Operations | Monitoring | ITSM | DevOps | Cloud

Kentik

How New Relic uses Kentik for network observability

New Relic is known for empowering the world’s leading engineering teams to deliver great software performance and reliability. And the network that delivers that service to New Relic’s users plays a critical role. Hiccups in the performance of the network between New Relic’s mission-critical service and their users can create a cascade of problems.

How to prepare for a peering-partner business review

Peering is more than just setting up sessions with any AS that will accept one. Peering can involve long-term relationships that require reviews and joint-planning to grow synergy. A critical milestone in any peering relationship is the business review – and when it comes to business reviews, it’s all about preparation. So where to start?

Automation and transformation in IT infrastructure with Jordan Lowe

Co-founder and CEO of Deft, Jordan Lowe stops by Network AF to talk to host Avi Freedman about all things IT infrastructure. Previously known as ServerCentral, Deft continues to innovate on its services to make managing IT infrastructure a better experience for the business and those who run it.

Kubernetes Networking: How to monitor Kubernetes using synthetic testing

Kubernetes enables DevOps efficiency by streamlining application and service deployment and management. While this gives greater control, it also makes it harder to monitor the health of the applications and services. Synthetic monitoring simulates network conditions and user actions by running continuous tests from global locations before adverse conditions impact end users. What you’ll learn.

Using synthetics to get the big picture

Nobody actually cares about the network. Provocative words coming from a network visibility company, you might be thinking. However, consider what you’re doing right now. You’re reading a blog on a website, maybe clicking around other tabs, possibly streaming some music, and likely keeping an eye on your work chat. These are all applications, and that’s what we all truly care about, not the plumbing that delivers them.

The value of performance mesh testing for ISPs, CDNs, telcos and cloud service providers

As a network service provider, you want your customer to see that you consistently deliver excellent performance. You send your customers periodic reports — but those only provide a snapshot. With synthetic tests, you can present your customers with a dynamic report through a public web page, linkshare or a customer branded portal. Watch this webinar replay to learn how Kentik’s API can be used with network performance meshes in Kentik's synthetic monitoring solution to build a live latency report. Kentik’s Anil Murty and Martin Machacek will show you.

4 steps to bring network observability into your organization

The vast majority of corporate IT departments have a network monitoring solution. Typically that solution is built on standalone software platforms. If that’s you, this post is for you. You’re probably hearing a lot about “observability” these days. Generally, that’s the ability to answer any question and explore unknown or unexpected problems to deliver great digital experiences to your users.

Peering, edge computing, and community with Grant Kirkwood | Network AF Episode 16

Chief Technology Officer and Co-founder of Unitas Global, Grant Kirkwood, joins Network AF to discuss motivations for starting the company and where they're at currently. Avi and Grant talk about what it is like to be a service provider and a solution provider (MSP) in one, and how it plays into what Avi calls the APIfication of networks and IT strategy.

Measuring RPKI ROV adoption with NetFlow

Resource Public Key Infrastructure (RPKI) is a routing security framework that provides a mechanism for validating the correct originating autonomous system (AS) and prefix length of a BGP route. Route Origin Authorization (ROA) is a cryptographically signed object within the RPKI that asserts the correct originating AS and prefix length of a BGP route. For as long as the internet has existed, the challenge of securing its underlying protocols has persisted.

The evolution of network visibility

In the old days, it took a bunch of help desk tickets for an engineer to realize there was something wrong with the network. At that time, troubleshooting meant logging into network devices one-by-one to pore over logs. In the late 80s, SNMP was introduced giving engineers a way to manage network devices remotely. It quickly became a way to also collect and manage information about devices. That was a big step forward, and it marked the beginning of network visibility as we know it today.