Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

How to Perform a Forensic Analysis After a Security Breach

In this Kentik demo, Phil Gervasi shows how to perform a forensic analysis after a security breach. Leveraging Kentik's robust visibility into public cloud traffic, we showcase how engineers can effectively identify, analyze, and respond to security incidents. Through a hypothetical scenario, we trace a security alert from its origin—a suspected attack on an Azure-hosted system—to its resolution. Using tools like the Kentik Map and Data Explorer, we identify the attacker's entry point, compromised internal devices, and potential data exfiltration activities.

Troubleshooting a SaaS App in Kentik

Kentik's Phil Gervasi explains how Kentik's network observability platform helps IT professionals troubleshoot performance problems with SaaS applications. He demonstrates how Kentik's network observability platform can monitor popular SaaS providers, such as Office 365, Salesforce, GitHub, Dropbox, and more, using synthetic testing mechanisms. By capturing metrics like packet loss, latency, DNS resolution, and page load time, Kentik provides valuable insights into SaaS performance. Phil takes you through a real-life example of investigating a poorly performing SaaS application and showcases how Kentik's tools pinpoint network latency issues, both regionally and globally.

Troubleshooting an Azure Load Balancer in Kentik Cloud

Achieve in-depth insight into your Azure Load Balancer performance with Kentik Cloud. This video demonstrates how to use Kentik's Data Explorer to filter and analyze Azure traffic, enabling you to evaluate your load balancer's effectiveness and investigate potential performance issues. Learn how to select and use various dimensions of enriched flow data and visualize the balance of traffic through your load balancer. Learn how Kentik can help answer critical performance questions within seconds, streamlining your troubleshooting process.

Azure Virtual WAN Observability with Kentik Cloud

Unravel the complexities of managing your corporate network in the cloud with Kentik Cloud. This video highlights how Kentik Cloud provides a comprehensive, always up-to-date visualization of your hybrid Azure infrastructure, including your Virtual WAN configuration. Learn how to quickly and easily navigate through your infrastructure's architectural blueprint, delve into the performance of specific VWAN hubs, and access vital utilization details. See how Kentik Cloud can help turn tedious troubleshooting into an efficient, user-friendly process. Experience firsthand the power and convenience of having crucial network insights right at your fingertips.

Optimize Azure Costs and Boost Network Performance with Kentik

Explore how Kentik's cloud network observability tools can enhance your Microsoft Azure experience. This video demonstrates how Kentik's rich insights can help you troubleshoot faster, optimize costs, and answer questions about your network across major public clouds. Watch a real-world example of how you can use Kentik to identify under-utilized Azure firewalls, consolidate VNets, and effectively reduce your cloud bill. Discover how Kentik's connectivity, device, utilization, and performance data combined with real-time analysis can fast-track problem-solving and optimize resources.

Azure Cost Attribution by Subscription with Kentik Cloud

Maximize your network efficiency and cost management with Kentik Cloud. This video shows how Kentik Cloud's custom dashboards enable you to identify the bandwidth usage associated with each Azure subscription. Learn how to accurately allocate Azure costs to individual teams or business units, and track usage-based performance issues directly to the source. Empower your organization by aligning your hybrid cloud networking with your business needs through the comprehensive insights provided by Kentik Cloud.

Troubleshooting an Azure ExpressRoute with Kentik Cloud

Learn how to effectively troubleshoot your Azure ExpressRoutes using Kentik Cloud. This video offers a step-by-step walkthrough on diagnosing problems and obtaining crucial information on your ExpressRoute traffic, including instance name, application context, and the ExpressRoute circuit name. Uncover how to filter and visualize data to see the usage of your ExpressRoutes and identify potential problems. From monitoring dropped packets to inspecting ExpressRoute metadata, see how Kentik can provide you with a wealth of real-time information to help resolve issues quickly and efficiently.

Putting the Network in Observability

With the accelerating use of DevOps and cloud-native infrastructure, observability is all the rage. Organizations, large and small, are doing their best to make sense of the logs, metrics and traces generated by their applications to identify performance and availability issues. But what about the network? It seems that many organizations forgot that network telemetry has always been the foundation of any monitoring initiative relating to performance, security, or availability. In this Techstrong Learning Experience, Techstrong Research GM Mike Rothman is joined by Phil Gervasi and Rosalind Whitley from Kentik to discuss how network observability adds depth and context to any APM or security analysis environment. Mike also highlights data from a recent network observability survey done by Techstrong Research. In this learning experience, you’ll learn.

Cloud Visibility: Kentik Cloud Enhancements for AWS

Watch an in-depth walkthrough of using Kentik to streamline incident investigations and improve productivity when working with AWS. We demonstrate how to analyze data related to IP traffic denials across multiple VPCs, identifying security group issues and using the Kentik Data Explorer for enriched flow data visualization. The video also explains how Kentik’s cloud data reporting capabilities enable quick and efficient problem-solving, reducing the time to resolution. It’s perfect for IT teams looking to boost efficiency and tackle common issues related to security groups and access control lists.