Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Kubernetes Networking with Calico

In this post, I’m going to cover some of the fundamentals of how Calico works. I really don’t like the idea that with these Kubernetes deployments, you simply grab a yaml file and deploy it, sometimes with little to no explanation of what’s actually happening. Hopefully, this post will servce to better understand what’s going on.

Monitoring Unicast Flooding Traffic

Unicast Flooding Traffic is associated with the learning process of network switches. In fact, with this method, switches identify the MAC addresses of the devices that are accessible by each of their ports, thus constructing a table that will then be used to decide the destination of each frame that arrives at the switch.

WLSDM: How to monitor Outbound HTTP Socket connection (back-end outbound http/s response times) performance on WebLogic?

In this blog post we prepared monitoring http/s response times performance via WLSDM Back-End system monitoring features. URLs and URLConnections provide a relatively high-level mechanism for accessing resources on the Internet. Sometimes applications are require lower-level network communication, for example, when you want to write a client-server application.

WAN monitoring: changes associated with the Internet-based model

When we think about WAN monitoring we usually start from the basics: the behaviour of remote communication links will directly affect the performance of our applications. Therefore, we understand that if traffic over the communications link experiences high levels of latency this will negatively impact the response time that our users observe when accessing the applications.

Overcoming The Black Box Problem With Machine Learning in IT Operations

Chronically understaffed and constantly stressed-out IT Ops and NOC teams are overwhelmed by today’s IT noise. Artificial Intelligence (AI) and Machine Learning (ML) can help these teams because ML (and AI) are exceptionally good at processing enormous volumes of very complex data in real-time, or near real-time, and surfacing actionable insights. But ML successes in IT Ops are still hit-or-miss.

Auvik Use Case #6: Identifying Vulnerable Devices From Vendor Recalls and Security Notices

When network hardware vendors issue device recalls, field notices, or security alerts, the implication can be massive for MSPs. Take the 2017 clock signal issue, for example. That huge recall of Intel microchips was a large-scale vulnerability for tons of devices—and meant MSPs had to figure out which devices were affected on which client sites.