Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

TCP Monitoring With AppNeta: Why Expanded Support is a Game Changer

Broadcom continues to expand the capabilities of AppNeta by Broadcom, offering ongoing enhancements in features and value. With the introduction of TCP protocol support, users can now achieve more streamlined setup processes and deeper visibility into modern network paths. These enhancements help eliminate blind spots and improve monitoring accuracy across complex network environments. Review this post to learn more about these valuable new capabilities.

How to Justify Switching Network Management Solutions to Your Leadership Team

Switching network management solutions can be a scary proposition, even when the system you have isn’t working well. After all, network management is the cornerstone of visibility, security, and IT operations, and if something is working “well enough” today, then leadership can be change-averse. However, sticking with a network management platform that isn’t a good fit for your environment can lead to waste, administrative overhead, visibility gaps, and reduced network reliability.

Cloud Pathfinder: A Key to Cloud Network Intelligence

Cloud Pathfinder simplifies cloud troubleshooting by visually mapping connectivity paths between cloud endpoints and integrating the power of AI, identifying where and why traffic is being blocked. By analyzing cloud configuration metadata, it provides instant, actionable insights into routing and security issues — saving engineers hours of manual work.

Monitoring, Observability, and Operational Resilience - SolarWinds TechPod 097

In this episode of SolarWinds TechPod, hosts Chrystal Taylor and Sean Sebring explore the key differences between monitoring and observability with guest Jeff Stewart, GVP of Product Management at SolarWinds. Observability goes beyond traditional monitoring, offering AI-driven insights and a holistic view of system health. Like understanding the anatomy of the body, observability reveals how IT systems are interconnected—where one issue can ripple across the entire environment.

Addressing configuration management in legacy network systems

Legacy network systems keep many enterprises running, but let's be honest—they can be a nightmare to secure. Misconfigurations, outdated protocols, security gaps, or even easy passwords make them easy targets for attackers. If upgrading isn't an option (for financial reasons or because you do not have the resources to refurbish the monolith that your legacy network has become), how do you lock them down? That's where Site24x7 comes in.

Beyond Their Intended Scope: DDoS Mitigation Leak

In this edition of Beyond Their Intended Scope, we take a look at last week’s BGP leak by a DDoS mitigation company which impacted networks around the world. We look at the impacts in both BGP and traffic data, and discuss how RFC 9234’s “Only to Customer” BGP Path Attribute could have helped.

How to View and Understand VPC Flow Logs

If you're running workloads in AWS, you've probably heard about VPC Flow Logs. These logs are your eyes and ears for network traffic in your Virtual Private Cloud, and knowing how to check them properly can save you hours of troubleshooting headaches. Whether you're tracking down connectivity issues or monitoring for suspicious activity, this guide will walk you through checking VPC flow logs step by step, with practical examples you can apply today.