Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

The 95th Percentile: How to Manage Capacity Before You Run Out

One of the largest challenges with network bandwidth metering is the way traffic flows. Traffic comes in bursts. It’s never a constant, predictable stream of data you can measure once, spec hardware for and be done with (wouldn’t that be nice?!). Instead, you need to account for the dynamic nature of bandwidth utilization and its impact on performance. You’ll never be able to predict every burst of traffic your network experiences.

What's in a Name? "Network Specialist" vs. "Network Engineer"

The meanings behind job titles can be an elusive thing in that they might only make sense to the people actually in the roles. Take networking jobs. It’s pretty common for people to think some titles can be used interchangeably, and that depending on where you work, a job may have a different name. In some cases, even IT professionals believe that the network specialist vs engineer are jobs are really the same responsibilities.

Detailed Guide to Basic Switch Configuration

Though I’m a big believer in the importance of network configuration management , even I’ll admit that network switch configuration from a command-line interface (CLI) is still one of the most fundamental network engineering skills you can have. It’s also one of the harder things to pick up if you’re new to the field. And it’s not just knowing what commands to enter. It isn’t always obvious what should be part of a basic configuration.

Dealing with Rogue DHCP Servers

You’ve probably happened across this little conundrum at least once or twice—troubleshooting a network issue where users are connecting to the network, but they aren’t able to access any resources or the internet. You start going through your troubleshooting workflow: check physical layer, data link layer, network layer… and there’s the problem. The device has an IP address, but it’s not an IP address you’d expect to see on your network.

Observability vs. Monitoring: What's the Difference?

People often conflate monitoring and observability, and I can’t blame them. Marketers often use the terms interchangeably. However, monitoring and observability are two fundamentally different but related things. Understanding the differences between the two both technically and intuitively can help you become a better network troubleshooter, architect, and manager. After all, like many buzzwords before it, observability is an important concept if you can get past the fluff.

What is Network Visualization?

Network visualization is the practice of creating and displaying graphical representations of network devices, network metrics, and data flows. In plain speak, it’s the visual side of network monitoring and analysis. There’s a variety of different subcategories of network visualization, including network maps, graphs, charts, and matrices. In the world of IT networks, network management software will usually have some type of network visualization features built-in.

3 Ways to Use Auvik APIs for External Reporting

Every IT team has its own strategies, goals and objectives to help move themselves and their company forward as a whole. As part of this, management relies on the metrics and data reports from their networking department to help signal if the effort is making progress towards those goals and objectives. The data for which lives within the tools and systems used by techs every day.

What is Network Optimization? 8 Reliable Techniques

Network optimization is a set of tools and techniques used to improve network performance and reliability. As such, it’s not a “one and done” operation but an ongoing process. Business requirements dictate a certain level of performance, but time and budget often limit what you can and can’t tweak. So, you optimize within those constraints.

The What and The Why of TLS Inspection

Connecting to nearly any web page today, you’re more often to see a URL that begins with “https://” instead of “http://”. Wondered what the “S” is for? It stands for “secure”, but more importantly, it identifies that the connection is taking place over a secure channel using the Transport Layer Security (TLS) protocol. But what is TLS, and beyond that, what’s a TLS inspection?