Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Splunking Azure: NSG Flow Logs

Azure Network Security Groups (NSG) are used to filter network traffic to and from resources in an Azure Virtual Network. If you’re coming from AWS-land, NSG’s combine Security Groups and NACL’s. Splunking NSG flow log data will give you access to detailed telemetry and analytics around network activity to & from your NSG's. If that doesn’t sound appealing to you yet, here are some of the many things you could Splunk with your network traffic logs from Azure.

Is That Bot Really Googlebot? Detecting Fake Crawlers with HAProxy Enterprise

Detect and stop fake web crawlers using HAProxy Enterprise’s Verify Crawler add-on. How your website ranks on Google can have a substantial impact on the number of visitors you receive, which can ultimately make or break the success of your online business. To keep search results fresh, Google and other search engines deploy programs called web crawlers that scan and index the Internet at a regular interval, registering new and updated content.

5 Great Reasons to Store and Analyze Centralized Logs

Whether you’re trying to troubleshoot a problem, defend against attacks, or simply optimize your environment, event logs are your best source of information. More than that, not logging or ignoring your logs is like not checking your blindspot when you’re changing lanes—sooner or later you’re going to seriously regret it because the effects will be disastrous.

Visualizing NOC Operations with GroundWork NOC Boards

A monitoring system is a shared tool. It’s useful for teams to operate from the same source of information, since subjective opinions can lead insights astray, especially when troubleshooting systems and network issues. You need a single source of truth. A monitoring dashboard with drill-down capability is a basic tool for any NOC staff. Often displayed on kiosks or wall-mounted in the Network Operations Center (NOC), dashboards let you know at a glance whether anything needs attention.

Network Monitoring: More Dashboards Lead to More Clutter. Here is What the Experts Do.

Cloud and digital transformation have made business operations more efficient than ever. However, with more connected tools, devices, and platforms, monitoring has become a major challenge for IT professionals. Here is a simple analogy – imagine, you are the captain of a ship with thousands of passengers. The entire ship’s control rests in your hands. To better understand what is going on in your ship, you have installed various tools.

Monitoring Within the Enterprise Network

Most businesses rely on communication and collaboration tools like email, Zoom, Teams, etc. So, staying connected over a reliable network can go a long way to increase efficiency and security in the day to day business. A corporate network that connects geographically dispersed users, from areas that could be anywhere in the world, is called an Enterprise WAN. Every enterprise has special use cases for certain network designs that meet the specific needs of the individual business.

Use proxy to process complex or aggregated data

Imagine you need a monitor to react to a derivative of several performance values. For example, you could need to only trigger alert if CPU load and free memory have both crossed certain thresholds. If those monitors are related to the same host, you can always use generic monitor type, such as Script or Program, Python script etc. and do whatever math is required. What should you do if the performance values can only be taken from different hosts? There are several solutions.

Transform the way you manage IT operations with the right network monitoring solution

Business-critical operations rely heavily on network performance. This means there’s a ton of pressure on IT teams to monitor the network effectively. There are numerous aspects to network monitoring, including virtual server monitoring, automation, baseline violation alerting, event logging, availability monitoring, and health monitoring.

Become FIPS Compliant with HAProxy Enterprise on Red Hat Enterprise Linux 8

Guarantee strong encryption by enabling ‘FIPS mode’ with RHEL and HAProxy Enterprise. SSL and its successor TLS are protocols that safeguard web traffic as it crosses the Internet, encrypting communication and protecting it from tampering. However, the encryption algorithms within these protocols are subject to change over time as vulnerabilities are discovered or as better encryption methods become available.