VXLAN network

VXLANs: Applying Virtualization to Networks.

April 11, 2019

VXLAN Network: a network between virtual machines, wherever they are The development of VXLAN technology or extensible virtual networks is usually associated with the implementation of service provider company platforms. However, the fundamental idea around VXLAN is applicable to any platform and arises to …


Citrix NetScaler Monitoring

Citrix NetScaler monitoring using Pandora FMS

April 4, 2019

Citrix NetScaler Monitoring Integrated with Pandora FMS In this article, we offer you the possibility to make an approach to the issue of Citrix NetScaler monitoring, based on the scope of this product line and the visibility challenges involved, to finally propose the solution …


WAN Load Balancers Monitoring

How to monitor WAN load balancers

March 21, 2019

Introduction to WAN Load Balancers Monitoring Since load balancers are active devices that can be included in the design of a WAN, the question arises: Should we adapt our monitoring scheme to include something that could be called Load Balancer Monitoring? To answer this …


monitorización de VDI

VDI Platform Monitoring (Virtual Desktop Infrastructure)

March 5, 2019

VDI Monitoring: All you need to know to face the Challenge The decision to introduce Virtual Desktop Infrastructure (VDI) technology is not an easy one. One of the most important aspects to consider is precisely the administration and monitoring of VDI. From the point …


dark fiber

Let’s talk about dark fiber

February 21, 2019

Dark fiber: concept, pros, cons, challenges and monitoring There is a very interesting alternative in the market in terms of communications services; we refer to the possibility of leasing or buying dark fiber segments. Since the 90s of the last century, many companies have …


hyperconvergence

Hyperconvergence and Monitoring

February 15, 2019

Hyperconvergence and its challenges for monitoring Hyperconvergence, hyperconvergent platforms, hyperconvergent modules, are relatively new terms in the world of data centers. In addition, each technology that emerges or evolves and succeeds in penetrating the market represents new challenges for monitoring platforms. Thus, hyperconvergence is …


Deep Packet Inspection

Deep Packet Inspection: What’s next?

February 7, 2019

Deep Packet Inspection: is this the Future of Analysers? Since all technology traffic analysers have evolved, and in order to answer the question of what the next step in this evolution is many experts suggest that the deep packet inspection is the point to …


traffic analyzers

Traffic Analyzers: I already have a capture, and now what?

January 24, 2019

Traffic Analyzers: What do they do and how are they used? When we are faced with a performance problem related to those responsible for the applications and those responsible for the network platform, we usually think about how useful it would be to have …


unicast flooding traffic

Monitoring Unicast Flooding Traffic

January 17, 2019

Unicast Flooding Traffic: root cause and monitoring Unicast Flooding Traffic is associated with the learning process of network switches. In fact, with this method, switches identify the MAC addresses of the devices that are accessible by each of their ports, thus constructing a table …


Network blind spots featured

Network Blind Spots: Total Visibility or Not

January 3, 2019

Network blind spots: visibility, monitoring and security issues Network blind spots study is framed within a field controlled by three well interconnected elements: monitoring, security and visibility. Here are the two main principles that rule over this universe and are relevant to the topic …


wan monitoring

WAN monitoring: changes associated with the Internet-based model

December 19, 2018

WAN monitoring and the Internet-based model When we think about WAN monitoring we usually start from the basics: the behaviour of remote communication links will directly affect the performance of our applications. Therefore, we understand that if traffic over the communications link experiences high …


anomaly detection within monitoring

Part II: Anomaly detection within monitoring: how can you get started?

December 11, 2018

Anomaly detection within monitoring. Let’s go deeper into this subject In a previous post we introduced anomaly detection as a group of techniques used to identify unusual behavior that does not comply with expected data pattern. In this article we will find out how …


Anomaly detection in monitoring

Part I: Anomaly Detection in monitoring: what can we really do?

December 10, 2018

Anomaly Detection in monitoring: problems we can resolve with it In recent years we have frequently found the term anomaly detection in monitoring. In fact, some monitoring tools have introduced in their features the customized application of anomaly detection algorithms and some companies offer …


wireless monitoring

About wireless monitoring

December 4, 2018

Wireless Monitoring: Relevance and Tools The concept “Wireless Monitoring” is quite broad. In fact, it covers all wirelessly instrumented communications platforms and the monitoring we can do on them. We are talking about everything from the short-range signal of a Bluetooth device to sensors …


software versioning

Software Versioning: From the user’s point of view

November 12, 2018

Software Versioning: a dialogue between Developers and Users Software versioning All companies that develop and market software implement a versioning scheme that, in addition to defining and organizing the work of developers, aims to establish a communication between the company and users. By reviewing …


Data Center monitoring

Let’s talk about Data Center Monitoring

November 7, 2018

Data Center Monitoring: The basis for defining a service The term Data Center Monitoring is used in the communications plan of some companies as if it were a product specially designed for this area. However, when it comes to these ideas we believe that …


cover network TAP

Network Traffic Capture with Network TAPs

October 31, 2018

Network TAP: three situations in which they are necessary Network TAP (Terminal Access Point or Test Access Point) is the most common hardware device used for network traffic capture purpose. A Network TAP is basically a hardware designed to access the traffic between two …



DNS Monitoring: A Necessary Task

October 24, 2018

DNS Monitoring: Reasons and elements to be included When we think of DNS (Domain Name System), there are two thoughts that we all assume to be true and that become natural justifications for the development of a DNS Monitoring scheme: If the DNS system …


Mainframe Monitoring

Mainframe Monitoring: Beyond the Black Box

October 19, 2018

Mainframe Monitoring: Introduction, Challenges and Tools Either because we are implementing an integral monitoring platform, because we want to monitor a data centre or because we need to monitor an application, sooner or later we will have to face the issue of Mainframe Monitoring. …



LPWAN as a communication base for IoT

September 20, 2018

What is LPWAN? An introduction to the IoT communications protocol LPWAN (Low Power Wide Area Network), also known as LPWA or LPN, is a wireless data transport protocol that is now understood as one of the basic protocols for the implementation of IoT. In …


serverless

How to monitor a Serverless Application?

August 3, 2018

Serverless: An introduction and new challenges for monitoring Among other terms under the umbrella concept of cloud computing, we can find the Serverless technology which we have witnessed its growing popularity in the last three years. In principle, the cloud computing concept covers three …


SDN Software Defined Networking cover

How SDN change our vision on networks?

June 28, 2018

SDN: Challenges for Network Administrator’s and Monitoring Last December, Acumen Research and Consulting, a global provider of market research, published a report titled “Software Defined Network (SDN) Market” where they estimated a compound annual growth rate (CAGR) of 47% for SDN in the period …


IT asset management

IT Asset Management: Challenges for an implementation

June 14, 2018

IT Asset Management: Concept, benefits and implementation challenges Most of the companies that develop monitoring systems include within their proposals products associated with IT Asset Management (ITAM) processes. This is sensible if we consider that the processes of collection, maintenance and presentation of the …


observability

Observability and Monitoring, same thing?

May 24, 2018

Observability: a systems’ attribute and its possible influence in Monitoring We have been listening to the term Observability for a while now, always associated with Monitoring and even though the term changes meaning depending on the article we are reading or the conference we …



log monitoring

Log Monitoring: not the ugly sister

February 8, 2018

Log Monitoring: What should we do before we start? Nowadays the most successful monitoring tools have among their options the possibility of monitoring logs. In addition we can find in the market many log management and analytics tools. On the other hand log analysis …


DevOps

DevOps Architecture: Challenges in Monitoring

January 29, 2018

DevOps: What different roles and challenges should Monitoring face? DevOps is a software development methodology that owes its name to the acronym: Dev from development and Ops from operations. That is why DevOps has perhaps unified and simplified two traditionally bad integrated workgroups: software …




root cause analysis

Root Cause Analysis and Monitoring Tools: A Perfect Match

November 16, 2017

Root Cause Analysis and Monitoring Tools: How can they work on complex platforms? Root Cause Analysis (RCA) and monitoring tools have been related for a while, but what is Root Cause Analysis and how is it applied in the world of network and application …


network optimization

Network optimization: monitor, analyse, identify and correct.

November 2, 2017

Network optimization by correcting errors that generate unnecessary Broadcast Network optimization uses platform traffic monitoring as a way to identify performance problems and at best, to prevent these. When we monitor a network segment we can observe both Unicast traffic and Broadcast and Multicast …


help desk system

Implementing a help desk system: Tips to avoid user’s change resistance

October 16, 2017

Help desk system: Communication as key to overcoming user’s change resistance The implementation process of a help desk system in any organization never starts from zero. Regularly, all companies have defined a procedure through which their customers can contact the technical support staff in …


jboss monitoring

JBoss monitoring: How can I do it? What should I know?

October 2, 2017

JBoss monitoring: revision of its theoretical base for its implementation JBoss, the application server developed in Java EE, has become one of the most use free software alternatives for tools such as IBM Websphere and Oracle WebLogic. Hence, the growing interest among administrators and …


percona

Discover what Percona is and why you should forget about MySQL

September 11, 2017

Percona, what is it and why you should forget about MySQL for good. What is Percona? Let’s start at the very beginning, what is Percona? Percona Server started out as a fork of MySQL that promised from the beginning to provide a platform of …