Operations | Monitoring | ITSM | DevOps | Cloud

July 2023

Making your Contact Center Better: Three Things to Consider

For many businesses, especially large enterprises, contact centers are a key contributor to revenue and customer satisfaction. While “omni-channel” (voice, chat, email, social) is how many if not most contact centers operate, calls are the still the most critical element of their communications.

What is Citrix ADC, and How Do You Use It to Streamline Network Operations

The rise of complex containerized software environments sees an increased need for reliable delivery solutions like application delivery controllers (ADCs). ADCs such as Citrix function as load-balancing intermediaries within a software delivery network. They are positioned between application and user servers where they manage traffic flow via various structured and centralized processes.

Streamlining SNMP Network Monitoring for Network Visibility

As an IT professional or network administrator, you understand the critical role that comprehensive network visibility plays in maintaining a robust and efficient system. This is where SNMP (Simple Network Management Protocol) comes into the spotlight, offering a powerful solution to monitor, manage, and streamline your network infrastructure.

How Does Networking Work with Istio?

As organizations continue to digitally transform and expand their networks via cloud and multi-cloud environments, it has become increasingly critical to protect microservices and data flow. Implementing advanced technology such as service mesh helps your team secure data networks and manage system access policies by matching user intentions to workload states. Service meshes like Istio support the latest software application trends like containerization and microservice infrastructures.

Kubernetes Gateway API (Everything You Should Know)

The Kubernetes networking landscape is shifting. The traditional Kubernetes Ingress approach is being complemented and, in some cases, replaced by a more powerful, flexible, and extensible standard: the Kubernetes Gateway API. Kubernetes has become the go-to platform for orchestrating and managing containerized applications. A key aspect of Kubernetes that's crucial for the functionality of these applications? Networking.

Leveraging Microsoft Network Monitoring for IT Professionals

Imagine having the power to keep your organization's network in tip-top shape and ensure those essential Microsoft apps are running like greased lightning. In this blog post, we'll unravel the mysteries of Microsoft Network Monitoring, arm you with the knowledge to deploy it like a pro, and help you troubleshoot network performance issues affecting key Microsoft apps and services like Teams, Office 365, Sharepoint, and more.

Enable real-time updates with new integrations of webhooks with NetFlow Analyzer

A webhook, or web callback, is a user-defined HTTP callback used to alter the behavior of a webpage or application. It is triggered by specific events in a web application, such as receiving an SMS message or phone call. When the webhook is triggered, the source application sends an HTTP request, usually in the form of a POST or GET request, to the URL configured for the webhook.

SolarWinds Day: Secure By Design (6/28/23)

Join us for this SolarWinds Day: Secure by Design virtual event as we explore the importance of public/private partnerships to secure our common cyberinfrastructure. Hosted by SolarWinds CISO and VP of Security Tim Brown, this event includes a bipartisan panel of government leaders discussing the United States National Cybersecurity Strategy, its related frameworks, and the nature of today’s cyber risks.

Top 4 Methods Used to Attack Networks (And How to Defend)

Threat actors use a number of different techniques to gain access to company networks so that they can deliver ransomware payloads. In this blog, we look at four of the most common techniques currently being used to attack networks. The intent is to help MSPs and IT admins understand where the threats are coming from, and then where to focus their attention in order to protect their (or their customers’) networks.

Top 3 public cloud costs to watch

“We moved to the cloud and now everything is more expensive!” Unfortunately, this is a common utterance from companies that have made the leap to a public cloud-based architecture, and a slowdown in adoption growth seen during the pandemic is hitting providers big and small as organisations rationalise cloud spend in the face of rising costs. The good news is these costs can typically be reined in without too much disruption or the need to retreat from the cloud.

Maximizing VoIP performance: Why VoIP monitoring is vital for IT organizations

Voice over IP (VoIP) is a fairly old technology, brought into prominence during the 90s as an alternative to the hegemony of public switched telephone network (PSTN) telephony providers in the market. While VoIP was an alternative to normal telephone at that time, it soon led to a cascade of technological developments that changed the IT landscape. In a modern IT organization, VoIP-based technologies are indispensable.

Megaport LIVE: What is Network as a Service (NaaS)? - Paul McGuinness

Network as a Service, or NaaS for short. As a leading provider, it’s a term widely used here at Megaport: But what exactly is it, and why are many companies opting for it for their critical connectivity needs? How can NaaS be used and optimized, and what benefits does it bring to you and your customers?

A Guide to Juniper Contrail SD-WAN

Integrating SD-WAN into your organization allows you to leverage transport services for seamless connection to applications. Various technologies facilitate this process by routing traffic between different sites. However, Juniper Network’s Contrail SD-WAN offers enhanced routing, intelligent traffic steering, zero-touch provisioning, and other features that build on the capabilities of traditional SD-WAN architecture.
Sponsored Post

OpManager: All-in-one network diagram software

Network diagram software holds an important place in modern ITOps. Policies like work from home and bring your own device as well as technologies like server virtualization and hybrid network architectures have resulted in dynamic network topologies. Network diagram software assists IT admins with tracking their network topology, visualizing their infrastructure, monitoring performance, and ensuring compliance.

Top 5 Trends Forecasted for Telco Operations' and Network Automation's Growing Impact

There’s no end in sight for the more-than-fair share of technological advancements the telecommunications sector has seen. And with change, comes challenges. The infrastructures that establish digital communication and connectivity that nearly everyone depends on are in regular, ongoing need of upgrades, which calls for significant investments in building and maintaining them. Much of the relevant decision-making comes from Communication Service Providers (CSPs).

What is a Firewall? Understanding Your Organization's First Line of Defense

Your organization depends on reliable network and endpoint security to ensure that all data is handled, stored, and protected properly. Generally, a comprehensive network security plan includes anti-virus software, access management, zero-trust policies, and endpoint security tools, among other things. A Firewall is considered to be one of the most important components of a network security plan.

How to Create Powerful, Customized Lua Mailers in HAProxy

SysOps teams know how crucial observability is to maintaining around-the-clock infrastructure health. And while HAProxy already provides reliable logging and stats (for diagnostics and monitoring), what if you could supplement those with a real-time alerting system? That idea inspired our initial inclusion of mailers in HAProxy. Since then, users have been asking for deeper mailer customizability—and we’re thrilled to deliver that with Lua-based email alerts in HAProxy 2.8.

The Great Network Observability Debate

You may have heard the term “network observability” regarding solutions that offer a deep and contextual view into the network. You’ve likely heard other terms, such as ‘network visibility,’ “network visualization” and of course “network monitoring.” But, experts argue, what these terms each truly means is still open for debate.

Troubleshooting a SaaS App in Kentik

Kentik's Phil Gervasi explains how Kentik's network observability platform helps IT professionals troubleshoot performance problems with SaaS applications. He demonstrates how Kentik's network observability platform can monitor popular SaaS providers, such as Office 365, Salesforce, GitHub, Dropbox, and more, using synthetic testing mechanisms. By capturing metrics like packet loss, latency, DNS resolution, and page load time, Kentik provides valuable insights into SaaS performance. Phil takes you through a real-life example of investigating a poorly performing SaaS application and showcases how Kentik's tools pinpoint network latency issues, both regionally and globally.

Troubleshooting a SaaS performance problem with Kentik

Discover how Kentik’s network observability platform aids in troubleshooting SaaS performance problems, offering a detailed view of packet loss, latency, jitter, DNS resolution time, and more. Phil Gervasi explains how to use Kentik’s synthetic testing and State of the Internet service to monitor popular SaaS providers like Microsoft 365.

How to Measure Bandwidth: Techniques for Precise Network Measurement

For businesses managing large enterprise networks, network performance is critical for productivity and seamless communication. To ensure optimal operations and user experience, accurately measuring your network's bandwidth is key. In this blog post, we'll explore techniques and tools tailored for businesses to achieve precise network bandwidth measurements. Measuring bandwidth goes beyond assessing Internet speed.

Comparing Networking Solutions for Kubernetes: Cilium vs. Calico vs. Flannel

In Kubernetes, networking holds immense significance as it enables seamless communication among various components and facilitates uninterrupted data flow. To allow pods within a Kubernetes cluster to engage with other pods and cluster services, each of them requires an exclusive IP address. Consequently, networking solutions in Kubernetes encompass more than mere interconnecting machines and devices.

DX NetOps in Action: How Kyndryl Scaled SD-WAN Monitoring by 50%

Kyndryl is the world’s largest provider of IT infrastructure services, serving thousands of enterprise customers in more than 60 countries. The company has 4,400 customers, including 75 of the Fortune 100. The company designs, builds, manages, and modernizes the complex, mission-critical information systems that the world depends on every day. Kyndryl was formed when IBM spun off its Global Technology Services division in 2021.

How to connect your digital ecosystem in Singapore

Singapore’s location at the crossroads of important trade lines and the gateway to Asia has long given it strategic advantage as a hub for global industry, originally as a nexus for physical trade routes and now for digital connectivity, with more than 25 subsea cables landing on the island connecting Singapore to every continent.

Protect Your Data with Motadata Patch Manager

Unpatched software can pose significant risks to your valuable data. Don't leave your information vulnerable any longer. This video presents Motadata Patch Manager, a comprehensive solution designed to safeguard your data by ensuring timely updates and patch deployments. Discover how this powerful solution helps you identify and prioritize critical patches, streamline the patch management process, and reduce security risks. Watch now and take control of your software patching strategy to safeguard your data!

Connected networks = contented customers: 6 top network monitoring benefits

It's a typical day at work, and you're at your productive best. Just as you think you'll complete your task before the deadline, the network goes down. Sound familiar? However, at the other end are waiting customers who have items in their shopping cart, but are unable to complete transactions; potential prospects who want to try out a demo of your app, but now have doubts; and long-time loyal patrons who find the all-too-frequent interruptions frustrating..

Network Telemetry Explained: Frameworks, Applications &Standards

Imagine you have a network, whether it's a LAN or a vast enterprise-level network spread across different locations. Now, picture yourself wanting to monitor and analyze the data flow within that network. That's where network telemetry comes into play. Network telemetry is a group of techniques that allow you to understand better what's happening within networks. It's like watching the network's pulse to keep track of its health and performance. Read on to learn more about the network telemetry landscape.

How to Measure Packet Loss for Data Lost in Transmission

Why did the packet get lost in transmission? Because it didn't have its GPS (Good Packet Sense) turned on! Any IT pro or Network Admin knows that, when large amounts of Packet Loss start plaguing your network, it’s a clear indicator that your network isn’t performing as it should be. In this article, we’re teaching you how to identify and measure packet loss in your network using Obkio Network Monitoring.

Troubleshooting Microsoft Teams Performance Issues

When it comes to the relative merits of hybrid work approaches, there can be a range of opinions; some are strong advocates, some see significant downsides, and many fall somewhere in between. About the one thing pretty much everyone can agree upon is that the rise in hybrid work has made the jobs of IT operations teams much more challenging. On any given day, a user may be working in the office, from their home kitchen, a neighborhood café, or just about anywhere else.

HAProxy and Let's Encrypt: Improved Support in acme.sh

TLS certificates are crucial for the secure flow of web traffic, but managing these digital certificates can pose a challenge. Using an ACME-based certificate authority like Let’s Encrypt can automate and simplify the management of issuing these certificates. Certificate management in HAProxy has steadily improved over the years, allowing it to become more flexible and load certificates without restarting.

Hybrid Cloud Monitoring and Performance Management

Many organizations manage a hybrid infrastructure spread over on-premise and multiple public cloud platforms such as AWS, Azure and Google for specific business applications. The hybrid cloud approach has advantages but adds more complexity for IT teams responsible for keeping IT systems safe and secure. The monitoring tools system administrators use for on-premise infrastructure are often unsuitable for monitoring public cloud platforms.

What's New with WhatsUp Gold 2023.0

This newly released WhatsUp Gold 2023.0 provides your organization with wider access to network data. With its new NOC viewer, scheduled report improvements, and easy-of-use enhancements, 2023.0 will increase the engagement level of all users, from network administrators to executives to non-technical staff. WhatsUp Gold provides better data accessibility to all, helping NetOps establish clearer, faster communications and reinforcing the value of IT.

Active vs. Passive Network Monitoring: Which Method is Right for You

Whether it's a small business network or a complex enterprise infrastructure, maintaining optimal network performance and security is paramount. This is where network monitoring comes into play. Active vs. Passive Network Monitoring: Which Method is Right for You? In this comprehensive guide, we delve into the world of network monitoring and explore two fundamental approaches: active and passive monitoring.

Welcome to Megaport Support and Network Services

Welcome to Megaport customer and network services. Today we will examine how Megaport customer support functions, how our team is structured, what resources we offer, and how we can assist you best. Please Note: Megaport has enabled MFA and SSO. Please refer to our docs portal (link below) for more detailed instructions on how to implement these features.

Securing Your Network: OpenWrt Firmware for Improved Router Protection

Securing our networks has become a top priority in today's interconnected world. One of the best ways to achieve this is using open-source firmware for routers, such as OpenWrt. OpenWrt is often more secure than stock home router firmware because it receives regular security updates, addressing potential vulnerabilities and emerging threats.

Optimizing Dynamics 365 Performance: Strategies for Speed and Efficiency

Dynamics 365 CRM has become a vital tool for organizations to effectively manage customer relationships, streamline processes, and drive growth. However, to fully leverage the power of Dynamics 365 CRM, it is crucial to ensure optimal performance. Slow-loading pages, sluggish response times, and system bottlenecks can hamper productivity, frustrate users, and impact customer satisfaction.

Experience This! What is the Importance of Application Experience?

If you have ever worked in a kitchen, you know how tough it is to be short-staffed. Cooks have to work twice as hard and their performance suffers, leaving not-so-happy customers and comped meals for the complainers. It’s similar to how applications operate. Maybe an application is glitching out from poor coding on the backend or bogging from an influx of data coming in. In either case, the end-user application experience suffers.

$3 Million in Savings and Improved Performance: A Case Study Featuring StackPath

When your business is all about providing cloud services at the edge, optimizing the quality of your network connectivity is paramount to customer success. Learn how StackPath saved $3 million and optimized their network performance by using Kentik.

Hybrid Networks Don't Have to be Complex: How Simplification Changes the Game

Running a hybrid network requires a deep understanding of how data is transmitted, received, and processed, as well as knowledge of different hardware, software, and security protocols. Additionally, as technology evolves, new challenges and considerations arise, such as the integration of IoT devices, SaaS, containers, and the increasing importance of cybersecurity. Overall, computer networking is a constantly evolving field that requires ongoing learning and adaptation.

Motadata AIOps Installation Video

Motadata brings you the ultimate step-by-step guide to installing AIOps! In this video, we'll walk you through each step of the installation process, ensuring a seamless experience. Know how AIOps can reform your operations, streamline processes, and improve efficiency. Don't miss out on the opportunity to enhance your business. Join us now and unlock the power of AIOps!

Exploring Nginx metrics with Elastic time series data streams

Elasticsearch® recently released time series data streams for metrics. This not only provides better metrics support in Elastic Observability, but it also helps reduce storage costs. We discussed this in a previous blog. In this blog, we dive into how to enable and use time series data streams by reviewing what a time series metrics document is and the mapping used for enabling time series. In particular, we will showcase this by using Elastic Observability’s Nginx integration.

10 Best Router Monitoring Software and Tools

Your IT infrastructure needs the best router monitoring software and tools. Are you using an option that helps employees and end-users succeed? Router monitoring software and tools have become essential for administrators to observe their IT infrastructure's traffic, prevent bottlenecks, and improve availability by predicting serious challenges before they occur. The right network monitoring tools give you insight into the overall health of your on-site infrastructure.

Load Balancing 101: Understanding the Basics for Improved Web Performance

In today's digital landscape, where websites and applications are expected to handle increasing traffic loads, ensuring optimal performance and reliability is of paramount importance. Load balancing, a technique used to distribute incoming network traffic across multiple servers, plays a critical role in achieving these goals. Load balancers which are the key components in this process, help optimize resource utilization, enhance the scalability functions, and improve overall system efficiency.

How to Troubleshoot Networks with Visual Traceroute Tool

In today's interconnected world, network performance is critical for businesses of all sizes. Whether you are a network administrator, a system engineer, or an IT professional, ensuring the smooth operation of your network is vital to maintaining productivity and delivering a seamless user experience. However, diagnosing and troubleshooting network issues can be a complex and time-consuming task. That's where Visual Traceroutes come into play.

Motadata Log Analyzer | Gain Valuable Insights with Motadata Log Management Solution

Don't get lost in the vast sea of log data. Optimize your search with Motadata's log management solution and gain actionable insights that fuel business success. With our log analyzer, enterprises can seamlessly collect, centralize, and analyze log data from various sources, identifying valuable patterns, detecting anomalies, and troubleshooting issues effectively. Gain real-time visibility into your IT infrastructure, optimize performance, ensure compliance, and make data-driven decisions with Motadata Log Management Solution.

The Role of End-User Network Experience Monitoring

Users expect seamless and reliable network performance, and any disruption or degradation can significantly impact their satisfaction, productivity, and even the success of the business itself. Therefore, it has become crucial for organizations to shift their focus towards user-centricity in network monitoring, ensuring that the end-user's network experience is at the forefront of their operations.

A Comprehensive Guide to Internal Digital Experience Monitoring

With employees relying heavily on network connectivity and digital tools to carry out their day-to-day tasks, monitoring the network experience of internal users has a direct impact on their productivity, efficiency, and overall satisfaction. Effective internal digital experience monitoring involves tracking and analyzing various aspects of the network performance and connectivity that employees rely on to perform their jobs effectively.

DX NetOps SD-WAN Dashboards: Complete Visibility, Completely Customizable

In recent years, the adoption of SD-WAN technologies has taken off, and shows no signs of slowing. As enterprises become increasingly reliant upon these technologies, it grows ever more critical to ensure optimal availability and services levels are delivered. Most SD-WAN technologies feature monitoring capabilities. However, as outlined in one of my prior posts, there are several key limitations to these offerings.

Improved Usability for Metric Views, Enhanced Security and Extended AIOps and Platform Support with DX UIM 20.4 Cumulative Update 8

In today's fast-paced digital world, keeping up with the latest technology advancements is crucial for businesses to stay ahead of the competition. This is especially true in the world of IT infrastructure management, where technology is rapidly evolving and new solutions are being developed to meet the changing needs of enterprises, government agencies and managed service providers.

The Ins and Outs of SaaS Network Monitoring: A Comprehensive Guide for Optimal Performance

Businesses rely heavily on their networks to maintain smooth operations, enable seamless communication, and facilitate efficient data transfers. However, network instability can throw a wrench into even the most well-oiled business machinery, resulting in frustrating delays, dropped connections, and reduced productivity. This is where network jitter monitoring comes to the rescue.

3 Key Insights from the Gartner Market Guide for SaaS Management Platforms

As the world continues to shift toward a remote-first or hybrid work model that relies heavily on cloud applications and SaaS, new business challenges have emerged for the IT industry. One of these challenges we’ve been tracking here at Auvik is the lack of management for SaaS applications and the risks this kind of shadow IT can bring to a business. That’s why we think the 2022 Gartner Market Guide for SaaS Management Platforms (December 2022) is so critical.

8 Ways to Meet Enterprise Network Service Level Agreements (SLAs)

Large cloud providers and ISPs offer service level agreements (SLAs) that guarantee uptime and help seal the deal with enterprises that value uptime. These same enterprises often ask IT to make the same guarantees for the performance and uptime of the internal network, its many varied connections and even the applications. At the same time, IT may have myriad SLAs from all kinds of vendors—including the aforementioned ISPs and cloud providers—it must manage.

Announcing HAProxy Data Plane API 2.8

We are proud to announce that we have released HAProxy Data Plane API 2.8, available on our GitHub page. This release follows the recent HAProxy 2.8 release and incorporates its changes, along with some improvements and changes specific to the API. HAProxy Data Plane API 2.8 adds new keywords focused on QUIC, OCSP stapling, and tuning options that allow you to customize your HAProxy process using the HTTP REST API programmatically.

Experience-Driven NetOps: The Integration of AppNeta and DX NetOps

AppNeta and DX NetOps enable Experience-Driven NetOps by bringing user experience and visibility across both managed and unmanaged networks into a unified console. Start with alarms and drill down to see the details of performance along the complete network path, hop by hop, including information about voice and data to understand issues over time. Use dashboards to see insights into the health of your network delivery paths across your organization and drill-in to isolate the problem with detailed reports including network experience capacity projections for ISPs.

What is Network Throughput: From Bytes to Blazing Speed

As network admins and IT specialists, you bear the crucial responsibility of optimizing network performance, ensuring the seamless flow of information. Network throughput lies at the heart of this endeavour, serving as a key performance metric that measures the amount of data transmitted within a given timeframe. Consider network throughput as the pulse of your network—the indicator of its vitality and efficiency.

8 Common Uses of VPN in 2023: How People Leverage Its Benefits

Explores the capabilities of a virtual private network (VPN) - a versatile tool that is surprisingly user-friendly. Whether it's for individuals or businesses, VPNs offer a multitude of advantages. Users can securely navigate activities such as traveling, using public Wi-Fi, sharing sensitive information, and unlocking entertainment options on Netflix, all with the assistance of a VPN. This comprehensive guide provides valuable insights into effective VPN usage and highlights the numerous benefits it offers. It caters to personal and corporate scenarios alike.

What is Packet Reordering (Out-of-Order Packets) & How to Detect It

Imagine a world where packets go on unexpected detours, performing an electrifying dance routine that challenges the order we hold dear. Sounds intriguing, doesn't it? In the realm of data transmission, order is king. But every now and then, our trusty packets decide to take a detour, throwing caution to the wind and leaving us scratching our heads. Fear not! Today, we embark on an exhilarating exploration to demystify the phenomenon of out-of-order packets, also known as packet reordering.