Operations | Monitoring | ITSM | DevOps | Cloud

June 2023

How Kentik reduces the likelihood of a full-blown cyber-attack before it happens

Organizations are under constant attack, and it’s critical to reduce the time it takes to detect attacks to minimize their cost. This first article in our new security series dives deep into how Kentik helps customers before, during, and after a cyber attack.

Your Starter Guide to Using the HAProxy Lua Event Framework

In this article, we’ll take you on a quick tour of the new Lua event framework shipped with HAProxy 2.8—plus demonstrate how Lua helps you further customize HAProxy’s behavior. We’ll start with a brief, high-level overview of Lua and how HAProxy uses it. Next, we’ll introduce you to the Lua event framework, show you what you can do with it, and familiarize you with its mechanics.

SD-WAN Monitoring: Why Edge-to-Edge Coverage Isn't Enough

In recent years, network operations teams have had to contend with several critical challenges, including: In response to these challenges, teams are increasingly turning to SD-WAN. The market for SD-WAN is massive, and continuing to grow, potentially reaching $47 billion by 2031. Through SD-WAN technologies, organizations are able to realize a number of benefits. However, these benefits aren’t a sure thing. In fact, many teams encounter challenges with their SD-WAN implementations.

What is Network Traffic Analysis?

How much network traffic is received by a business in the United States on average? More specifically, how many gigabytes do you think it is? The numbers may surprise you. According to Statista, the average traffic received was nearly 200 BILLION gigabytes (178.21 billion GB). And it is expected to grow to 224.08 in 2023. Another interesting statistic involving traffic, with numbers provided by Broadband Search, is that users in America generate 3.1 million GBs per minute every minute.

Troubleshooting an Azure Load Balancer in Kentik Cloud

Achieve in-depth insight into your Azure Load Balancer performance with Kentik Cloud. This video demonstrates how to use Kentik's Data Explorer to filter and analyze Azure traffic, enabling you to evaluate your load balancer's effectiveness and investigate potential performance issues. Learn how to select and use various dimensions of enriched flow data and visualize the balance of traffic through your load balancer. Learn how Kentik can help answer critical performance questions within seconds, streamlining your troubleshooting process.

Azure Virtual WAN Observability with Kentik Cloud

Unravel the complexities of managing your corporate network in the cloud with Kentik Cloud. This video highlights how Kentik Cloud provides a comprehensive, always up-to-date visualization of your hybrid Azure infrastructure, including your Virtual WAN configuration. Learn how to quickly and easily navigate through your infrastructure's architectural blueprint, delve into the performance of specific VWAN hubs, and access vital utilization details. See how Kentik Cloud can help turn tedious troubleshooting into an efficient, user-friendly process. Experience firsthand the power and convenience of having crucial network insights right at your fingertips.

Optimize Azure Costs and Boost Network Performance with Kentik

Explore how Kentik's cloud network observability tools can enhance your Microsoft Azure experience. This video demonstrates how Kentik's rich insights can help you troubleshoot faster, optimize costs, and answer questions about your network across major public clouds. Watch a real-world example of how you can use Kentik to identify under-utilized Azure firewalls, consolidate VNets, and effectively reduce your cloud bill. Discover how Kentik's connectivity, device, utilization, and performance data combined with real-time analysis can fast-track problem-solving and optimize resources.

Azure Cost Attribution by Subscription with Kentik Cloud

Maximize your network efficiency and cost management with Kentik Cloud. This video shows how Kentik Cloud's custom dashboards enable you to identify the bandwidth usage associated with each Azure subscription. Learn how to accurately allocate Azure costs to individual teams or business units, and track usage-based performance issues directly to the source. Empower your organization by aligning your hybrid cloud networking with your business needs through the comprehensive insights provided by Kentik Cloud.

Troubleshooting an Azure ExpressRoute with Kentik Cloud

Learn how to effectively troubleshoot your Azure ExpressRoutes using Kentik Cloud. This video offers a step-by-step walkthrough on diagnosing problems and obtaining crucial information on your ExpressRoute traffic, including instance name, application context, and the ExpressRoute circuit name. Uncover how to filter and visualize data to see the usage of your ExpressRoutes and identify potential problems. From monitoring dropped packets to inspecting ExpressRoute metadata, see how Kentik can provide you with a wealth of real-time information to help resolve issues quickly and efficiently.

Putting the Network in Observability

With the accelerating use of DevOps and cloud-native infrastructure, observability is all the rage. Organizations, large and small, are doing their best to make sense of the logs, metrics and traces generated by their applications to identify performance and availability issues. But what about the network? It seems that many organizations forgot that network telemetry has always been the foundation of any monitoring initiative relating to performance, security, or availability. In this Techstrong Learning Experience, Techstrong Research GM Mike Rothman is joined by Phil Gervasi and Rosalind Whitley from Kentik to discuss how network observability adds depth and context to any APM or security analysis environment. Mike also highlights data from a recent network observability survey done by Techstrong Research. In this learning experience, you’ll learn.

Network visibility makes all the difference! The key to Managed Service Providers to protecting your customer data

In a world where technology is ubiquitous, network security is of paramount importance. Every day that goes by, cybercrime evolves and becomes more sophisticated. They improve the materials of their balaclavas and spend more on incognito sunglasses. In 2015, the damage caused by cybercrime already cost the world 3 trillion dollars, since then the figure has only multiplied. No wonder companies are looking for ways to protect themselves against cyberattacks, don’t you think?

NetOps in Action: Fidelity National Information Services, Inc. (FIS)

Fidelity National Information Services, Inc. (FIS) is an American multinational corporation which offers a wide range of financial products and services. FIS is most known for its development of Financial Technology, or FinTech. FIS has a portfolio of products for the financial services sector, including both retail and investment banking. FIS global customers connect to services from FIS’s Little Rock, AR datacenter.

What is Packet Duplication & How to Identify It

Welcome, IT pros and network admins! Get ready to unravel the mysteries of packet duplication and equip yourself with the knowledge to identify and conquer it like a true tech-savvy champion. In the fast-paced digital landscape of modern businesses, every second counts. Imagine sending vital information across the vast network of the online world, only to discover that it's been duplicated along the way. It's like having two identical envelopes delivered to your doorstep when you were expecting just one!

Transformations in network technology

Over the past five years, enterprise networking has undergone a significant transformation driven by advancements in technology, the rise of cloud and SaaS applications, the decentralization of the workforce, and the need for agility, scalability, and cost mitigation. These factors have led organizations to shift from on-premise network management systems (NMS) to cloud-managed networking platforms and to adopt technologies like Software-Defined Wide Area Networking (SD-WAN).

Proxy server benefits for social media automation

In the XXI century, many companies and business-minded people had to follow and adapt to the revolutionary changes in the world of marketing. The emergence and rapid growth of the internet have slowly and surely shifted the attention from newspapers, radio, TV, and other forms of traditional media.

Tech Confessions - Ancient Artifacts

What was the ANCIENT SECRET hidden within one company’s IT estate? In this Tech Confession, hear how an entire payroll system was at the mercy of one admin’s “voodoo” techniques to provide payment via seriously antiquated hardware and software. What were the risks? Keeping the system cranking was a ticklish proposition: Accidentally running an OS update once put the productivity of the whole organization at risk. That was just one of the hazards of running a key process on a hidden device that was invisible to the network.

WhatsUp Gold 2023.0: Greater Transparency and Wider Access to Network Data

One of the greatest challenges for an IT team is visibility. How can you prove the value of your IT team’s accomplishments when no one can see what – or how well – you’re doing? Progress WhatsUp Gold release 2023.0, available as of June 21, 2023, is set to change that. This release includes several exciting updates meant to provide better data access to all.

Monitor network access with Twingate's offering in the Datadog Marketplace

Twingate is a network access platform that enables customers to deploy a zero trust authentication layer with their infrastructure as code (IAC) provider of choice. Using this model, you can program strict access control rules that can be updated and co-deployed alongside changes to your infrastructure. Each time a user establishes or closes a connection to a resource, Twingate documents the event with details such as the port, the volume of data transferred, and user identification.

Understanding Network Traffic Monitoring

Network traffic monitoring has become critical in today's digital age, where businesses rely on various applications and services to operate. As the amount of data transmitted over networks continues to grow exponentially, network administrators must keep a close eye on the traffic to ensure optimal network performance and security. Network administrators must have a deep understanding of packet flows, collection methods, and analytics to ensure that their networks are secure and performing optimally.

Applying Zero Trust to Data Centre Networks

Zero trust isn’t an approach that can be delivered by buying a single product that claims to provide it. Instead, it is an approach that needs to be understood and implemented in complementary ways across an organization’s IT systems. We recently hosted a webinar titled Applying Zero Trust to Data Centre Networks to provide guidance on how organizations can use zero trust to enhance the security of their IT systems. The webinar details are below, after a summary of the topics covered.

Ping Test for Network Connectivity: Simple How-To-Guide

Reliable network connectivity is paramount for uninterrupted communication and efficient data transmission. The ping test is a valuable tool to assess network connectivity, identify potential issues, and troubleshoot them effectively. If you're seeking to troubleshoot network issues or test connectivity between hosts, this comprehensive guide offers step-by-step instructions and valuable insights for performing an effective ping command test.

Protocol analyzer: What is it, and why does your organization need one?

IT admins are expected to keep the organization’s network reliable and resilient all while the complexity of today’s networks grows. From adopting hybrid infrastructures and maintaining multi-cloud environments’ security to managing ever-increasing bandwidth demands, enterprise network management is getting more difficult by day.

Top 5 cloud security risks

Cloud security is a constant concern and tends to revolve around common themes - how do you give intended users access to the data and systems their clearance allows, while maintaining a good user experience; and how do you keep unintended users or malicious bots out? In the entanglement of systems, services, and applications that make up a modern IT infrastructure, this is a lot harder to balance in practice than it is on paper.

FWaaS (Firewall as a Service): How to Monitor Your Traffic Through Cloud

Cybersecurity remains a key concern for any organization. The cost of cybercrime is expected to rise to $8 trillion in 2023 and reach $10.5 trillion by 2025. Various cybersecurity solutions are available, with Firewall as a Service (FWaaS) emerging as one of the most valuable assets when it comes to protecting your interests. We will investigate FWaaS solutions, how they work, how they're different from traditional firewalls, and what benefits they can provide for a range of organizations.

How to Identify Network Bottlenecks: From Snail Mail to Warp Speed

Welcome, network admins and IT pros, to a world where network bottlenecks become nothing more than a distant memory. In an era where the need for speed is paramount, identifying and eliminating network bottlenecks is the key to achieving warp-speed connectivity. Your network is like a bustling metropolis, with data zipping through its veins like cars on a busy highway. But suddenly, the flow slows down to a snail's pace, causing frustration and hindering productivity.

How to Diagnose Network Problems: The Ultimate Handbook

Welcome, network admins and IT pros, to "How to Diagnose Network Problems: The Ultimate Handbook." In the digital landscape where operational efficiency is paramount, a well-functioning network is vital to your enterprise's success. However, when network problems arise, it can be exasperating, leaving you stranded in a sea of connectivity challenges.

The Challenges of Switching from MPLS to Broadband

Let's start by simply stating that MPLS is arguably still the leading way to interconnect remote offices back to the company’s primary data centers. MPLS is also great for real-time traffic (like video conferencing). Yet even with those facts working in MPLS’s favor, its usage is dropping year after year. According to TeleGeography’s annual WAN Manager Survey, there was a 24% drop from 2019 to 2020 – and that trend hasn’t slowed down.

No, You Haven't Missed the Streaming Telemetry Bandwagon - Part 1

Streaming telemetry holds the promise of radically improving the reliability and performance of today’s complex network infrastructures, but it does come with caveats. In the first of a new series, Kentik CEO Avi Freedman covers streaming telemetry’s history and original development.

IPoDWDM: Simplify and Save!

IP over DWDM (IPoDWDM) can have a large impact on the total cost of ownership of a network. Disaggregating the transponder solution, and installing the Digital Coherent Optic (DCO) directly in the router can both simplify the design and provide significant cost savings. With the advent of ZR+ optics, and advances in silicon chip efficiency, IPoDWDM is poised to become the new standard.

What Is Jitter in Networking: The Network Jitterbug

Welcome, fellow business trailblazers, to a world where technology rules and networks connect us all. Today, we embark on a thrilling journey into the intriguing realm of networking, exploring one particular phenomenon that may have you shaking in your office chairs – Jitter! Now, you might be wondering, what on earth is Jitter? Is it some mystical force that disrupts our digital landscapes or a secret dance move reserved exclusively for the tech-savvy?

Catchpoint Internet Performance Monitoring (IPM) Capabilities for AIOps are now available in the BMC MarketZone program

The Catchpoint IPM solution enhances the BMC Helix Operations Management portfolio for Internet Resilience by providing complete visibility into the Internet stack across internal and external networks.

Monitoring Cisco NX OS metrics with Grafana

In this article, we will explore what Cisco NX OS is and what it is used for. You will find out what metrics are and why it is very important to monitor them. Then, we will look at how to monitor Cisco NX OS metrics with Grafana, a graphical data visualization tool, and how MetricFire can help us with this. In order to learn more about MetricFire, book a demo with our technical specialists or sign up for the MetricFire free trial today.

Use CIDR notation queries to filter your network traffic logs

Classless Inter-Domain Routing (CIDR) is the dominant IP addressing scheme in the modern web. By enabling network engineers to create subnets that encapsulate a set range of IP addresses, CIDR facilitates the flexible and efficient allocation of IPs in virtual private clouds (VPCs) and other networks.

Tanzu Application Platform on the Disconnected Edge

Kubernetes has become the de-facto platform for containerized applications. But it’s a fractured environment and each Kubernetes distribution has their own nuances. Further, much of today’s cloud native software design assumes a healthy Internet connection, which is not always available. What’s missing is a standardized way to deliver applications on top of any Kubernetes, without an Internet connection (also known as air-gapped deployments).

DIY SD-WAN vs. Managed SD-WAN

Software-Defined Wide Area Network (SD-WAN) is a network architecture that provides organizations with a flexible, secure, and cost-effective way to manage their networks. SD-WAN technology abstracts the underlying network and provides an intelligent layer of abstraction, making it possible to manage network traffic and dynamically control the flow of data. SD-WAN technology is an attractive option for organizations looking to improve the performance and security of their networks.

What is TTFB? | Time to first Byte Explained

This video delves into the crucial topic of Time to First Byte (TTFB). Time to First Byte is a vital metric that measures the duration it takes for a user's browser to receive the first byte of data from a web server. By understanding TTFB, you gain valuable insights into the responsiveness and efficiency of your website. Sematext's monitoring tool empowers you to accurately measure and track TTFB across multiple sites without needing local installations.

SD-WAN: Monitoring Blind Spots, and What to Do About Them

The adoption of software-defined wide area network (SD-WAN) technologies continues to pick up pace. By employing SD-WAN technologies, organizations have the potential to realize a range of advantages. Teams can achieve better performance while using lower cost, using commercially-available technologies. For example, teams can use public internet services rather than more expensive private WAN technologies, such as MPLS.

Broadcom Recognized as Outperformer in the 2023 GigaOm Radar Report for Cloud Observability

We are excited to share that the AIOps and Observability solution from Broadcom has earned a leader position for platform play and maturity in the GigaOm Radar Report for Cloud Observability, 2023. This report reviewed solutions from 20 vendors on 13 criteria, including across such areas as innovation, understanding of emerging trends, solution capabilities and features, and deployment models.

Embracing the Opportunities of a Network-Connected World

The answer to this question can be very complex, like today's networks. Many enterprise leaders think that this is a subject that should be left to the care of technology geniuses. However, the reality is that this should matter to everyone given the impact the network has on businesses today. The Internet is the new enterprise network. This is due to the fact that user experiences now rely more on ISP and cloud networks than they do on those that reside within the four walls of the data center.

The Role of AWS Direct Connect in Hybrid Cloud Networking

Amazon Web Services (AWS) Direct Connect is a system that connects your business to an AWS service without using mainstream internet. Implementing this system into your company means any information transferred over the internet will use a private, secure network. AWS Direct Connect designs virtual interfaces that are directly connected to public AWS service. It makes the transfer of information quicker and more streamlined for your company.

Multi-Cloud Made Simple: Announcing Kentik Observability Enhancements for AWS and Google Cloud

Limited visibility into network performance across multi-clouds frustrates even the best teams. That’s why we’re thrilled to announce enhanced AWS and GCP support for Kentik Cloud, enabling network, cloud, and infrastructure teams to rapidly troubleshoot and understand multi-cloud traffic.

Multi-Cloud - Rise of Hybrid Networks and the Need to Monitor & Secure Them

This model has benefits, but at the same time, it introduces complexity for the IT teams tasked with monitoring and securing IT systems. Existing network monitoring technologies that system admins use with on-premise infrastructure are typically not expandable to include infrastructure and services running on public cloud platforms. This is a problem as you cannot manage and secure what you cannot see.

Cloud Visibility: Kentik Cloud Enhancements for AWS

Watch an in-depth walkthrough of using Kentik to streamline incident investigations and improve productivity when working with AWS. We demonstrate how to analyze data related to IP traffic denials across multiple VPCs, identifying security group issues and using the Kentik Data Explorer for enriched flow data visualization. The video also explains how Kentik’s cloud data reporting capabilities enable quick and efficient problem-solving, reducing the time to resolution. It’s perfect for IT teams looking to boost efficiency and tackle common issues related to security groups and access control lists.

Cloud Visibility: Announcing Kentik Map for Google Cloud

Learn how Kentik Cloud can improve efficiency in managing Google Cloud infrastructure. It showcases Kentik Map, which provides a constantly updated, detailed visualization of your hybrid cloud environment, illuminating how resources interact and are nested within each other. Watch as we demonstrate how to analyze real-time traffic flow, troubleshoot connection problems, and use the routing table to understand network communication issues. Whether you’re resolving network problems, onboarding new team members, or migrating applications to the cloud, the Kentik Map offers a powerful tool to enhance your productivity in Google Cloud.

Simplifying Everyday Network Management: How AI is Changing the Game

Artificial Intelligence (AI) is the current buzz word in IT with AI promoted as the magic ingredient for improving business performance across a wide range of areas. But how, specifically, does AI enhance Network Management? The idea that computers can manage themselves is nothing new.

The SNMP Monitoring Ultimate Guide: Components, Versions & Best Tools To Use Today

Managing and monitoring network devices is essential for ensuring the smooth operation of organizations. For this purpose, organizations prefer using SNMP — Simple Network Management Protocol. SNMP is a standard Internet protocol through which network administrators collect information about the status and performance of these devices and configure them. In this article, we'll dive deeper into SNMP monitoring, exploring its different versions and components.

Transforming Your Business through Security Offerings

Many service providers are wondering how to best position their security offerings in the current market. This exclusive, two-day program helped MSP executives and security leaders answer: What positions can I take and what are the trade-offs? How will they impact my go-to-market approach? Should I build capabilities internally, or partner externally? What are growing security providers doing differently and better?

How to Test Network Performance: Tips, Tricks & Techniques

Welcome, network admins, to an exciting exploration of how to test network performance! In the world of SaaS, Cloud computing, SD-WAN, and UC apps, a strong and reliable network infrastructure is the backbone of successful operations. Whether you're a small startup or an established enterprise, understanding how to test and optimize your network's performance is crucial for staying ahead of the competition.

How To Enable QUIC Load Balancing on HAProxy

HTTP/3 is the latest generation of the HTTP protocol, and its ability to serve applications over QUIC offers several advantages for user experience, including reduced latency, improved reliability, and faster page loading as a result of fixing the head-of-line blocking issue in previous versions of HTTP. Both HAProxy and HAProxy Enterprise offer support for using HTTP/3 over QUIC, although the steps for enabling QUIC in HAProxy and HAProxy Enterprise are different.

What is NetFlow Analyzer?

In today’s interconnected world, network administrators face the daunting task of managing and securing complex networks. To effectively monitor network traffic and optimize performance, they require comprehensive insights into the data flows within their infrastructure. NetFlow Analyzer is an analytics tool that monitors network traffic flow. It leverages the ability of flow technologies to offer visibility in real time.

Understanding the network edge and edge networking

Generally speaking, a network ‘edge’ is the boundary between two separate networks - where one network ends and another begins. Edges are important, primarily from a security standpoint as they define the jurisdictions owned by different parties, and ‘the edge’ has become a more popular topic of conversation recently through trends which see network resources moved from centralised locations to network edges to make them closer to the end user.

Office 365 Monitoring: The Challenges, and What to Do About Them

Office 365 is used by more than one million companies around the world. Business employees count on these apps constantly to do their jobs, whether they’re writing documents, updating spreadsheets, building slides, or checking email. While cloud-based apps like Office 365 offer undeniable advantages for enterprises and business users, they also create tough challenges for IT operations and network operations (NetOps) teams.

Mindset of an MSP considering M&A

Perry Bowles, technical director for Ziptech Services, shares his story of starting and scaling an MSP. Bowles tells of a conversation that led to a meeting with a total stranger turned business partner nearly 20 years ago. 'Now that's it: Stories of MSP Success,' dives into the journeys of some of the trailblazers in our industry to find out how they used their passion for technology to help turn Managed Services into the thriving sector it is today.

Challenges of Starting an MSP

Perry Bowles, technical director for Ziptech Services, shares his story of starting and scaling an MSP. Bowles tells of a conversation that led to a meeting with a total stranger turned business partner nearly 20 years ago. 'Now that's it: Stories of MSP Success,' dives into the journeys of some of the trailblazers in our industry to find out how they used their passion for technology to help turn Managed Services into the thriving sector it is today.

Ask Me Anything: WhatsUp Gold Performance Monitors Webinar

WhatsUp Gold includes three types of monitors: active, passive and performance. Performance monitors are extremely helpful for proactively preventing potential problems, such as disk space running low or memory usage running higher than expected. Watch this webinar to learn best practices for creating and using performance monitors.

16 Best Network Testing Tools for Optimal Performance

Explore an impartial compilation of the leading network testing tools, where the prominence of smaller companies isn't overshadowed by promotions or exorbitant prices. Our all-encompassing guide encompasses every key player in the industry, guaranteeing an equitable comparison tailored to your IT requirements, devoid of financial influence. Familiar with network testing tools and solely interested in our comprehensive list?

The OSI Model in 7 Layers: How It's Used Today

The Open System Interconnection model (OSI Model) is a foundational concept that shapes how we build digital environments. The OSI Model is a conceptual framework that describes how different computer systems communicate with each other inside network or cloud/internet environments. Today, let’s look at how the OSI Model affects our digital lives, applications and networks.

What Are Management Information Bases (MIBs)?

You have probably seen (or even been to) your company's data center. If not, chances are you have looked at photos of one from a major company like Facebook or Google. Why bring this up? Because when some folks think about the word 'database,' images of rows upon rows of servers holding data come to mind. Others think of the cloud, with zettabytes of data stored in rows, columns and tables.

What Are SDN and NFV, and Are They Related?

SDN and NFV are acronyms you hear frequently in discussions of modern networking. In fact, they appear so commonly that they can be easy to confuse or conflate with one another. But that would be a mistake. SDN and NFV are related terms, but they are also distinct. You can use SDN without using NFV, and the benefits of NFV are not the same as the benefits of SDN in general. Keep reading for a breakdown of what SDN and NFV have to do with each other, and what to use when.

Network Performance Testing: The Path to Peak Performance

In today's hyperconnected world, where businesses rely heavily on seamless digital communication and data transfer, network performance has become a critical factor in ensuring optimal productivity and user satisfaction. Whether you're a small enterprise or a large organization, the performance of your network infrastructure can make or break your success.