Kentik’s Aaron Kagawa and Crystal Li explain VRF (virtual routing and forwarding) and Kentik’s unique solution for understanding where VRF traffic exits your network.
Kentik’s Greg Villain and Philip De Lancie explain the various benefits of True Origin™ and how ISPs can use it to see what content is most valuable to subscribers, how it impacts the network, and how to deliver a better subscriber experience. Includes a quick tutorial on setting up a Sankey chart to explore video traffic volumes.
Kentik CTO, Jonah Kowall, explains the challenges inherent in ensuring visibility in the age of network overlays, plugins, and public clouds… and how Kentik addresses Kubernetes and other overlay technologies.
Kentik’s Aaron Kagawa explains why today’s network analytics solutions require new types of contextual data and introduces the concept of Universal Data Records. Learn how and why Kentik is moving beyond network flow data.
Customer success engineer Dan Kelly explains how Race Communications used Kentik’s powerful network analytics to identify malicious traffic associated with the Mirai botnet, determine which of Race Communications’ customer IP addresses were being exploited, save its online IP reputation and fend off other types of DDoS and botnet attacks.
Multi-cloud is quickly becoming a new-normal deployment scenario. In this post, we look at how to maintain visibility within hybrid and multi-cloud architectures. We also outline requirements for modern cloud monitoring tools and introduce Kentik’s support for Azure NSGv2 Flow Logs.
As enterprises integrate their networks with their public cloud strategies, several best practices for network teams are emerging. In this guest blog post, Enterprise Management Associates analyst Shamus McGillicuddy dives into his recent cloud networking research to discuss several strategies that can improve the chances of a successful cloud networking initiative.
In this post, we provide an overview of a new research report from EMA analyst Shamus McGillicuddy. The report is based on the responses of 250 enterprise IT networking professionals who note challenges and key technology requirements for hybrid and multi-cloud networking.
Today almost every type of organization must be prepared to mitigate DDoS attacks and proactively defend their networks. In this post, we discuss our newly added BGP Flowspec support in Kentik Detect. This enables our customers to have the granularity needed to detect attack traffic in real time and mitigate attacks faster.
If you are at the beginning of the journey to modernize your application and infrastructure architecture with Kubernetes, it’s important to understand how service-to-service communication works in this new world. In this blog post, we provide a starting point for understanding the networking model behind Kubernetes and how to make things simpler and more efficient.