Operations | Monitoring | ITSM | DevOps | Cloud

Auvik

Detailed Guide to Basic Switch Configuration

Though I’m a big believer in the importance of network configuration management , even I’ll admit that network switch configuration from a command-line interface (CLI) is still one of the most fundamental network engineering skills you can have. It’s also one of the harder things to pick up if you’re new to the field. And it’s not just knowing what commands to enter. It isn’t always obvious what should be part of a basic configuration.

Dealing with Rogue DHCP Servers

You’ve probably happened across this little conundrum at least once or twice—troubleshooting a network issue where users are connecting to the network, but they aren’t able to access any resources or the internet. You start going through your troubleshooting workflow: check physical layer, data link layer, network layer… and there’s the problem. The device has an IP address, but it’s not an IP address you’d expect to see on your network.

Observability vs. Monitoring: What's the Difference?

People often conflate monitoring and observability, and I can’t blame them. Marketers often use the terms interchangeably. However, monitoring and observability are two fundamentally different but related things. Understanding the differences between the two both technically and intuitively can help you become a better network troubleshooter, architect, and manager. After all, like many buzzwords before it, observability is an important concept if you can get past the fluff.

Auvik Presents: Rollup & Retrospective Q2 2021

We’re highlighting value in use cases for network monitoring and management! Auvik has rolled out changes you’ll want to know about. Join Patrick Albert, VP Product Management, and Julie Forsythe, VP Engineering, for a retrospective of the past few months of development and to learn about a few works-in-progress in this informational webinar.

What is Network Visualization?

Network visualization is the practice of creating and displaying graphical representations of network devices, network metrics, and data flows. In plain speak, it’s the visual side of network monitoring and analysis. There’s a variety of different subcategories of network visualization, including network maps, graphs, charts, and matrices. In the world of IT networks, network management software will usually have some type of network visualization features built-in.

3 Ways to Use Auvik APIs for External Reporting

Every IT team has its own strategies, goals and objectives to help move themselves and their company forward as a whole. As part of this, management relies on the metrics and data reports from their networking department to help signal if the effort is making progress towards those goals and objectives. The data for which lives within the tools and systems used by techs every day.

Increase Efficiency with an IT Command Center: N-able Passportal and Auvik

In this webinar, co-hosted by Max Eidsvik of N-able Passportal and Patrick Albert of Auvik, you will learn steps you can take to create an IT command center that will make you more efficient and more proactive. Our hosts discuss best practices including documenting all processes, recording device support information, keeping a full inventory, standardizing client information, linking complimentary documents, and more!

What is Network Optimization? 8 Reliable Techniques

Network optimization is a set of tools and techniques used to improve network performance and reliability. As such, it’s not a “one and done” operation but an ongoing process. Business requirements dictate a certain level of performance, but time and budget often limit what you can and can’t tweak. So, you optimize within those constraints.

The What and The Why of TLS Inspection

Connecting to nearly any web page today, you’re more often to see a URL that begins with “https://” instead of “http://”. Wondered what the “S” is for? It stands for “secure”, but more importantly, it identifies that the connection is taking place over a secure channel using the Transport Layer Security (TLS) protocol. But what is TLS, and beyond that, what’s a TLS inspection?