cisco Live. Phil was a network engineer for 15 years before switching to marketing and finding his way into technical evangelism. In this conversation the two focus on building a foundation for data mining and collecting information that could better inform network intelligence and insights from observability platforms like Kentik.

Voice Network Fraud: How to Fight Back with Automated Threat Prevention

Telecommunications fraud is estimated to be a $39 billion a year problem according to the Communications Fraud Control Association. Despite that, less than 50% of enterprises* have implemented any sort of strategy to address fraud in their voice infrastructure. Firewalls and SBCs are not enough to provide a secure voice network. Enterprises need a more complete approach to network security—one that encompasses the unique vulnerabilities of real-time communications systems—to preempt issues and protect the organization as a whole.

A deeper dive into the Rogers outage

Beginning at 8:44 UTC (4:44am EDT) on July 8, 2022, Canadian telecommunications giant Rogers Communications suffered a catastrophic outage taking down nearly all services for its 11 million customers in what is arguably the largest internet outage in Canadian history. Internet services began to return after 15 hours of downtime and were still being restored throughout the following day.

Infovista announces availability of Ativa Automated Assurance and Operations suite with catalog of use case-based solutions

Cloud-native by design, Ativa™ suite enables CSPs and enterprises to automate 5G slicing operations, IoT, voice, broadband, enterprise services across digital experiences, apps, services, networks and infrastructure.

SCP Port: Secure Copy Protocol Definition & Examples

The SCP port has proven to be a very useful tool for SysAdmins. In short, the Secure Copy Protocol (SCP) is a method for securely transferring computer files between a local host and a remote host, or between two remote hosts. It is based on the Secure Shell (SSH) protocol. In other words, SCP servers help you transfer files to and from servers, computers, and other networking devices using a secure SSH tunnel.

What is Network Bandwidth? How to Measure and Optimize Bandwidth for Fast, Smooth Traffic Flows

Many think they know what network bandwidth is but conflate performance with capacity. This blog, among other things, will end that confusion. And for true IT experts, we’ll dive deep into the whys and wherefores of network bandwidth monitoring and optimization.

Investigating digital experience with Synthetic Transaction Monitoring

Kentik Synthetics is all about proactively testing and monitoring specific elements of your network, the services it relies on, and the applications it delivers. That means using artificial traffic instead of end-user traffic to test a variety of aspects of digital experience monitoring like device availability, DNS activity, web application page load times, and BGP activity. But to test an end-user’s experience interacting with a website, we need to approach things differently.

Proactive Healthcare Network Monitoring: The Importance of Early Detection

Healthcare IT is simultaneously one of the most complex and sensitive networking systems there are. Aside from the wealth of confidential data they process and store, these networks must be highly available to support life-saving procedures and diagnostics programs. This makes proactive healthcare network monitoring—staying ahead of little issues before they become emergencies—an absolute necessity.

Network Performance Monitoring vs. Application Performance Monitoring: What's The Difference?

Network performance monitoring (NPM) and application performance monitoring (APM) are both key pillars of an overall performance and reliability management strategy, especially when dealing with complex, distributed infrastructure across cloud-native environments. NPM and APM also complement each other, in the sense that NPM can serve as an additional source of truth and observability for application performance.

What Is a NOC?

NOC (Network Operations Center) is responsible for monitoring and managing the entire IT infrastructure 24/7. It manages servers, routers, firewalls, VPN gateways, switches and any devices used by an organization. The staff working at a NOC alerts the IT staff when it observes anything untoward or out of place with all this equipment. They perform routine maintenance tasks like updating software patches, rebooting systems and installing new firmware.

Multi-cloud connectivity tips: Transferring data between cloud regions

When it comes to multi-cloud, it’s easy to assume that the biggest connectivity challenge facing network professionals would be connecting between different cloud providers. But actually moving data between different geographic instances of the same cloud platform is not as straightforward as you might think.

12 Best VPN Providers You Should Consider in 2022

VPNs (Virtual Private Networks) aren’t new. They’ve been around for almost three decades and are used by practically every organization and individual who pays attention to data privacy. But the kind of benefit every user derives from a VPN may differ. While some may use it simply to protect their confidential data when browsing the internet, others may use it to escape data throttling. After all, a VPN can help you break the bandwidth barriers your ISP imposes on you.

Network Redundancy and Why It Matters

Network redundancy is process of providing multiple paths for traffic, so that data can keep flowing even in the event of a failure. Put simply: more redundancy equals more reliability. It also helps with distributed site management. The idea is that if one device fails, another can automatically take over. By adding a little bit of complexity, we reduce the probability that a failure will take the network down. But complexity is also an enemy to reliability.

What is Transmission Control Protocol (TCP) and How it works?

The Transmission Control Protocol provides reliable, ordered and, sometimes, time-sensitive data flow between applications across a network. As well as economizes network use by attempting to improve error-handling capability and providing reliable data transmission. The Transmission Control Protocol is the underlying communication protocol for a wide variety of applications, including web servers and websites, email applications, FTP and peer-to-peer apps.

Synthetic Transaction Monitoring with Kentik

What is synthetic transaction monitoring and how is it beneficial? Phil Gervasi and Sunil Kodiyan talk STM, how it works, what problems you can solve with it, and how it fits into an overall digital experience monitoring strategy. Learn how synthetic transaction monitoring can be used to test and track application performance from an end-user perspective, in this short talk and technical demonstration.

Expert Series: Broadcom IT Shares Their View on the Difference Between Monitoring and Monitoring Correctly

This post is part of a series featuring customers, partners, and experienced DX Unified Infrastructure Management (DX UIM) practitioners. We’ve asked these expert users to share their knowledge with the broader DX UIM community. Today, we’re featuring Kathy Solomon, the Unix Systems Administrator for the R&D Support organization within Broadcom IT.

Link Monitoring: A Comprehensive Guide to Network Optimization

Links are the plugs, sockets, cables, and electrical signals traveling through a network. Every link implies a function. At the hardware level, electronic signals activate functions; data are read, written, transmitted, received, checked for error, etc. At the software level, instructions activate the hardware (access methods, data link protocols, etc.). At higher levels, the data transferred or transmitted may request functions to be performed (client/ server, program-to-program, etc.).

Internet traffic and current events with Doug Madory | Network AF Episode 19

Network AF welcomes Doug Madory back to the podcast to discuss current events, including Russia invading Ukraine, and recent internet-related issues in Syria and Egypt. Doug is Kentik's Director of Internet Analysis, and uses BGP and traffic data to write about happenings with networks on a worldwide scale. Together with Kentik CEO and show host Avi Freedman, the two dive into the real-world implication of geopolitical events on the state of networking.

Get To Know N-able N-sight, the Complete RMM

Senior Product Manager, Brian Mackie explains the deep features and impactful benefits of N-able's evolved RMM solution, N-sight. Hear how this flexible, scalable solution gets you started quickly by incorporating fast remote access, simple ticketing and billing, automation, and more, simply and securely across a wide range of devices and operating systems.

Regex 101 for Network Admins

Regex—short for regular expressions—is a way to describe a search pattern. They can be used to find a text pattern or string (character sequence) within a larger body of text, such as a sentence or paragraph, but even entire documents and databases. They can be used to quickly find specific text in a text document like a configuration file for a network device. Need to know what IP addresses a device has? What VLANs are on a switch? What devices are using a deprecated DNS server?