Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Connecting the dots with Event Correlation

We can’t stress enough on the importance of event correlation in network monitoring. Our customers love correlation! For the love of event correlation we’ve published a blog on why modern organizations rely on event correlation. This is the second blog from the correlation series. You might want to read our previous blog before reading this one.

Quick start monitoring by using lightweight monitors

There are instructions to get started with IPHost Network Monitor, covering most typical situations. However, using the defaults (for both monitors parameters and for network discovery) when looking for hosts and/or monitors can result in rather slow setup. In most cases, it is simpler to create "draft", lightweight monitors just to make sure the service exists and accepts connections, and add actual protocol-specific checks as required.

Monitor Carbon Black Defense logs with Datadog

Creating security policies for the devices connected to your network is critical to ensuring that company data is safe. This is especially true as companies adopt a bring-your-own-device model and allow more personal phones, tablets, and laptops to connect to internal services. These devices, or endpoints, introduce unique vulnerabilities that can expose sensitive data if they are not monitored.

Complement your network monitoring with SNMP traps

Network device monitoring with Simple Network Management Protocol (SNMP) gives you complete visibility into the health and availability of your network devices. Monitoring tools conduct periodic checks to gather device status and performance metrics. The device's status is updated only when a check is initiated by the monitoring system in the defined time interval. Any fault that happens in between polls is only captured when the next check is initiated.

How to Configure Syslog on a Cisco Device

In my previous article, I explained what syslog is and why it’s used. In this article, I’m digging into how to configure syslog on network devices. The explanations and examples will be a bit Cisco specific, mainly because that’s the gear I’m most familiar with. Essentially every modern network device has at least some syslog capabilities, though.

Meet Flowmon Packet Investigator

Flowmon Packet Investigator (FPI) is an automated network traffic auditing tool that records and interprets full packet data. Where flow data is not sufficient, and more detail is needed, the Investigator captures all the packets of traffic surrounding the event for in-depth troubleshooting. What sets the Investigator apart, is built-in expert knowledge. It not only provides extensive details but automates the analysis, assessing the captured events, looking for error codes, and providing explanations and suggestions for a remedy.

Our Plans with ThousandEyes: Expanding Monitoring Across the Public Internet for All Applications at the Heart of Today's Digital Businesses

Last week, Cisco announced its intent to acquire ThousandEyes, Inc., marking a major milestone as we build toward our vision to provide a Central Nervous System (CNS) for IT. Learn more about what that means for your business.

Everything You Need to Know about Kubernetes Services Networking in Your Rancher Cluster

As a leading, open-source multi-cluster orchestration platform, Rancher lets operations teams deploy, manage and secure enterprise Kubernetes. Rancher also gives users a set of CNI options to choose from, including open-source Project Calico.