Operations | Monitoring | ITSM | DevOps | Cloud

September 2023

Test Automation - A Key to Telco Cloud Adoption

While industry experts struggle to find consensus on the path to Telco Cloud, almost everyone agrees that automation will play an outsized role in helping network operators overcome the challenges they face in adopting and successfully deploying Telco Cloud. For many network operators, the very inefficient pace of their existing software upgrades is a key challenge they must address to migrate their network to a modern Telco Cloud.

Defining Your Cloud Core Migration Strategy - Fail to Prepare, Prepare to Fail

In this enlightening panel discussion from the Telco Core Strategy Summit, industry experts discuss the intricacies of cloud core migration. Learn from seasoned professionals, including Kentik’s Justin Ryburn, as they share insights on cloud migration challenges, the importance of automation, and strategies to maintain security and performance. Understand the significance of detailed planning, the shifting dynamics of workloads in the cloud, and how to navigate the complexities of this transformative journey.

The Evolution of Data Center Networking for AI Workloads

Traditional data center networking can’t meet the needs of today’s AI workload communication. We need a different networking paradigm to meet these new challenges. In this blog post, learn about the technical changes happening in data center networking from the silicon to the hardware to the cables in between.

The Power of SNMP Polling: Monitoring Your Network Like a Pro

Every network admin knows that network stability and performance are the lifeblood of modern enterprises. Every second of downtime or suboptimal performance can result in lost productivity, dissatisfied customers, and significant financial repercussions. To navigate this high-stakes digital terrain successfully, T professionals and network admins need a comprehensive understanding of their network infrastructure and the ability to manage it proactively.

Streamlining network efficiency: Unveiling the power of ManageEngine Network Configuration Manager

Configurations play a crucial role in any network setting, as even a minor mistake in a single line of code can lead to cascading network failure throughout an entire organization. Moreover, with the increasing intricacy of networks, the risk of unauthorized misconfigurations has emerged as a significant concern, predominantly stemming from human inaccuracies.

State of the Internet: Monitoring SaaS Application Performance

Kentik's State of the Internet Overview: With the increasing reliance on SaaS applications in organizations and homes, monitoring connectivity and connection quality is crucial. However, gaining insights into third-party networks like Google's DNS, Microsoft 365, or Zoom is challenging. Kentik's "State of the Internet" offers a solution. Part of Kentik's network observability platform, it deploys hundreds of test agents globally to monitor popular SaaS providers, major public clouds, and DNS services.

The Power of Network Uptime Monitoring: Proactive vs. Reactive

In a world where seamless online operations are fundamental to success, the reliability of your network infrastructure can make or break your enterprise. Downtime, even for a few minutes, can result in substantial financial losses, frustrated customers, and a tarnished reputation. That's where the power of network uptime monitoring comes into play, acting as a sentinel guarding your digital fortress.

New DX UIM Release: Start Monitoring New Linux Distributions on Day 1

From DX UIM 20.4 CU4 onward (that is, releases that have robot version 9.36 or above), robots automatically support Linux versions with newer GNU C Library (commonly known as “glibc”) versions. Prior to CU4, DX UIM robots needed certification and a release to provide support or compatibility with newer Linux operating systems that have a higher glibc version.

Enhancing Network Reliability: How to Measure, Test & Improve It

Whether you're a seasoned business owner or an IT professional, you're acutely aware that a reliable network is the bedrock upon which your organization's success is built. And this is where Network Reliability comes in. Picture this: a critical video conference with an important client, a crucial data transfer before a project deadline, or an online customer transaction on your e-commerce platform. What do they all have in common? They rely on a network that just works, without hiccups or interruptions.

Augmenting behavior-based network detection with signature-based methods

Network detection tools utilize one of two prominent approaches for threat detection: AI-driven behavior-based methods capable of identifying early indicators of compromise, and signature-based ones, which flag known attacks and common CVEs. While these systems operate on distinct principles, their combination forms more robust defense mechanism, helps to consolidate tools, provides richer threat context and improves compliance.

What Is an IP Address Management Service and Why Might You Need It?

If you're managing a network, chances are that the need for IP Address Management (IPAM) is something you've already become familiar with. The ability to effortlessly and effectively manage your IP allocations will make your life much easier no matter what size of organization you work for. It can help streamline efforts by reducing complexity, minimizing manual intervention when configuring new devices or services within an enterprise intranet, and proactively resolving problems related to limited resources like addresses.

Adding a CDN to a load balancer (for a much faster website)

Here at Raygun, we like to go fast. Really fast. That’s what we do! When we see something that isn’t zooming, we try to figure out how to make it go faster. So today, we’re answering a simple (and relevant) question; how do we make our public site, raygun.com, much, much faster? The answer, at first glance, is simple—we build it into a Content Delivery Network (CDN).

How to Configure a Linux Firewall: The Ultimate Guide

A firewall stands as a digital gatekeeper, meticulously sifting through network traffic and deciding what may pass. This protective shield, fundamental to cybersecurity, is integral in the Linux world. The Linux kernel itself is effectively a de facto packet switching firewall, crafted as it is around the principles of packet filtering at the most fundamental operating system level, thus exemplifying the pivotal role of firewalls in system security.

ICMP Required for Traceroute and Network Diagnostics

As previously detailed on the Exoprise blog, the ICMP (Internet Control Message Protocol) is crucial for troubleshooting, monitoring, and optimizing network performance in today’s Internet-connected world. Despite historical security concerns, disabling ICMP is unnecessary and hampers network troubleshooting efforts. Modern firewalls can effectively manage the security risks associated with ICMP.

How AI is Changing Modern Networking

Artificial intelligence has changed the landscape of technology, especially as we collect and analyze vast amounts of data. As AI workloads are distributed among compute nodes and across data centers, what problems are posed for traditional networking, and what solutions can we discover? This live discussion between Justin Ryburn, Field CTO at Kentik, and Phillip Gervasi, Director of Technical Evangelism at Kentik, dives deep into the current state of data center networking in the age of AI.

What's Going on in There? What is Server Monitoring?

X-ray machines are one of the most sophisticated tools in the medical field. Capable of creating images of someone’s fractured arm, x-rays enable medical professionals to see what is going on in a patient’s most vital areas. In the IT world, server monitoring has a similar function.

LogicMonitor Excels in G2 Fall 2023 Network Monitoring Report

Fall 2023 Reports, including Enterprise Monitoring and Cloud Infrastructure Monitoring, were announced September 12, 2023 from G2, the world’s leading business software review platform. Take a look inside the G2 Fall 2023 Network Monitoring Report highlights below to see where LogicMonitor stood out among the rest.

How to Troubleshoot Internet Connectivity Issues for IT Pros

A reliable Internet connection is the lifeblood of nearly every organization. From seamless video conferences to uninterrupted data transfers and smooth online operations, the modern business world depends on a steady flow of data. However, as IT professionals know all too well, even the most robust networks can encounter connectivity issues that disrupt productivity and cause frustration.

Using Synthetic Testing for Better Network Observability with Kentik

Mike Krygeris discusses using synthetic testing to maximize network performance and minimize downtime in today’s complex cloud, hybrid, and private on-prem networks. Learn how synthetic testing can help increase observability in all types of networks and web applications.

See How Kubernetes Traffic Routes Through Data Center, Cloud, and Internet with Kentik Kube

Using Kentik Kube, cloud and infrastructure engineers can access detailed network traffic and performance visibility for internal and external traffic for their Kubernetes clusters to quickly detect and solve network problems.

Solving Faster in the Cloud Hybrid Infrastructure Observability with Kentik

How can you quickly discover misconfigured security groups, access control lists, or routing tables? We explore how practitioners serving distributed teams or customer workloads can tighten up policies, impact costs, and unblock their colleagues with cloud infrastructure observability that starts with the network.

Your Comprehensive Guide to HAProxy Protocol Support

Internet protocols are the lifeblood of internet communication, powering important connections between servers, clients, and networking devices. These rules and standards also determine how data traverses the web. Without these protocols, internet traffic as we know it would be severely fragmented or even grind to a screeching halt. And without evolving protocol development, the web couldn’t properly support the applications driving massive traffic volumes worldwide (or vice versa).

Network Observability Across the Enterprise

Justin Ryburn describes the complexities of managing a modern enterprise network and the various areas where Kentik can provide observability. Having all of this information in a single platform that is easy to access and highly scalable provides a lot of value to Kentik customers. Justin wraps up with a discussion of Kentik’s roadmap for the future.

Container Network Observability

Justin Ryburn describes the complexities of managing the network in a modern Kubernetes deployment and how Kentik can provide observability. Leveraging eBPF technology allows network engineers the ability to visualize and make sense of the network traffic within the Kubernetes cluster, as well as traffic entering and leaving the cluster. Justin wraps up with a brief demo of Kentik’s beta Kentik Kube functionality.

Data-driven Network Observability

The network may be the last thing most people think about, but it’s one of the most crucial components of application delivery. Here we discuss the importance of a data-driven approach to network observability. We unpack how Kentik’s approach to machine learning, big data, and a unified data repository can help network operations solve problems faster to ensure a reliable network with great application performance.

Is your cloud provider executing network maintenance? Yes, yes they are.

What happens to your apps when your cloud provider performs network maintenance? Kentik helps you monitor your app’s network paths and performance on premises, in the cloud, and in between. Kentik can show you the paths your app uses during normal operations and detect any changes that could cause decreased application performance. Public cloud maintenance is necessary, and with Kentik’s network observability platform, you can see exactly when your cloud provider is doing it and how it’s affecting your application traffic.

Brocade switch configuration management with Network Configuration Manager

Brocade network switches encompass a variety of switch models that cater to diverse networking needs. In today’s intricate networking landscape, manually handling these switches with varying configurations and commands within a large network infrastructure can be a daunting task. This complexity often leads to human errors such as misconfigurations. How can you optimize your network environment effectively when utilizing a variety of Brocade switches and eliminate the need for manual management?

Revolutionize your network performance with OpManager's versatile network management tool

As networks become more highly dynamic, managing an entire network efficiently is not an easy task. When it comes to network monitoring, all you need to figure out is the type of network devices and the specific metrics you need to monitor. But when it comes to network management, there’s more to be taken into account, from network security, bandwidth hogs, change management, and policy management to performance optimization.

Network Monitoring 101: How To Monitor Networks Effectively

You want your networks to operate seamlessly, but how can you guarantee that your network is performing optimally and without disruptions? Network monitoring can help. Network monitoring means overseeing a network's performance, availability, and overall functionality — allowing you to identify and resolve issues before they impact end-users. Read on for a full understanding.

Looking back at 15 Years of Catchpoint and Internet Performance History

Fifteen years ago, the Internet was a very different place. It operated on a very different scale, had different market leaders and it faced different technical challenges. What has not changed, however, is the need for the best – indeed ever higher - performance and resilience. We founded Catchpoint in September 2008 (amid terrible economic conditions) with the desire to make the Internet better. Not exactly the greatest year to launch a startup.

Mastering LAN Monitoring: How to Improve LAN Network Performance

In the intricate realm of information technology, where the foundations of modern business are securely anchored, the Local Area Network (LAN) is a cornerstone of connectivity. It's the backbone that supports your organization's daily operations, ensuring data flows seamlessly and without interruption. As seasoned experts in your field, you are well aware of the indispensable role that LAN networks play.

Too Many Alarms? Take Advantage of Custom Situations

As IT infrastructures become increasingly complex to monitor and manage –with new compelling technologies such as virtual machines, software-defined networks and containers overlaid onto existing technology stacks– IT operations teams face the additional challenge of nearly unmanageable ticket volumes. Ticket prioritization, correlation, redundancies and sheer speed of ticket generation become problems in and of themselves.

Connect Over Coffee | Cross-Cloud with Megaport Cloud Router (MCR)

Misha Cetrone, VP of Strategic Partnerships at Megaport, shows us that connecting to and moving between multiple public clouds like AWS, Azure, Google Cloud, and other leading cloud computing services using Megaport Cloud Router (MCR) is as quick and easy as having a cup of coffee.

VPN Split Tunneling: A Guide for IT Pros

VPNs (virtual private networks) have rapidly become essential for remote workers and organizations. VPNs provide enhanced privacy, security, and access to restricted resources by creating an encrypted tunnel for internet traffic. However, many IT professionals grapple with the tradeoffs inherent in routing all traffic through a VPN tunnel. VPN split tunneling offers a versatile solution by allowing you to intelligently segment VPN and non-VPN traffic.

Monitoring TLS Network Traffic for Non-FIPS Compliant Cipher Suites

FIPS compliant cipher suites hold the U.S. government's seal of approval, guaranteeing their suitability for federal systems. On the other hand, non-FIPS compliant cipher suites may present security vulnerabilities due to outdated cryptographic algorithms and potential lack of perfect forward secrecy. As a result, it becomes paramount to monitor TLS network traffic for non-FIPS compliant cipher suites.

Take Your Pick! The Best Server Monitoring Tools on the Market

IT professionals are always presented with myriad solutions when seeking additional software for their network infrastructure. When it comes to server monitoring solutions, there are multiple options available. After all, every organization has its own needs, individual infrastructure and software requirements. With that in mind, the following list is a guide to help IT professionals select what they believe may be the best possible server monitoring solution for their organization.

The Importance of ICMP in Today's Digital Landscape

In today’s interconnected world, where network performance is crucial for business operations, understanding the significance of ICMP (Internet Control Message Protocol) becomes paramount. Today’s post sheds some light on the critical role of ICMP and why it should not be disabled despite legacy security concerns. By implementing proper security measures, businesses can leverage the benefits of ICMP while mitigating potential risks.

5 Best Network Vulnerability Scanners

Whether you work in banking, education, or run a small business, your network’s security is essential. After all, an insecure network can result in data breaches, theft, unauthorized access, poor network performance, a tarnished reputation, and more. To better understand the state of your network and bolster your network’s defense against current and potential threats, consider using network vulnerability scanners or detection tools to quickly detect existing loopholes.

How improved network performance is a key part of Web 3.0 delivery

Web 3.0 could see the emergence of more decentralized online ecosystem based on blockchain. In this blog, we examine the important role that network performance will play in the arrival of Web3 in order to reduce frustrations and shortcomings with the existing traditional public internet. In this blog we look at the role network performance will play in the delivery of web 3.0.

What is Network Response Time & How to Monitor It

In a world where every second counts, one crucial metric that often flies under the radar is: Network Response Time. You might be wondering, "What exactly is network response time, and why should I care about it?" Well, buckle up because we're about to embark on a journey into the world of network performance monitoring that will not only demystify network response time but also show you how to keep a vigilant eye on it to supercharge your business operations.

What Is Storage Area Network (SAN)? Benefits & Implementation

In the ever-evolving landscape of technology, data has become the lifeblood of businesses. The exponential growth of data has spurred the development of intricate data storage systems to accommodate these volumes efficiently. One such vital player in the realm of data storage is the Storage Area Network (SAN). SANs are paramount in managing and processing large data volumes, ensuring seamless accessibility, scalability, and high availability.

Top tips: Five ways you can reduce unplanned network downtime

Top tips is a weekly column where we highlight what’s trending in the tech world today and list out ways to explore these trends. This week we’re looking at five ways your business can minimize unplanned network downtime. Network downtime is the bane of the IT service provider. It disrupts not only internal operations, but can greatly inconvenience your customer who relies on the uninterrupted access to and the full functioning of your product or service.

Should You Reload or Restart HAProxy?

Managing your load balancer instances is important while using HAProxy. You might encounter errors, need to apply configurations, or periodically upgrade HAProxy to a newer version (to name a few examples). As a result, reloading or restarting HAProxy is often the secret ingredient to restoring intended functionality. Whether you’re relatively inexperienced with HAProxy or you’re a grizzled veteran, understanding which method is best in a given situation is crucial.

A Comprehensive Guide to Network Device Monitoring

As technology advances, the networks required to support it have evolved into complex, interconnected systems that are vital to each organization’s operations. When a network issue causes service interruptions or unexpected downtime, it can have serious consequences not only for service performance but also for the company’s bottom line. Sometimes, all it takes is an overloaded device or a faulty connection, and suddenly everything grinds to a halt.

What is a virtual private cloud in AWS?

Amazon Web Services (AWS) dominates the cloud computing industry with over 200 services, including AI and SaaS. In fact, according to Statista, AWS accounted for 32% of cloud spending in Q3 2022, surpassing the combined spending on Microsoft Azure, Google Cloud, and other providers. A virtual private cloud (VPC) is one of AWS‘ most popular solutions. It offers a secure private virtual cloud that you can customize to meet your specific virtualization needs.

Understanding Kubernetes Network Policies

Kubernetes has emerged as the gold standard in container orchestration. As with any intricate system, there are many nuances and challenges associated with Kubernetes. Understanding how networking works, especially regarding network policies, is crucial for your containerized applications' security, functionality, and efficiency. Let’s demystify the world of Kubernetes network policies.

Mastering Network Monitoring: Your Guide to Uninterrupted Excellence

In the age of digital dominance, where every click and connection propels businesses forward, the lifeline of success lies in the seamless operation of computer networks. Imagine this: your website’s pulse is in perfect sync, applications running smoothly, and customers navigating without a second’s delay. This is where the art of network monitoring steps in, weaving the invisible threads that ensure unparalleled performance and uninterrupted excellence.

Microsoft Dynamics Monitoring: CRM Performance Optimization

Microsoft Dynamics empowers enterprises with efficient customer relationship management (CRM) and enterprise resource planning (ERP) capabilities. As organizations increasingly rely on the seamless functioning of Microsoft Dynamics to drive their core processes, the need for robust monitoring practices has become paramount. This is where Microsoft Dynamics Monitoring steps into the spotlight, bridging the gap between uninterrupted productivity and potential disruptions.

How to Monitor Multi-layer Huawei Switch with MetricFire

Monitoring your network infrastructure plays a pivotal role in identifying potential bottlenecks, optimizing performance, and ensuring seamless operations. By implementing a comprehensive monitoring solution like MetricFire, you gain access to a wide range of features and functionalities designed to simplify the process of monitoring and managing your Huawei switches.

Megaport ONE Demo: Discovery

Jim Brinksma, CTO of Megaport, shows you how easy it is to locate your favorite cloud on-ramps with the Megaport ONE Discovery feature. Megaport ONE offers networking, compute, and orchestration capabilities through a single pane of glass, so users can oversee and simplify management of even the most complex infrastructure with access to detailed insights.
Sponsored Post

Avoiding packet loss: 5 steps to a streamlined network

A network outage for an organization is more than just a pesky annoyance. Not only does a business have to bear the cost of the downturn, but it must endure negative user experiences that damage the organization's reputation. One of the most common causes of network interruptions is network packet loss. Packet loss is caused when the data packets carrying the information over the internet or any packet-switched network fail to reach their destination in an expected timeframe. This latency disrupts communication and serves as a trigger for a potential outage.

Megaport LIVE: Introducing Multicloud Connectivity | Webinar

Megaport LIVE: Introducing Multicloud Connectivity Recorded: 24 August 2023 Speakers: David Sloan - Solutions Architect In this webinar, Megaport Solutions Architect David Sloan breaks down how Amazon Web Services (AWS), Microsoft Azure, and Google Cloud structure their private direct connectivity offerings for multicloud.