Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Link Monitoring: A Comprehensive Guide to Network Optimization

Links are the plugs, sockets, cables, and electrical signals traveling through a network. Every link implies a function. At the hardware level, electronic signals activate functions; data are read, written, transmitted, received, checked for error, etc. At the software level, instructions activate the hardware (access methods, data link protocols, etc.). At higher levels, the data transferred or transmitted may request functions to be performed (client/ server, program-to-program, etc.).

Regex 101 for Network Admins

Regex—short for regular expressions—is a way to describe a search pattern. They can be used to find a text pattern or string (character sequence) within a larger body of text, such as a sentence or paragraph, but even entire documents and databases. They can be used to quickly find specific text in a text document like a configuration file for a network device. Need to know what IP addresses a device has? What VLANs are on a switch? What devices are using a deprecated DNS server?

What to look for in a Windows network monitoring tool

Monitoring the Windows devices in a network is difficult yet essential since the devices are tasked with the critical functioning of the network. The challenges and complexity increase multi-fold for an enterprise network because each device is associated with many events, services, and processes that must be monitored to ensure the hassle-free operation of both the devices and the network. The devices should be monitored constantly by a network monitoring tool.

How to monitor nginx in Kubernetes with Prometheus

nginx is an open source web server often used as a reverse proxy, load balancer, and web cache. Designed for high loads of concurrent connections, it’s fast, versatile, reliable, and most importantly, very light on resources. In this article, you’ll learn how to monitor nginx in Kubernetes with Prometheus, and also how to troubleshoot different issues related to latency, saturation, etc.

Centralized Log Management for Network Monitoring

It’s been a long few years for your IT department. In the span of one month, you had to make sure that all employees and contractors could work remotely. This meant giving everyone access to all cloud resources and ensuring uptime. Then, you needed to start securing access. Now, you need to shore up all your security as the phrase “zero trust architecture” has recently entered conversations with leadership.

Network Basics: What Is SNMP and How Does It Work?

Simple Network Management Protocol (SNMP) is a way for different devices on a network to share information with one another. It allows devices to communicate even if the devices are different hardware and run different software. And despite any rumors you may hear, it’s not going anywhere anytime soon.

How to Locate a Device Using a MAC Address

Every device on a network has a unique address called IP address, which helps identify the device and enables other devices to communicate with it. “IP” stands for Internet Protocol. The purpose of an IP address is to handle the connection between devices that send and receive information across a network. Without an IP there is no way to establish that connection. Each IP address is a series of characters, such as “192.168.1.1”.

Financial Impact of an Outage

In October 2021, the world’s largest social media platform suffered a massive worldwide outage affecting billions of customers. Facebook has a monthly active user base of 2.8 billion users, which increases to 3.5 billion when you include its subsidiaries such as Instagram, WhatsApp, and Oculus. The platform succumbed to a “Gigalapse,” which happens when a server can’t adequately respond to excessive demand.