Monitoring virtualization platforms and networks

Small and large businesses alike, opt for virtualization to optimize resource management. While you have a whole list options such as VMware, Hyper-V and Nutanix, monitoring them for their availability is just as important. Watch this webinar and learn how monitoring virtualization platforms and the underlying network infrastructure works to your benefit.

6 Network Monitoring Best Practices that Every IT Team Should Focus On

The network monitoring teams can now tap into Internet-of-Things, software-level network, and cloud-based services to ensure maximum uptime and optimal network performance. However, adapting to these technologies would mean defining new practices for legacy architecture integration, reengineering the monitoring workflow, and evaluating the toolkit for enhancing comprehensive and layered network management.


Splunking Azure: NSG Flow Logs

Azure Network Security Groups (NSG) are used to filter network traffic to and from resources in an Azure Virtual Network. If you’re coming from AWS-land, NSG’s combine Security Groups and NACL’s. Splunking NSG flow log data will give you access to detailed telemetry and analytics around network activity to & from your NSG's. If that doesn’t sound appealing to you yet, here are some of the many things you could Splunk with your network traffic logs from Azure.


Insecure by Default - Kubernetes Networking

Traditional network security includes protection against layer2 and layer3 spoofing attacks. Many security teams don’t realize it, but these threats are still relevant when running applications on a Kubernetes cluster in the cloud. You might be using a complex container network, but that doesn’t mean that simple spoofing attacks between pods aren’t possible. This matters because it dramatically increases the blast radius of compromised pods.


5 Great Reasons to Store and Analyze Centralized Logs

Whether you’re trying to troubleshoot a problem, defend against attacks, or simply optimize your environment, event logs are your best source of information. More than that, not logging or ignoring your logs is like not checking your blindspot when you’re changing lanes—sooner or later you’re going to seriously regret it because the effects will be disastrous.


Is That Bot Really Googlebot? Detecting Fake Crawlers with HAProxy Enterprise

Detect and stop fake web crawlers using HAProxy Enterprise’s Verify Crawler add-on. How your website ranks on Google can have a substantial impact on the number of visitors you receive, which can ultimately make or break the success of your online business. To keep search results fresh, Google and other search engines deploy programs called web crawlers that scan and index the Internet at a regular interval, registering new and updated content.


Debugging 5 Common Networking Problems With Full Stack Logging

Infrastructure is a complex and difficult concept for developers. When an issue occurs, where do you even begin to look? I’ve spent years of my life playing the “What looks like one but not like the other” game, wrestling with confirmation bias and hunting through haystacks of logs to find a clue to my hosted applications. This takes away from time spent improving my applications—and it isn’t fun.


Visualizing NOC Operations with GroundWork NOC Boards

A monitoring system is a shared tool. It’s useful for teams to operate from the same source of information, since subjective opinions can lead insights astray, especially when troubleshooting systems and network issues. You need a single source of truth. A monitoring dashboard with drill-down capability is a basic tool for any NOC staff. Often displayed on kiosks or wall-mounted in the Network Operations Center (NOC), dashboards let you know at a glance whether anything needs attention.