Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Maximizing Network Performance: Monitoring and Managing in a Full Stack Application Environment

In this 451 Research 4-part video series, senior analyst Mike Fratto shares his views on the advantage of a unified, full stack, scalable and app-centric monitoring approach to old and new SDN networks and what are the key drivers for NetOps.

What's the value of a unified stack and application-centric approach to network monitoring?

In the third part of this 451 Research 4-part video series, senior analyst Mike Fratto shares his views on why full network stack visibility and a application-centric approach to network monitoring will enable successful network operations.

Wifi monitoring: the range of the wireless signal with Pandora FMS

Although since 1985 the federal government of the United States of America provided the radio bands (frequencies) to be used for our daily use, it was not until 1999 when the brand Wi-Fi® was registered, which means wireless fidelity and in that same year was founded the WECA (Wireless Ethernet Compatibility Alliance).

Navigating Network Services and Policy With Helm

Deploying an application on Kubernetes can require a number of related deployment artifacts or spec files: Deployment, Service, PVCs, ConfigMaps, Service Account — to name just a few. Managing all of these resources and relating them to deployed apps can be challenging, especially when it comes to tracking changes and updates to the deployed application (actual state) and its original source (authorized or desired state).

Network Security Monitoring with Suricata, Logz.io and the ELK Stack

Suricata is an open source threat detection system. Initially released by the Open Information Security Foundation (OISF) in 2010, Suricata can act both as an intrusion detection system (IDS), and intrusion prevention system (IPS), or be used for network security monitoring.