Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

VPN and Firewall Log Management

The hybrid workforce is here to stay. With that in mind, you should start putting more robust cybersecurity controls in place to mitigate risk. Virtual private networks (VPNs) help secure data, but they are also challenging to bring into your log monitoring and management strategy. VPN and firewall log management gives real-time visibility into security risks. Many VPN and firewall log monitoring problems are similar to log management in general.

Securing Your DNS

When the Domain Name System (DNS) was created in 1983 I imagine its creator Paul Mockapetris and his team had no idea that nearly 40 years later our interconnected world would be so reliant on the very simple, but critical, DNS network service. I have a love-hate relationship with DNS. I love all of the memes I see about how “It’s always DNS”, but I hate that it’s also true—I always forget to check that DNS is working correctly when troubleshooting network issues!

Everything You Need To Know About Data Centre Interconnection

Getting data centre interconnection right is essential for scalable growth and agility. Whether you’re a global enterprise with operations in multiple markets around the world or a SaaS provider looking to roll out in new geographies, data centre interconnection is a key building block for connecting to customers and ecosystem partners. Read on to find out more about.

How to Draw Network Diagrams

Drawing a good network diagram isn’t hard to make, but it can be distressingly rare. Even network engineers with years of experience often draw network diagrams that are jumbled and hard to understand. As a network administrator responsible for the network, it’s vitally important you have a detailed understanding of your network topology. Without this information, even basic troubleshooting can be unnecessarily difficult.

Using Thola for monitoring your network devices

Once upon a time there was a small company in the south west of Germany that used an old check plugin for monitoring its network devices. But as their network got bigger and bigger over time, the plugin (written in Perl) became more greedy than ever before and swallowed all of the available resources. The CPUs were melting and the RAM was about to collapse. So a small team of creative software developers decided to take the fate of their company into their own hands.

Best Practices for Monitoring Your End-User Experience - SolarWinds Lab Episode #94

Knowing if a server has high CPU is helpful, but does it really matter if your end users can still access their apps without performance issues? If you're only monitoring the server side, then you don't have a complete picture of your environment. End-user monitoring can be an extremely valuable tool—if you know how to you use it. Join Product Manager Katie Cole and Head Geek Patrick Hubbard as they dive deep into best practices for Pingdom®, the SaaS-based, end-user experience monitoring tool from SolarWinds.

Monitor Juniper network devices with Datadog

Juniper Networks provides a range of IT network and security devices, including routers, switches, access points, and firewalls. As you scale your on-prem infrastructure with potentially thousands of devices distributed across multiple locations, getting visibility into your entire network can easily become a pain point.