Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

How BGP propagation affects DDoS mitigation

We often think of DDoS attacks as volumetric malicious traffic targeted against organizations that effectively take a service offline. Most frequently detected by anomalous behavior found in NetFlow, sFlow, IPFIX, and BGP data, what may not be well understood is how the DDoS mitigation works and how it’s possible to visualize the effectiveness of the mitigation during and after an attack.

How BGP propagation affects DDoS mitigation

Doug Madory, Kentik director of internet analysis, and Phil Gervasi, director of tech evangelism, discuss the nuance of coordinating the mitigation of a DDoS attack and how we can use Kentik to see the propagation of BGP announcements on the public internet before, during, and after the DDoS attack mitigation.

4 Website Security Threats (2022) + Solutions

For server administrators tasked with ensuring the reliable operation of their web applications, the thought of a lurking cyberattack can be one to lose sleep over. An attack on your system and the services you provide could render your web applications unresponsive. What’s worse, important information that depends on privacy and the careful storing of data is put at risk.

9 tips for keeping down cloud expenditure

At first, the benefits of public cloud adoption are clearly recognisable: newfound agility through an all-you-can-eat and on demand buffet of services, platforms, and infrastructure. But without appropriate monitoring, guardrails and process changes, this can change fast. While the perception is that cloud offers unlimited scalability and lower costs by only charging for the resources you use, the truth is that customers pay for the resources they order, whether they use them or not.

Startup and running configuration management

Configurations are considered the heart of network infrastructure. They are often adjusted to improve the overall workflow of the network environment. One small unnecessary change to a configuration can bring down an enterprise’s entire network infrastructure. Therefore, the changes made to configurations must always be checked to ensure they are in sync with the devices to improve efficiency and performance. A network configuration is generally divided into two parts: 1.

How to Monitor SD-WAN Networks

With the increasing use of cloud-based applications, businesses are more reliant than ever on the Internet to deliver WAN traffic. As a result, they’re migrating from MPLS networks to hybrid WAN architectures and SD-WAN technology. Keep reading to learn how to monitor SD-WAN networks with Network Monitoring to identify issues that native SD-WAN monitoring features often miss.

Flows vs. packet captures for network visibility

Recently, I saw some discussion online about how flow data, like NetFlow and sFlow, doesn’t provide enough network visibility compared to doing full packet captures. The idea was that unless you’re doing full packet captures, you’re not doing visibility right. Because I’ve used packet captures so many times in my career, I admit there’s a part of me that wants to agree with this.

Webinar Snippet: How to Monitor SD-WAN Networks

A snippet from our webinar on "How to Monitor SD-WAN Networks." Obkio's Solutions Architect, Sam, explains monitoring SD-WAN Internet connection with Obkio. Obkio is a simple Network Monitoring & Troubleshooting SaaS solution that continuously monitors network and core business applications performance to identify intermittent issues and improve the end-user experience.

Webinar Snippet: How to Monitor SD-WAN Networks - Monitoring Agents

A snippet from our webinar on "How to Monitor SD-WAN Networks." Obkio's Solutions Architect, Sam, explains deploying Monitoring Agents in key network locations. Obkio is a simple Network Monitoring & Troubleshooting SaaS solution that continuously monitors network and core business applications performance to identify intermittent issues and improve the end-user experience.