Kentik - Network Observability

Kentik Blog

Most Recent
by Avi Freedman
by Avi Freedman
by Avi Freedman
by Avi Freedman
by Avi Freedman
by Avi Freedman
by Aaron Kagawa, Crystal Li
by Ken Osowski
by Crystal Li, Jim Meehan
by Ken Osowski
by Jim Meehan, Greg Villain
by Crystal Li

Beyond Hadoop

April 11, 2016

As the first widely accessible distributed-computing platform for large datasets, Hadoop is great for batch processing data. But when you need real-time answers to questions that can’t be fully defined in advance, the MapReduce architecture doesn’t scale. In this post we look at where Hadoop falls short, and we explore newer approaches to distributed computing that can deliver the scale and speed required for network analytics.

Read More

Maximizing Network Metadata Value

March 21, 2016

The plummeting cost of storage and CPU allows us to apply distributed computing technology to network visibility, enabling long-term retention and fast ad hoc querying of metadata. In this post we look at what network metadata actually is and how its applications for everyday network operations — and its benefits for business — are distinct from the national security uses that make the news.

Read More

Evolution of BGP NetFlow Analysis, Part 2

March 14, 2016

In part 2 of this series, we look at how Big Data in the cloud enables network visibility solutions to finally take full advantage of NetFlow and BGP. Without the constraints of legacy architectures, network data (flow, path, and geo) can be unified and queries covering billions of records can return results in seconds. Meanwhile the centrality of networks to nearly all operations makes state-of-the-art visibility essential for businesses to thrive.

Read More

BGP Routing Tutorial Series: Part 1

February 08, 2016

Border Gateway Protocol (BGP) is a policy-based routing protocol that has long been an established part of the Internet infrastructure. Understanding BGP helps explain Internet interconnectivity and is key to controlling your own destiny on the Internet. With this post we kick off an occasional series explaining who can benefit from using BGP, how it’s used, and the ins and outs of BGP configuration.

Read More

Exploring for Insights on Anomalous Network Traffic

January 11, 2016

By actively exploring network traffic with Kentik Detect you can reveal attacks and exploits that you haven’t already anticipated in your alerts. In previous posts we showed a range of techniques that help determine whether anomalous traffic indicates that a DDoS attack is underway. This time we dig deeper, gathering the actionable intelligence required to mitigate an attack without disrupting legitimate traffic.

Read More
We use cookies to deliver our services.
By using our website, you agree to the use of cookies as described in our Privacy Policy.