Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Feature Spotlight: TCP/UDP Checks

We live in an incredible global economy where workers from all over the world pitch in to complete major products, develop new technology, and change the world. Here at Uptime.com, our workforce is spread across the globe, and we know many of you reading probably have a similar setup. The benefits of hands on a website at all hours of the day are numerous, so long as connectivity remains alive and well. That’s where a TCP/UDP Check provides immeasurable value.

Auvik Use Case #9: Troubleshooting Internal Connectivity

There are few office experiences more frustrating than sending a document to the printer and hearing… nothing. No whirring, no thumping, no document. Your client will probably check if the device is plugged in and turned on, if there’s enough ink, and if paper needs restocking. But if these simple fixes don’t uncover the problem, then they’ll likely call you—and in the past, that meant jumping in the car and driving to the client site.

How to Efficiently Discover Network Resources

Thomas Stocking, co-founder and vice president of product strategy, recently wrote an article titled How to Efficiently Discover Network Resources, featured in The Data Center Journal. The article talks about network discovery tools and processes, and why it’s important to automate and standardize. Many business processes (security management, service delivery and service support) depend on the administrator’s knowledge of the network details.

Visualizing Network Topologies and Traffic (Cloud Next '18)

In this session, we will look at which use cases in the field of network monitoring and management are relevant in a cloud environment and which data Google Cloud Platform provides to gain insights. We will then demo how to visualize traffic flows and topologies using a mix of Google and Open Source tools.

Configuring SYSLOG / Event Log on a Windows Device

Netmon’s complete Network Monitoring Solution can also be used as a centralized SYSLOG and Windows Event Log Server where you can quickly look through many Servers, Workstations or other Network devices’ SYSLOG and Event Log information without having to log into each individual device to see the same information.

June 2018 Online Meetup: Kubernetes Networking Master Class

Since we released Rancher 2.0 last month, we've fielded hundreds of questions about different networking choices on our Rancher Slack Channel and Forums. From overlay networking and SSL to ingress controllers and network security policies, we've seen many users get hung up on Kubernetes networking challenges.

Using the Right Tool for the Job - SolarWinds Lab Episode #66

In this episode, Senior Manager of Product Strategy Chris O'Brien is joined by Head Geeks™ Patrick Hubbard and Leon Adato to explore better tools you can use for sophisticated monitoring challenges - challenges like Cisco® Nexus devices and automated mapping. The solution are techniques that offer both depth of functionality and scalability. You won't want to miss this!

Don't Let These Wi-Fi Pitfalls Trip You Up

When it’s time to add or rework a wireless network for a client, a lot of little things need to line up for the venture to be successful. It’s not enough to simply have an SSID in the air, and if you’re not careful, you risk disrupting your client’s business and damaging your reputation. Though not every business has the same focus, when it comes to Wi-Fi there are a common set of concerns. Make sure these bases are covered.