Operations | Monitoring | ITSM | DevOps | Cloud

August 2023

The Impact of Network Topology

When it comes to arranging your network architecture, there are different methods to consider, each with its own pros and cons depending on your business needs. The way you design your network can improve connectivity for data sharing or increase security. This arrangement of components and their proximity to each other is known as network topology. In this article, we’ll explore network topology, different types of topologies, and how they impact speed, reliability, security, and other functions.

How to Monitor VoIP PBX Systems for Call Quality

If you’ve ever used a business phone system, chances are that you’ve used a VoIP PBX or IP PBX system at least once. There are many advantages of using VoIP PBX for your business, but like most applications that work over a network, they’re prone to performance issues if network problems arise. In this article, we’re running you through how to monitor VoIP PBX systems to ensure optimal call quality with network monitoring.

Network Monitoring: A Comprehensive Overview

Imagine this: You’re a doctor. Your patient is a colossal network of computers, servers and cables, all intertwined and humming with activity. Your job? To keep an eye on this complex entity’s vital signs, ensure it runs smoothly and intervene when things start to look a little off. Welcome to the world of network monitoring and the role of network administrators.

Rogers Outage: How to Identify Network Outages & Internet Outages

The nationwide Rogers outage in Canada majorly disrupted the lives of many, affecting wireless, Internet, and even people’s ability to call 911. When major network outages or Internet outages occur, it’s important to be notified as soon as they happen. Understanding the causes and identifying network outages or Internet disruptions is not only essential for individual users but also for businesses striving to maintain uninterrupted operations.

DX NetOps in Action: Fujitsu Reduces TCO by 75% with Expanded "HumanCentric" Approach to NetOps

Fujitsu is a Japanese multinational information technology equipment and services company. Headquartered in Tokyo, Fujitsu has over 100 data centers worldwide. The company and its subsidiaries offer a diverse range of products and services in areas such as personal and enterprise computing (including x86), SPARC, and mainframe-compatible server products.

What is MITRE ATT&CK and How to Use the Framework?

The MITRE ATT@CK® framework is one of the most widely known and used. The Flowmon Anomaly Detection System (ADS) incorporates knowledge of the MITRE ATT&CK framework. Using ADS and its MITRE ATT&CK knowledge makes detecting advanced threats against networks and IT systems easier and simplifies explaining the danger and risks when outlining an attack to all stakeholders.

Black Hat USA: Adaptable Security From HAProxy

The curtain rose and fell on another spectacular Black Hat USA, the conference set against the backdrop of fabulous Las Vegas in the Mandalay Bay Convention Center. We knew upon hitting the Strip that all the glamor and neon lights were just the preshow for the main event: innovation and the latest in cybersecurity. We couldn’t wait to show attendees and fellow vendors what we had to offer.

Breaking the Cloud Illusion: The Hard Truth about Successful Migrations

Join our Kentik experts and Andrew Green, Research Analyst at GigaOm for a panel discussion on common challenges organizations face as they move their workloads to the cloud. They will discuss some tales from the field and ways organizations can mitigate some of these challenges, such as cost overruns, connectivity interruptions, and security considerations.

How to Detect Microsoft Teams Outages: Is MS Teams Down?

Microsoft Teams is a vital tool for businesses, organizations, and individuals seeking seamless connectivity. Whether it's coordinating projects, holding virtual meetings, or sharing critical information, Teams has redefined how we interact and cooperate. However, even the most robust platforms occasionally face disruptions, and when Microsoft Teams encounters an outage, the impact can ripple through workflows, communications, and productivity.

Network Health and Performance Monitoring: SolarWinds MIB DB

This series trains users how to effectively use the network health and performance monitoring features of SolarWinds® Hybrid Cloud Observability. Participants will learn how to build effective custom SNMP pollers, use NetPath to troubleshoot network connections, and learn about other features such as Network Insight, capacity planning, and forecasting critical resources.

Network Health and Performance Monitoring: Custom Pollers

This series trains users how to effectively use the network health and performance monitoring features of SolarWinds® Hybrid Cloud Observability. Participants will learn how to build effective custom SNMP pollers, use NetPath to troubleshoot network connections, and learn about other features such as Network Insight, capacity planning, and forecasting critical resources.

Network Health and Performance Monitoring: SNMP Fundamentals

This series trains users how to effectively use the network health and performance monitoring features of SolarWinds® Hybrid Cloud Observability. Participants will learn how to build effective custom SNMP pollers, use NetPath to troubleshoot network connections, and learn about other features such as Network Insight, capacity planning, and forecasting critical resources.

How seamless connectivity is driving the evolution of broadcast media

The way content is created, distributed, and consumed has changed a lot over the last decade with the introduction of streaming and on-demand viewing. Media sector revenues are growing, but so is the cost to produce content and manage complex digital ecosystems. So how can media and broadcasting companies simplify network complexity and improve performance, all while delivering great content to hungry audiences? First, let’s look at the three key areas for connectivity in media and broadcasting.

10 Best Firewalls for Small Business to Use in 2023

Why is it critical to know and implement the best firewalls for small businesses? Well, cybercrime in information technology development has reached new heights, and according to Cybersecurity Ventures, the damage it causes to the online landscape is forecasted to grow to $10.5 trillion annually by 2025. Phishing, malware, account takeover, credential abuse, ransomware, cryptojacking, and zillions of other severe cyber security attacks are commonplace these days.

How to Give Your Business Website a Makeover - Essential Tips and Tricks

Having a website for your business is no longer optional, it should be seen as a mandatory part of business operations. Even if your business doesn't offer eCommerce solutions, having a website makes it possible for new customers to find you and learn about your offerings. Websites can be a fabulous marketing tool and can be promoted on social media. But don't make the assumption that any old website will do. It needs to be professional, sleek, helpful, engaging, and user-friendly.

How to Log HTTP Headers With HAProxy for Debugging Purposes

HAProxy offers a powerful logging system that allows users to capture information about HTTP transactions. As part of that, logging headers provides insight into what's happening behind the scenes, such as when a web application firewall (WAF) blocks a request because of a problematic header. It can also be helpful when an application has trouble parsing a header, allowing you to review the logged headers to ensure that they conform to a specific format.

Dashboards & Reports for New-Age Observability with DX UIM from Broadcom

In this 10-minute how-to video, 2nd in a series, learn more about DX UIM for new-age infrastructure observability. Watch to learn about inventory view and grouping, creating metric view dashboards and reports, Performance Reports Designer, List View Designer, and a sneak peek at a unified view.

Configuring Kubernetes and OpenShift Monitoring with DX UIM by Broadcom

In this 10-minute how-to video, 1st in a series, learn about DX UIM for new-age infrastructure observability. Watch to learn about the cloud infrastructure monitoring deployment model schematic, how to deploy container monitoring, and how to configure monitoring in the DX UIM Operator Console.

Sneak Peek: New-Age Infra Observability Viewer with DX UIM from Broadcom

In this 6-min. video, see how an upcoming feature, Observability Viewer, will provide a new, consolidated view across the infrastructure estate. The DX UIM Observability Viewer feature is intended to allow customers to more quickly understand their operational situation.

How to Use Nmap: Complete Guide with Examples

In the constantly changing cybersecurity landscape, staying one step ahead of malicious actors is crucial - and understanding the intricacies of your networks is an integral part of that. A tool that can help you do this has earned its reputation as a cybersecurity stalwart - Nmap. Nmap, short for Network Mapper, holds the keys to unlocking valuable insights in your network infrastructure.

Understanding the API economy

APIs (Application Programming Interfaces) have been around for decades, but although the concept emerged as far back as the 1940s, it wasn’t until the early 2000s and the efforts of eBay, Salesforce, and Amazon that really put them on the map. APIs today are ubiquitous - any company developing software will likely have an API for customers and partners - and research suggests the majority of enterprises consuming APIs are focused on strategies for easier consumption and management of APIs.

Scaling Monitoring Administration with Experience-Driven NetOps: AppNeta and DX NetOps

Today, pretty much every critical business service, every critical employee job function, every critical customer transaction, and so much more are all reliant upon network connectivity. It falls to network operations (NetOps) teams to ensure network connections continue to support these demands. Over time, the scale and the complexity of the networks the organization relies upon have continued to grow, making the job of NetOps teams increasingly challenging.

CISO's MOST WANTED: Outsmarting Cyber Criminals with Tips from a Former FBI Agent

It's not a matter of IF you’ll be hacked, it’s a matter of when. No one understands that more than FBI Special Agent, Scott Augenbaum, who spent 30 years as a Supervising Agent for the FBI’s Cyber Crimes Unit. Scott joins our panel of experts to discuss today’s cyber threats and practical security solutions to keep you one step ahead of cyber criminals.

Upgrading NPM and SAM to Hybrid Cloud Observability

This video discusses and demonstrates upgrading an Orion Platform installation running NPM and SAM, to Hybrid Cloud Observability – advanced license. The video discusses system requirements, installation methods and walks through a full demonstration of the upgrade. This video is suitable for anyone who wishes to understand more and see an upgrade from a module based install to Hybrid Cloud Observability.

Mastering Microsoft 365 Monitoring for Businesses

In the ever-evolving landscape of modern business, the shift towards cloud-based solutions has been nothing short of transformative. Among these technological advancements, Microsoft 365 has emerged as a cornerstone, offering a comprehensive suite of tools to streamline operations, boost collaboration, and enhance productivity. As organizations increasingly embrace the cloud, the need to ensure the performance, security, and availability of these critical services becomes paramount.

DX NetOps In Action: How Altice Accelerates Network Transformation with Broadcom

Altice Portugal is a wholly owned subsidiary of Altice Group, a multinational cable and telecommunications company. They have a presence across Europe, including in Belgium, France, Luxembourg, Portugal, and Switzerland, as well as in the Dominican Republic, the French West Indies, and Israel. With annual revenues of more than $2.8 billion (2,629 million Euros), Altice Portugal is Portugal’s largest telecom company. Altice offers fixed, mobile, and satellite network services to consumers.

Understanding Site24x7's NCM Automation, reports, and compliance

As exponential growth increases the complexity of your organizational network, how can you minimize downtimes due to device configuration issues? Join us to learn about network configuration management (NCM) and how Site24x7 can fulfill your device configuration management needs. You'll also benefit from an exclusive sneak peek of our soon to be released compliance modules. Don't miss it!

Dual Subsea Cable Cuts Disrupt African Internet

On Sunday, August 6, an undersea landslide in one of the world’s longest submarine canyons knocked out two of the most important submarine cables serving the African internet. The loss of these cables knocked out international internet bandwidth along the west coast of Africa. In this blog post, we review some history of the impact of undersea landslides on submarine cables and use some of Kentik’s unique data sets to explore the impacts of these cable breaks.

Private Connectivity to IBM Cloud - Portal Demo

Brian Bowman, Solutions Architect at Megaport, will guide you through the process of setting up private connectivity to IBM Cloud via IBM Direct Link, using both the Megaport portal and the IBM Cloud Management Console. This video is perfect for customers who want to enhance their throughput capabilities and establish a secure connection to the IBM Cloud. Get ready to learn and take action!

How to Identify Network Problems & Diagnose Network Issues

Just because your network is "UP," doesn't mean it’s working well! Network issues like choppy VoIP, jerky video calls, and network and application slowness issues can affect your business in drastic ways - which is why it’s important to know how to identify network issues for network performance troubleshooting. There are many problems that can affect network performance, and some of them are very complex to identify and understand.

Using DX NetOps Dashboards To Harness the Power of AppNeta Data

In today’s dynamic, complex network environments, there’s a big difference between having monitoring data and having intelligence. To troubleshoot issues quickly, it’s vital to have timely, intuitive visibility into the metrics that matter. With the combination of AppNeta and DX NetOps, teams can gain the insights they need to efficiently and intelligently manage their environments.

Unveiling Komodor's Network Mapping Capability

I am happy to share that thanks to the power of the open-source community, and our friends over at Otterize, we have now enhanced our Kubernetes offering for developers with another visual aid to streamline operations and troubleshooting – Dependencies Map. The Otterize network mapper is a zero-config tool that aims to be lightweight and doesn’t require you to adapt anything in your cluster.

A Deep Dive into Microsoft Cloud Monitoring for IT Pros

As businesses increasingly rely on the power of the cloud, maintaining optimal performance is paramount. Enter network monitoring tools - the guiding stars that help IT pros navigate the expansive cosmos of Microsoft's cloud services with precision and confidence. In this article, we're embarking on a comprehensive exploration into the world of Microsoft Cloud Monitoring using network monitoring tools.

How to Perform a Forensic Analysis After a Security Breach

In this Kentik demo, Phil Gervasi shows how to perform a forensic analysis after a security breach. Leveraging Kentik's robust visibility into public cloud traffic, we showcase how engineers can effectively identify, analyze, and respond to security incidents. Through a hypothetical scenario, we trace a security alert from its origin—a suspected attack on an Azure-hosted system—to its resolution. Using tools like the Kentik Map and Data Explorer, we identify the attacker's entry point, compromised internal devices, and potential data exfiltration activities.

The importance of a network backup tool

Configurations are regarded as the core of networks due to their importance. With businesses continually advancing and relying on networks for storing, processing, and transmitting critical data, the complexity of network management has increased, leading to difficulties and human errors that can cause significant network downtime.

Why should I consider Salesforce Express Connect?

In this blog, we look at why more businesses are considering Salesforce Express Connect for accessing their Salesforce applications – and how Console Connect can help. Salesforce needs little introduction. It has become the CRM of choice for enterprises, now counting 150,000 customers across various industries, including the likes of Spotify, Amazon Web Services, and U.S. Bank.

Top 5 network management trends in 2023

New trends emerge in network management every year, and 2023 is no exception. This year the industry is set to witness a plethora of advancements and breakthroughs that will revolutionize network administration. From the adoption of sophisticated analytics and machine learning to the proliferation of cloud-based solutions and the surging significance of cybersecurity, here are the top network management trends to watch out for in 2023.

What is Network Troubleshooting? - The Ultimate Survival Guide

Are you tired of feeling like a lost sailor on a stormy sea of computer problems? Well, fear not, dear reader, for we are about to embark on a journey to demystify the world of network troubleshooting! Intermittent network problems interrupt your flow of work, frustrate users, and can wreak havoc on your business. Troubleshooting network problems as fast as possible is the key to making sure that doesn’t happen.

How Qonto used Grafana Loki to build its network observability platform

Christophe is a self-taught engineer from France who specializes in site reliability engineering. He spends most of his time building systems with open-source technologies. In his free time, Christophe enjoys traveling and discovering new cultures, but he would also settle for a good book by the pool with a lemon sorbet.

Agentless Network Monitoring: An Introductory Guide

From communication and collaboration to data storage and sharing, networks are critical to almost every business operation today. Thus, monitoring the reliability and security of your network infrastructure is more critical than ever. Network monitoring entails observing and analyzing network traffic to identify issues, optimize performance, and ensure security.

Iraq Blocks Telegram, Leaks Blackhole BGP Routes

This past weekend, the government of Iraq blocked the popular messaging app Telegram, citing the need to protect Iraqi’s personal data. However, when an Iraqi government network leaked out a BGP hijack used for the block, it became yet another BGP incident that was both intentional, but also accidental. Thankfully disruption was minimized by Telegram’s use of RPKI.

The Guide to MSP Network Monitoring for Multi-Client Visibility

Managed Service Providers (MSPs) are entrusted with the important task of orchestrating complex networks, ensuring uninterrupted service, and safeguarding the delicate balance between digital innovation and operational stability. In this article, we’ll be delving into the importance of MSP Network Monitoring and the pivotal role that MSPs play in maintaining the intricate web of connections that power our interconnected world.

G2's Most Recommended WAF & DDoS Protection

In case you missed it, HAProxy Technologies recently put out a press release about our stunning leadership position in G2’s Summer 2023 Grid® Reports for load balancing. We’re incredibly proud of these results, which are a direct result of the hard work and dedication of HAProxy’s community developers and our enterprise product and support teams. Looking at the Momentum Grid® Report for Load Balancing, the gap between HAProxy and the rest is impossible to ignore.

Enhancing Security Workflows with Real-Time Notifications via Microsoft Teams and Slack

The integration with popular collaboration platforms like Microsoft Teams and Slack marks a pivotal advancement in security workflows. We are introducing new capability to post events from Flowmon ADS into Teams channel or Slack to instantly notify security teams. Integrations scripts are based on simple webhooks and available out of the box on our support portal both for Teams and Slack.

Troubleshooting Cloud Application Performance: A Guide to Effective Cloud Monitoring

The scalability, flexibility, and cost-effectiveness of cloud-based applications are well known, but they’re not immune to performance issues. We’ve got some of the best practices for ensuring effective application performance in the cloud.

Microsoft Teams Monitoring to Troubleshoot & Optimize Performance

If there's one thing we know about successful teams, it's that they need top-notch communication to conquer the corporate jungle. That's where Microsoft Teams swoops in to save the day! As you probably already know, Teams is the ultimate collaboration playground for businesses, connecting people, and getting things done in a snap. But here's the thing: even the most powerful tools need a little TLC to stay in their prime. And that's where we come in!

Automate network topology mapping with OpManager's topology software

Network topology mapping is the process of mapping topological relationships between network components and establishing those relationships in the form of network diagrams. Network mapping helps visualize physical and logical connections between all elements and nodes, thus simplifying network management. A network topology mapper is a tool that helps perform network mapping effectively.

Driving A Successful SD-WAN Migration: Obkio's NPM Solution Empowers StableLogic in a Global SD-WAN Deployment

The rapid adoption of software-defined wide-area networking (SD-WAN) has revolutionized how organizations connect their distributed networks. As businesses strive for improved performance, cost efficiency, and enhanced security, SD-WAN solutions have emerged as a game-changer. However, orchestrating a successful SD-WAN migration at a global scale presents numerous challenges that demand careful planning, meticulous execution, and robust network performance monitoring (NPM) capabilities.

Troubleshooting Wi-Fi Issues for Hybrid Workers: Key Requirements for NetOps Teams

In recent years, employees have grown increasingly accustomed to the untethered connectivity of Wi-Fi. For many, the days of having a computer tethered to an ethernet cable can seem like a distant memory. That was true when employees were working in an office, and it is all the more the case as we’ve moved to a hybrid work world.

What are Traceroutes and How Do Traceroutes Work?

If you've ever wondered why your Internet connection seems slow or experiencing connection problems with a website, you might have heard of a tool called "traceroute." But what is a traceroute, and how does it work? In this article, we'll be giving a quick and simple introduction to what are traceroutes, and how traceroutes work to help identify and troubleshoot network problems.

The First 48 Hours of Ransomware Incident Response

The first 48 hours of incidents response is the most critical. We will explain few important steps that need to be taken to mitigate the impact on service availability, information systems integrity and data confidentiality. The cyber resilience is also covered by the individual national regulations and directives, so let's take a closer look at it and explain why principles of Network Detection and Response shall be a crucial part of technical measures implementation for regulated entities.

What Is APM and How Can It Help Your Services/Applications?

APM is one of those buzzwords that is slowly becoming a necessity. Most people are still unsure what APM means and how it can help their services. But what is it? What does it stand for? And how can it help your services or digital products? This blog will answer your questions—and more.

Using Helm Dashboard and Intents-Based Access Control for Pain-Free Network Segmentation

Helm Dashboard is an open-source project which graphically shows installed Helm charts, revisions, and changes to their Kubernetes resources. The intents operator is an open-source Kubernetes operator which makes it possible to roll out network policies in a Kubernetes cluster, chart by chart, and gradually achieve zero trust or network segmentation.

Sponsored Post

Best Practices for SaaS and Network Incident Management

Computer and network systems have (obviously) become vital to business operations. Occasionally, there are SaaS or network incidents and these systems do not operate as needed. Enterprises want to minimize the potential damage and get their systems back online ASAP. Integrated incident management and a strong End User Experience Management (EUEM) platform that provides synthetic and real-user monitoring is a foundation for meeting that objective.

3 Steps to Get DX NetOps Events in Slack and Google Chat

Network operations centers (NOCs) play a critical role in any organization’s operational and business continuity. To meet their vital charters, NOC teams must constantly strive to maintain uninterrupted network availability and to minimize the business impact of network issues. Within the NOC, effective collaboration is essential for quick troubleshooting and resolution of network issues.

5 Things to Look for in a SaaS Management Platform and Why

SaaS management platforms are helping IT solve a new version of an old problem: user behavior and software application visibility. With endpoint solutions like remote monitoring and management (RMM) agents, MSPs and IT teams have had deep visibility into desktop applications for years. But, once a user opens a browser and logs into a SaaS app, it’s a different story. Apps and user accounts are often manually tracked via spreadsheets, and shadow IT is common.

Quickstart network investigations with NPM's story-centric UX

Datadog Network Performance Monitoring (NPM) gives you visibility into all the communication that takes place between the network components in your environment, including hosts, processes, containers, clusters, zones, regions, and VPCs. As organizations scale, and as their networks grow in complexity, the massive volume of network data to be monitored can become overwhelming. Knowing precisely what network data to surface to resolve issues within these larger environments can be a challenge.

Exploring AKS networking options

At Kubecon 2023 in Amsterdam, Azure made several exciting announcements and introduced a range of updates and new options to Azure-CNI (Azure Container Networking Interface). These changes will help Azure Kubernetes Services (AKS) users to solve some of the pain points that they used to face in previous iterations of Azure-CNI such as IP exhaustion and big cluster deployments with custom IP address management (IPAM).