Operations | Monitoring | ITSM | DevOps | Cloud

December 2023

Leverage Discovery Server for DX UIM to Optimize Infrastructure Observability

DX Unified Infrastructure Management (DX UIM) is a powerful solution that enables IT operations teams to monitor and manage the performance and availability of their IT infrastructure and applications. One of the key core components of DX UIM is the Discovery Server probe. This probe collects, processes, and stores information about devices and applications. In this blog, we will explore some of the benefits and use cases for Discovery Server.

Installation and Upgrade Enhancements Delivered in DX Platform 23.3

On November 7, 2023, the AIOps and Observability team announced general availability of DX Operational Intelligence 23.3 and DX APM 23.3 for on-premises deployments. While the announcements and Release Notes cover all the important enhancements, several new capabilities deserve additional attention—especially those for installing and upgrading the DX Platform. These enhancements offer the following benefits: Below, you’ll see seven enhancement areas involving installation and upgrades.

Unveil how network traffic monitoring enhances network performance with NetFlow Analyzer

Imagine a financial enterprise that specializes in handling sensitive customer data and financial transactions. In such scenarios, these enterprises rely heavily on their digital infrastructure, which prioritizes data security. It is recommended to incorporate a network traffic monitoring tool to enhance security measures, given that these enterprises are particularly susceptible to cyberattacks and data breaches.

How to Choose the Ultimate Security Router: Guide

Choosing the right security router is more than a technical task; it's a critical step in safeguarding your digital life. In today's interconnected world, where everything from your phone to your fridge relies on a stable internet connection, the importance of a secure router cannot be overstated. A robust security router does far more than just provide internet access; it acts as a guardian against cyber threats, ensuring your personal and professional data remains protected. With a plethora of options available, understanding what makes a router not just good, but great, for your specific needs is key.

Prioritize network bandwidth performance with NetFlow Analyzer's QoS traffic shaping strategies

An unobstructed flow of data is paramount when it comes to achieving a smooth and fast network experience for users. As a network administrator, it is essential to ensure a fair distribution of bandwidth for resource-intensive applications, maintain an uninterrupted flow of network speed, and guarantee a secure network that’s free from internal and external threats. It is also important to keep an eye on latency, packet loss, and jitter and comply with service level agreements (SLAs).

Reasons to Implement Multi-CDN Strategy For Your Website

In the whirlwind of the digital age, where every click counts, a Content Delivery Network (CDN) becomes the unsung hero of the online experience. Imagine this: you navigate to a website, and the content effortlessly loads, images pop up, and videos play seamlessly. That's the magic of a CDN. But wait, there's more - the secret sauce lies in a Multi-CDN strategy. Buckle up as we delve into the human side of turbocharging your website's performance.

Navigating network complexity with OpManager, the network diagram tool you need

Business growth and network expansion happens in tandem, bringing forth an intricate web of connections, potentially leading to challenges in efficient network management and the looming threat of unexpected outages. The repercussions of such outages extend beyond operational disruptions, incurring huge costs for organizations. As networks evolve, locating the root cause of issues becomes increasingly challenging.

Tech Horizons: A Practical Guide for Emerging Data Developers

It's no surprise that the world is becoming increasingly driven by data. We rely on it more and more each day to power our decisions, inform policy, and structure our lives. With the rise of emerging technologies such as machine learning, artificial intelligence, big data analytics, blockchain-based systems, and many other toolsets - navigating this brave new world can seem intimidating or even downright impossible for aspiring tech developers.

The Ultimate Network Assessment Template for Your Business

In the fast-paced realm of IT businesses, it's easy to overlook the intricate web that powers your operations – your network infrastructure. Let's face it, most enterprises only give it the attention it deserves when something goes wrong. And by then, the issue has often snowballed into a full-blown crisis.

Reasons to Switch to a More Reliable Internet Provider

In our hyper-connected digital age, reliable internet service is no longer a luxury but a necessity. Whether for work, education, entertainment, or staying connected with loved ones across the globe, a steady and speedy internet connection is an integral part of our daily lives. Yet, many of us have experienced the frustration and inconvenience of unreliable internet service, which can significantly impact our productivity and quality of life.

How to Identify DNS Issues: The IT Handbook

In the world of the Internet, where every click, request, and data transfer relies on seamless connectivity, Domain Name System (DNS) issues can be the silent disruptors that bring the entire digital ecosystem to a halt. As organizations and individuals become increasingly dependent on the Internet for their day-to-day operations, understanding and troubleshooting DNS problems have become essential skills for IT professionals.

Scaling Up, One Network Bottleneck at a Time #shorts #datadog

Processing data at scale involves moving packets through a network—but what happens when that network isn't cooperative? Anatole Beuzon, a Software Engineer at Datadog, discusses how he investigated and resolved network issues in Datadog’s larger data-processing apps and how you can apply these same methods to your own production workloads.

Monitor Your NGINX Webserver with Telegraf

Monitoring your instance of NGINX gives you insight into your webserver's requests and connections. These insights can help in identifying performance bottlenecks, optimizing configurations, and ensuring efficient load handling. Monitoring all layers of your technology infrastructure allows for the early detection of potential problems such as server overload, disk space shortages, or network issues.

Web App Security vs. API Security: Unified Approaches Reign Supreme

Every day, organizations face external threats as a consequence of exposing their services over the internet. An estimated 2,200+ attacks occur in a 24-hour period—or one attack every 39 seconds. Add the fact that an average data breach (one of many potential consequences of poor security) costs companies $4.45 million, and the need for strong security is impossible to ignore. Web application and API security is key to protecting your infrastructure, data, and users.

The SolarWinds Platform Explained

There are several key components that make up the SolarWinds Platform, which provides a wide range of functionality to address our customers’ needs. In this lightboard presentation Cheryl Nomanson, Staff Technical Academy Specialist for the SolarWinds Academy, walks you through each of the components of the SolarWinds Platform, what they do and how they work together to solve problems for our customers environments, whether on-prem, cloud-native or anywhere in between.

WhatsUp Gold 2023.1: Closing Gaps in Network Visibility

Networks are the lifeblood of organizations. They facilitate data flow, applications, and services while keeping operations running smoothly. However, there’s a critical challenge that often goes unnoticed – network visibility gaps. Progress WhatsUp Gold release 2023.1, available as of December 19, 2023, is set to change that. This release includes several exciting updates meant to close gaps in Network Visibility.

The Power of Paris Traceroute for Modern Load-Balanced Networks

Modern networking relies on the public internet, which heavily uses flow-based load balancing to optimize network traffic. However, the most common network tracing tool known to engineers, traceroute, can’t accurately map load-balanced topologies. Paris traceroute was developed to solve the problem of inferring a load-balanced topology, especially over the public internet, and help engineers troubleshoot network activity over complex networks we don’t own or manage.

15 Ways to Reduce IT Costs in 2024

IT leaders are often caught in a tug-of-war between advancing technology and managing costs. In 2024, the state of the economy is only highlighting this divide. For business and IT leaders alike, this begs the common question: how can we reduce IT costs? Demands for IT continue to spike—especially as the cybersecurity landscape shifts and the appetite for remote work increases.

When to choose a Layer 2 or Layer 3 connection to connect to your cloud

Console Connect is a flexible software-defined self-service platform that's ideal for connecting your enterprise campus or data centre to your public cloud resources over a private connection. But when you make your interconnection you will have to decide between a Layer 2 or Layer 3 connection, also known as the Data Link Layer (L2) and the Network Layer (L3). Let’s take a look at the difference between these options and when you would choose one over the other.

Subnetting - Ultimate Guide - Definition, How & Why?

In computer networking, understanding the concept of subnets and subnetting is crucial for managing and troubleshooting network issues. So, in this ultimate guide, we will explain everything you need to know about subnets, subnet masks, and subnet calculators. Additionally, we will introduce you to popular subnetting tools.

Using VPC Flow Logs to Monitor AWS Virtual Public Cloud

While no man is an island, your Virtual Private Cloud (VPC) is, except it’s a digital island floating in the ocean of a public cloud offered by a cloud service provider (CSP). The VPC means that everything on your digital island is yours, and none of the CSPs other customers can (or should be able to!) access it. You’ve likely been introduced to the shared security model, a sometimes-confusing way that organizations and their cloud-services providers (CSPs) split security responsibilities.

How to Deploy Microsoft LAPS

Securing privileged accounts is of utmost concern to cybersecurity professionals, and Active Directory, Microsoft’s identity and access management service, forms the backbone of the majority of organizations. Active Directory (AD) centralizes user accounts, computers, and resources, ensuring access control, and local administrator accounts wield substantial power within Windows systems.

What Is IPv6? Definition & Full Overview

Poised to redefine the landscape of digital communication stands the groundbreaking achievement that is IPv6, the sixth generation of the Internet Protocol. The evolution from IPv4 to IPv6 marks a pivotal shift in internet technology, driven by the increasing scarcity of IPv4 addresses and the expanding scale of the global network.

What Is CIDR? Classless Inter-Domain Routing Explained

In the early 1990s, as the digital world stood on the cusp of an explosive expansion, the foundational structure of the internet faced a critical challenge: the classful IP addressing system was buckling under its own rigidity and inefficiency. Locked into fixed classes (A, B, and C), this system squandered valuable IP space, leaving the burgeoning network gasping for air as it grappled with rapidly depleting IP addresses.

How to Install and Set up a VPN on Windows Server 2022

A VPN, or Virtual Private Network, enables secure communications over an untrusted network. It enables users to connect to servers and networks from virtually anywhere, creating a secure tunnel between the user and a remote network or server. VPNs ensure data privacy and prevent unauthorized access, ensuring the data transmitted remains confidential and protected from external threats.

What is QoS in Networking: Decoding Quality of Service

Network admins are no strangers to the challenges posed by the ever-growing demand for bandwidth, the diversity of applications, and the varying network traffic requirements. Amidst this complexity, one key player stands tall for optimal network performance – Quality of Service, also known as QoS. In networking, the term QoS holds significant weight, yet its true essence can sometimes elude even the most seasoned administrators.

Rate limiting based on AWS VPC ID

Managing incoming web traffic for your applications is essential to ensuring optimal performance, preventing abuse, and maintaining the security of your cloud infrastructure. To accomplish this, one of the tools HAProxy Enterprise users have at their disposal is rate limiting—the practice of preventing clients from making too many requests and using system resources unfairly.

The Power of AI in Network Monitoring

As per a survey by Comcast Business, around 85% of IT leaders trust AI networking tools for meeting their organization’s goals. This stat alone is enough to show how big of a role AI is playing in network monitoring. And it’s just the beginning, with rapid development in Artificial Intelligence, we might see a lot more sophisticated AI use cases for network monitoring. But how exactly does AI help in network monitoring? What its roles, benefits, challenges, and how to implement it?

Real-time server traffic monitoring: Benefits, best practices, and NetFlow Analyzer

Businesses adopting new technologies are looking for a digital transition that assures streamlined performance upgrades while cutting costs. Servers, an important endpoint of the network, have a great influence on both aspects. Given its significance, proactively monitoring server traffic trends, bottlenecks, and optimizing the network to lessen outages or downtime is indispensable. However, monitoring without powerful strategies and tools that fulfill your business objectives is a lost cause.

Using NetFlow to Monitor Network Traffic

In the intricate landscape of contemporary network management, comprehensive and insightful tools have never been more critical. One tool that stalwartly deciphers the complexities of network traffic is NetFlow. Developed by Cisco Systems, NetFlow is a robust protocol that serves as a cornerstone for understanding, monitoring, and optimizing the flow of data within a network.

Network Latency & How To Improve Latency

Cloud-based services have changed how individuals and businesses get things done. That doesn’t mean it’s all positive — there are some tradeoffs and compromises that come with cloud services and the internet. One major tradeoff is speed. For instance, if your website fails to load within three seconds, 40% of your visitors will abandon your site. That’s a serious dent for anyone doing business online. The culprit here is latency.

What you can't do with Kubernetes network policies (unless you use Calico): Policies to all namespaces or pods

Continuing from my previous blog on the series, What you can’t do with Kubernetes network policies (unless you use Calico), this post will be focusing on use case number five — Default policies which are applied to all namespaces or pods.

Broadcom's ValueOps and AppNeta Solutions Are Now Available on Google Cloud Marketplace

We are pleased to announce that several Broadcom software products are now available on the Google Cloud Marketplace, providing Google Cloud customers with market leading value stream management and network performance monitoring capabilities via a simplified procurement process and consolidated billing with their Google Cloud account.

Canonical joins the OpenAirInterface Software Alliance

Canonical announced today that it has joined the board of the OpenAirInterface Software Alliance (OSA) as a Strategic Member. By working together, both organisations aim to develop an end-to-end, open source and open API wireless software stack, and to deliver turnkey solutions for customers and partners.

Monitor Network Performance Using Telegraf

Monitoring your network performance is important for many reasons and can help in detecting network issues such as bandwidth congestion, latency, packet loss, or hardware failures. By continuously monitoring your network, you can identify areas where improvements can be made, allowing for optimization of resources, better allocation of bandwidth, and overall enhancement of network efficiency.

Importance of Hiding Your IP and Using SOCKS5 Proxy

IP addresses have almost eliminated our postal addresses in this digital era. Whatever we do online, our IP signature is carried forward with our activities. This can make us vulnerable to privacy theft and other malicious activities. So, hiding IP addresses is crucial, especially when we want to maintain anonymity online.

How to Analyze Subscriber Behavior with Kentik

Learn how to analyze subscriber behavior using Kentik. In this post, we focus on the challenges and solutions of identifying and tracking the customers in an IP network while complying with regulations such as GDPR, show how Kentik Custom Dimensions and Data Explorer provide the analysis, and finally touch on how the associated APIs help automate and ease the entire process.

How to Monitor ISP Networks Like a Pro

In today's era dominated by digital connectivity, the pivotal role of Internet Service Providers (ISPs) in shaping our online experiences and facilitating business operations cannot be overstated. The quality of Internet services has emerged as a critical factor, directly impacting both individuals' daily activities and the operational efficiency of companies.

Network Observability 101: A Primer

In today's digital-first landscape, maintaining the health and performance of your network is critical for the seamless operation of your business and its services. To that end, network observability has emerged as a key concept and discipline in ensuring the robustness and performance of networks. But what is network observability?

Top 9 Benefits of Remote Network Monitoring

Are you relying on outdated manual methods to monitor your network? Struggling to keep up with the increasing complexity of your IT infrastructure? Being constantly reactive to network problems instead of proactive in preventing them? If you answered yes to any of these questions, then you’re putting your business at risk. But don’t worry, there’s a way out — Remote Network Monitoring.

Top 6 IPAM Software & IP Address Management Tools in 2023

In the rapidly evolving landscape of network management, and as businesses expand and grow more complex, the demand for efficient and dependable IP address management (IPAM) solutions continues to rise. Why Do You Need IP Address Management Software? What Are the Benefits of IPAM Tools?

How to Set Up Effective Network Monitoring Alerts

Your network is like the beating heart of your digital world. And who's there making sure it's in tip-top shape? That's right – the network admins, the unsung heroes of the networking world. In our deep dive today, we're talking all about navigating Network Health Monitoring to ensure the peak performance of your network! Think of it like checking the pulse of your network.

How To Choose The Right Internet Provider For Your Business

It is crucial to choose the correct internet provider for your organization in this day and age where all corporate operations are digitally mediated. Whether you're a burgeoning startup or an established corporation, a seamless and robust internet connection is the backbone of your daily operations. However, with a plethora of options available, finding the perfect fit for your business can be a daunting task. Fear not, as we delve into the intricacies of this crucial decision-making process, offering insights and considerations to ensure you make an informed choice for your unique needs.

What is a Kubernetes cluster mesh and what are the benefits?

Kubernetes is an excellent solution for building a flexible and scalable infrastructure to run dynamic workloads. However, as our cluster expands, we might face the inevitable situation of scaling and managing multiple clusters concurrently. This notion can introduce a lot of complexity for our day-to-day workload maintenance and adds difficulty to keep all our policies and services up to date in all environments.

8 Best Network Traffic Analysis Tools in 2023

Network traffic analysis is an important aspect of computer network management. Organizations can gain valuable insights into the behavior of their network infrastructure, identify potential security threats, and optimize network performance by monitoring and analyzing network traffic. Several network traffic analysis tools have been developed to aid in this process, each with its own set of features and capabilities. What Is Network Traffic Analysis?

6 Best Network Protocol Analyzer Tools in 2023

Today’s networks support a lot of traffic data, especially with the adoption of embedded systems. Furthermore, the complexity of the data passing through networks has significantly increased. Yet system administrators have to manage and secure these networks effectively. A network protocol analyzer is an essential component of network security and management that every administrator needs.

Monitor HAProxy Metrics and Logs with OpenTelemetry [Step By Step Guide]

For extremely high throughput web applications, it is important to load balance the traffic across multiple servers. However, load balancing the traffic alone is not enough at times. The reverse proxy server that handles the workload needs to be performant, too. In our previous article, we discussed the NGINX reverse proxy server and understood how to monitor it. In this article, we set up monitoring for an even more performant reverse proxy server - HAProxy.

How to Monitor MSP Networks for 360-Degree Visibility

MSPs (Managed Service Providers) have a lot of responsibility on their shoulders. They need to look after the IT infrastructures or networks of their customers to ensure that they’re always up and running. But, what happens when the MSP network itself isn’t performing like it should? Like a business organization, an MSP also faces repercussions due to network downtime. Even a minute of downtime can prevent an MSP from offering the necessary services to its clients.

[Webinar] Are your networks resilient? Learn how network observability can help.

As networks continue to evolve, monitoring methods must also adapt. The key to building resilient networks, whether in the face of cyberattacks or natural disasters, lies in their ability to withstand adverse events and quickly recover. Achieving this requires a comprehensive understanding of network activity.

Unlock the power of network forecasting with machine learning

In the dynamic world of IT, traditional network monitoring approaches are no longer sufficient to manage the complexities of today’s networks—be they wired or wireless. To stay ahead of network events, IT administrators must shift from being reactive to adopting a proactive stance. This transition involves a comprehensive approach to network monitoring that includes forecasting future network requirements with the help of machine learning (ML) technology.

Announcing HAProxy 2.9

HAProxy 2.9 further extends HAProxy's performance, flexibility, and observability. This release came together through the efforts of all the community members who got involved. A release like this requires feature requests, bug reports, forum discussions, code submissions, QA tests, and documentation! In other words, this project is fueled by people like you! If you're interested in joining this vibrant community, it can be found on GitHub, Slack, Discourse, and the HAProxy mailing list.

SLA Management Best Practices for IT Services

The cornerstone of every successful relationship—business or otherwise—is a clear, mutual set of expectations. In IT, this plays out in the form of service level agreements (SLAs). But really, SLAs are only the first step in the journey to a happy customer relationship. The real key to maintaining happy customers over the long term is SLA management. Knowing how important SLAs are raises several questions: How do you create one, what should it contain, and how do you manage them?

Leveraging ISP Network Monitoring for Competitive Edge

In today's digitally-driven landscape, the role of Internet Service Providers (ISPs) has become pivotal in shaping the way we connect and conduct business. The quality of Internet services has evolved into a critical factor, directly influencing individuals' daily experiences and companies' operational efficiency.

Decoding routing outages: 7 tips for safeguarding your network connectivity

Network outages have become a dreaded reality, disrupting businesses, personal lives, and communication channels. While no network is immune to this unfortunate event, the recent Australian telecom outage serves as a stark reminder of the impact such disruptions can have. The outage, which lasted for several hours, caused nationwide disruptions to Australian businesses, essential services, and daily life.

Assessing the real cost of egress charges

Console Connect recently hosted a live webinar called ‘Assessing the Real Cost of Egress’ that discussed the findings of a new research paper which identified an egress fee breakeven point for businesses who switch to a private network solution. The research study, entitled ‘A Business Case for Internet-Bypass Solutions in 2023’ authored by William B.

6 Best IP Address Trackers to Identify IP Addresses in 2023

IP address tracking software has become an important tool for IT professionals and internet users. Stay with us as we go through the seven best IP address tracking software that can be the game changer for your internet security concerns and other uses. What Is an IP Address? Why Do I Need IP Address Tracking Software? Different Types of IP Tracker Tools 6 Best IP Address Trackers 1. SolarWinds IP Address Manager (Free Trial) 2. Advanced IP Scanner 3. GestioIP 4. BlueCat IPAM 5. ManageEngine OpUtils 6.

Hyperscalers: Reshaping the Optical Transport Market - And Telcos are Getting the Picture

Hyperscalers are driving the shape of new metro optical networks – literally. AWS, Microsoft and Google have reshaped data center to data center connectivity over the years and now, as they populate their data centers with telecoms equipment, they are deploying it in higher density, with a better power utilization than telcos get. This is because they are not depth constrained so can go up to 600 millimeters deep unlike the standard telco 300mm hard limitation.

Nginx Metrics and Logs Monitoring with OpenTelemetry

Nginx metrics and logs monitoring are important to ensure that Nginx is performing as expected and to identify and resolve problems quickly. In this tutorial, you will install OpenTelemetry Collector to collect Nginx metrics and logs and then send the collected data to SigNoz for monitoring and visualization. In this tutorial, we cover: If you want to jump straight into implementation, start with this pre-requisites section.

What Is Network Access Control (NAC)? Overview & Implementation

Whether you’re an in-house IT professional or a managed service provider, ensuring the security and integrity of your networks is a crucial part of your bailiwick. In pursuit of greater security, Network Access Control (NAC) serves as a formidable guardian, ready to protect digital assets by regulating who gains entry to a network. Understanding the fundamental concepts and best practices of NAC is essential for any organization that values data security and network integrity.

How to Measure CPU Usage in Networking

Whether you're troubleshooting performance issues or aiming for proactive management, measuring CPU usage is a key skill for network administrators. In the world of networking, CPU usage serves as a vital indicator of system health, resource allocation, and potential bottlenecks. In this comprehensive guide, we delve into the intricacies of measuring CPU usage in networking.

What Is Network Optimization?

A fast, dependable, and efficient network is critical for business success in today’s connected world. Network optimization is a vital component of network management that can assist organizations in improving network performance, lowering costs, increasing security, and improving user experience. Network optimization is more important than ever with the growing demand for high-speed connectivity and real-time data processing.