Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Quick start monitoring by using lightweight monitors

There are instructions to get started with IPHost Network Monitor, covering most typical situations. However, using the defaults (for both monitors parameters and for network discovery) when looking for hosts and/or monitors can result in rather slow setup. In most cases, it is simpler to create "draft", lightweight monitors just to make sure the service exists and accepts connections, and add actual protocol-specific checks as required.

Monitor Carbon Black Defense logs with Datadog

Creating security policies for the devices connected to your network is critical to ensuring that company data is safe. This is especially true as companies adopt a bring-your-own-device model and allow more personal phones, tablets, and laptops to connect to internal services. These devices, or endpoints, introduce unique vulnerabilities that can expose sensitive data if they are not monitored.

Complement your network monitoring with SNMP traps

Network device monitoring with Simple Network Management Protocol (SNMP) gives you complete visibility into the health and availability of your network devices. Monitoring tools conduct periodic checks to gather device status and performance metrics. The device's status is updated only when a check is initiated by the monitoring system in the defined time interval. Any fault that happens in between polls is only captured when the next check is initiated.

How to Configure Syslog on a Cisco Device

In my previous article, I explained what syslog is and why it’s used. In this article, I’m digging into how to configure syslog on network devices. The explanations and examples will be a bit Cisco specific, mainly because that’s the gear I’m most familiar with. Essentially every modern network device has at least some syslog capabilities, though.

Our Plans with ThousandEyes: Expanding Monitoring Across the Public Internet for All Applications at the Heart of Today's Digital Businesses

Last week, Cisco announced its intent to acquire ThousandEyes, Inc., marking a major milestone as we build toward our vision to provide a Central Nervous System (CNS) for IT. Learn more about what that means for your business.

Everything You Need to Know about Kubernetes Services Networking in Your Rancher Cluster

As a leading, open-source multi-cluster orchestration platform, Rancher lets operations teams deploy, manage and secure enterprise Kubernetes. Rancher also gives users a set of CNI options to choose from, including open-source Project Calico.

How a Telecom Software Company Ensured Service Uptime with Network Monitoring

When you have millions of customers dependent on your connectivity & communication services performing with best possible efficiency, having network downtime because of any device failure is totally unacceptable. One of our customers is a proprietary global telecommunications vendor which designs, builds as well as manages data networks for telecoms all around the world.

Multus: how to escape the Kubernetes eth0 prison

Kubernetes has been successful for a number of reasons, not the least of which is that it takes care of things that application developers may not want to bother with – such as, for example, networking. Multus is a feature that can be used on top of Kubernetes to enable complex networking use cases.

How to perform simple testing of critical network assets state

Certain changes in services or devices can often be misheeded; failure to recognize even subtle changes can later result in unpleasant consequences. Below we list several examples of such incidents; the checks described are rather lightweight and can be run frequently for critical network assets. The cases below assume that any change in current device’ state should be treated as security issue.

HAProxy Go Packages Ecosystem

Under the hood, the HAProxy Data Plane API and the HAProxy Kubernetes Ingress Controller are powered by a shared set of Go libraries that apply changes to an HAProxy configuration file. In this talk, Marko Juraga describes how these libraries are developed and invites you to use them in your own projects when you need to integrate with HAProxy. Watch Marko’s presentation video or read the transcript below. Explore more HAProxyConf 2019 talks in our User Spotlight Series.