Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Preserve Stick Table Data When Reloading HAProxy

With HAProxy situated in front of their servers, many people leverage it as a frontline component for enabling extra security and observability for their networks. HAProxy provides a way to monitor the number of TCP connections, the rate of HTTP requests, the number of application errors and the like, which you can use to detect anomalous behavior, enforce rate limits, and catch application-related problems early.

Operationalizing Experience in the New Enterprise Network

With the latest release of our network monitoring and digital experience monitoring software, we are proud to introduce an industry-first Experience-Driven NetOps solution, taking network visibility to the new enterprise network, expanding beyond the network edge to ISP and cloud providers. The DX NetOps 22.2 release will enable teams to operationalize the new enterprise network, focus on user experience, and avoid chasing utilization spikes.

What is User Datagram Protocol (UDP)?

One of the easiest transport layer protocols available in the TCP/IP protocol suite is the User Datagram Protocol (UDP). The communication mechanism involved is minimal. With UDP, neither the receiver nor the sender receives any acknowledgements of packets received. This protocol's shortcoming makes it unreliable and easier to process than many other protocols. Although UDP is considered an unreliable transport protocol, it uses IP services to ensure the best attempts are made to deliver data.

IPv4 vs IPv6 - What are the Differences?

An IP (Internet Protocol) address is a numerical label which is used for addressing he location and identification of the network interface for the devices connected to the computer network. The most used and popular IP version is IPv4 which uses 32-bit for IP addresses. Since the IPv4 became popular and the IPv4 addresses are getting depleted, Ipv6 is now used which uses 128-bit for the IP addresses.

How to Scale with DX UIM's Monitoring Configuration Service, Part 1: Introduction

For today’s IT operations teams, the stakes keep getting higher and demands only intensify. The services these teams are responsible for managing play an increasingly critical role in the prospects of the business, which means optimizing service levels is an absolute imperative. Meanwhile, the environments in play only seem to keep getting larger, more complex, and more dynamic. Given these factors, monitoring is a task that keeps getting more vital and more difficult.

Agent vs Agentless Monitoring: Which is Best?

Agent-based and agentless monitoring are the two main approaches network monitoring tools use to capture and report data from network devices. As the names suggest, the difference between the two is pretty simple: someone has to install extra software(the agent) for agent-based monitoring to work. But, that doesn’t explain why an IT team or an MSP would choose agent-based or agentless monitoring.