Operations | Monitoring | ITSM | DevOps | Cloud


The latest News and Information on IT Networks and related technologies.

What to look for in a Windows network monitoring tool

Monitoring the Windows devices in a network is difficult yet essential since the devices are tasked with the critical functioning of the network. The challenges and complexity increase multi-fold for an enterprise network because each device is associated with many events, services, and processes that must be monitored to ensure the hassle-free operation of both the devices and the network. The devices should be monitored constantly by a network monitoring tool.

How to monitor nginx in Kubernetes with Prometheus

nginx is an open source web server often used as a reverse proxy, load balancer, and web cache. Designed for high loads of concurrent connections, it’s fast, versatile, reliable, and most importantly, very light on resources. In this article, you’ll learn how to monitor nginx in Kubernetes with Prometheus, and also how to troubleshoot different issues related to latency, saturation, etc.

Centralized Log Management for Network Monitoring

It’s been a long few years for your IT department. In the span of one month, you had to make sure that all employees and contractors could work remotely. This meant giving everyone access to all cloud resources and ensuring uptime. Then, you needed to start securing access. Now, you need to shore up all your security as the phrase “zero trust architecture” has recently entered conversations with leadership.

The Keys to Understanding Network Visibility from the End-User Perspective

The core network paths today’s applications take primarily live outside of IT’s control and sight, even though the burden of fixing these paths still resides with network operations. Understanding the dynamic delivery paths is critical to being able to drive successful digital transformation across the enterprise. Without this insight, there is significant risk to end-user experience, IT efficiency and the ability to support an increasingly remote workforce.

Network Basics: What Is SNMP and How Does It Work?

Simple Network Management Protocol (SNMP) is a way for different devices on a network to share information with one another. It allows devices to communicate even if the devices are different hardware and run different software. And despite any rumors you may hear, it’s not going anywhere anytime soon.

How to Locate a Device Using a MAC Address

Every device on a network has a unique address called IP address, which helps identify the device and enables other devices to communicate with it. “IP” stands for Internet Protocol. The purpose of an IP address is to handle the connection between devices that send and receive information across a network. Without an IP there is no way to establish that connection. Each IP address is a series of characters, such as “”.

Financial Impact of an Outage

In October 2021, the world’s largest social media platform suffered a massive worldwide outage affecting billions of customers. Facebook has a monthly active user base of 2.8 billion users, which increases to 3.5 billion when you include its subsidiaries such as Instagram, WhatsApp, and Oculus. The platform succumbed to a “Gigalapse,” which happens when a server can’t adequately respond to excessive demand.

The Auvik Network Device Buyer's Guide

Buying the right network devices is an essential part of network design, and can have an impact throughout the network lifecycle. Get it right, and your network is high-performing, easy to troubleshoot, and reliable. Get it wrong, and downtime, complexity, and costs add up fast. A network device buyer’s guide would probably be really helpful. So we made you one.

Common interoperability challenges for multi-cloud

As cloud technology has matured, hybrid and multi-cloud approaches have become commonplace. Enterprises have discovered that not all applications are suitable for the public cloud, meaning on-premise data centres are still active, and each public cloud has its own strengths and weaknesses, driving businesses to mix-and-match to suit their needs. This results in interoperability challenges for multi-cloud environments.