skip to Main Content

Product Updates

July / August 2018

The product team here at Kentik is keeping up our relentless pace of improvements, with an emphasis on bringing our customers more solutions with business impact. Here's a look at what we were able to accomplish in July and August.

Universal Search

Universal Search is a powerful tool that provides a unified place to find not only information about a given topic but also links to relevant Kentik Detect portal areas and controls. The idea is to make the portal experience more efficient by minimizing the user's effort and time while maximizing the accuracy and utility of search results.

Universal Search is super-easy to use (think of "Google in Kentik Detect") and is available anywhere in the portal, either via the Search input field in the main portal navbar (indicated with a magnifying-glass icon) or by pressing "Shift + S." As you enter a string in the field, the Universal Search modal (shown below) opens automatically and presents results grouped into categories (e.g. Alert Policies, Reports, Users, Devices, Interfaces, Documentation, etc.).

Universal Search

It takes just a few searches to begin to see the variety of useful results that Universal Search can return:

  • If you search for "alerts" your results include Quick Nav buttons (Active Alerts, Mitigation Methods, Alert Silent Mode, etc.) that take you directly to the relevant page of the portal.
  • If you search for "sampling" you'll see documentation explaining Kentik's recommended sample rate tiers.
  • If you search for terms such as "transit" or "peer," results will include interfaces, reports, and alerts where the term is part of the interface description.

How does Universal Search make your day-to-day usage of Kentik Detect more efficient? Here are just a few examples:

  • If you're configuring a portal Admin setting and you need to refer to the Knowledge Base, use Universal Search to return the most relevant help topics directly within the portal (no need to juggle back and forth between tabs).
  • If you'd like to see a dashboard built by one of your coworkers, but you're not sure of the exact dashboard name, enter the part that you remember (e.g. "EMEA sales report") and Universal Search will find it for you.
  • If you can't remember which network device a given IP is configured on, enter the IP; Universal Search will show a link to the Admin » Interfaces page, filtered to show the interface with that IP.

Leveraging customer feedback, we plan to continue refining Universal Search and finding new ways to put it to work for our users. For additional information, please see the Universal Search topic in the Kentik Knowledge Base or contact our Customer Success team.

Custom Geo (beta)

Custom Geo enables each Kentik customer to organize countries into custom groups so that reports and views generated in Kentik Detect are consistent with the geographical zones already in use elsewhere in their business. Rather than forcing all users to use the same predefined geographies, this feature accommodates the need for each customer to define territories however they want, which (as shown in the image below) can be quite different from company to company.

Custom Geo

Custom Geo is part of a broader initiative to expose new dimensions that bring business logic into flow analytics, thereby making network data meaningful to teams that aren't necessarily network savvy (e.g. interconnection managers and planners, business development individuals, and even executives). In this case, Custom Geos basically correspond to markets or sales territories, composed of multiple countries, for which data can be aggregated and presented together. This capability is especially useful for large worldwide content providers, carriers, and enterprises that need to be able to assess and compare data at the market level, as shown in the side-by-side screenshots below.

Custom Geo Comparison

By default, Custom Geos are set to correspond to continents. To tailor the groupings for your business, go to the Admin » Custom Geo page in the portal (see screenshot below) and follow the instructions outlined in the KB topic Add or Edit Custom Geo.

Custom Geos

Once you've defined your Custom Geos you can start using Custom Geo as a Source and/or Destination dimension for both group-by (e.g. in Data Explorer's Query Dimension dialog, as pictured below) and filtering (in the Dimension Selector dialog).

Query Dimension Dialog

Custom Geo can also be leveraged in the portal Library by building Dashboards in Guided Mode that take Custom Geo as an input. This would allow you to build market-specific dashboards that give interconnection managers or business development teams at-a-glance insight into key vitals for a given market. You could also create a dashboard that allows users to cycle through their markets to inspect a given information-set for each market, like connectivity mix (transit, peering, etc.) by PoP, as shown below.

Markets Overview Dashboard

Given the utility of Custom Geo, we also have plans to extend it into the realm of domestic markets, allowing ISPs to configure markets based on Regions (i.e. sub-countries, like states in the US). For additional information, please see the Custom Geo article in our Knowledge Base or contact our Customer Success team.

Google VPC Flow Logs

Kentik now offers extended network visibility to customers using the Google Cloud Platform (GCP) by supporting Google VPC flow logs as a source of flow records. VPC Flow Logs are NetFlow-like metadata, generated by virtual instances in Google Cloud Platform (GCP), for the network traffic entering, exiting, or within a VPC (between VMs). With VPC flow log support, Kentik customers can now get full visibility into network activity within GCP projects, and also between GCP and traditional on-premises data centers in hybrid cloud architectures.

Google VPC Flow Logs

The cool part about Google VPC flow logs is that very little configuration is required for existing VPC users. As depicted in the functional diagram above, all that's needed is for you to configure VPCs in your GCP projects to send Flow Logs to a Pub/Sub topic, which Kentik subscribes to in order to pull the data. This provides agent-less visibility into all the traffic in the VPC without creating any additional instances. Once the connection is established, flow data from your cloud infrastructure is available within Kentik Detect for visualizations (like the screeenshot below) and alerting, just like data from any other source.

Google Cloud Platform Sankey

For additional information, please see our blog post Kentik for Google Cloud VPC Flow Logs, refer to the KB topic Kentik for Google VPC, or contact our Customer Success team.

Additional Quick Updates

In addition to the larger features discussed above, we've also been busy with a range of enhancements described below.

New Site-based dimensions

We've added the new dimensions "Site Country" and "BGP UE Site Country." While the existing  "Source Country" and "Dest Country" dimensions tag traffic based on the country associated with the source or dest IP of the flow, these new dimensions tag flows based on the country associated with the PoP (and device) that the flows were received from. This allows you to filter or segment traffic by the geolocation of the network entry or exit point, rather than the geolocation of the host(s) that originated or terminated the traffic. These dimensions were added to aid traffic engineering, peering, or customer traffic analyses that rely on understanding the geolocation of network entry and exit points.

Major Update to Geo HeatMaps

Region Maps (a.k.a. sub-country) have been revamped. As shown below, the regions are now fully modeled in the mapping engine, providing easy to read region-based heatmaps.

Region Heat Map

We also now support heatmaps based on Custom Geos (described above), as shown in the example below.

Expanded Service Names

We've expanded the list of Service names that are displayed with well known TCP and UDP Ports when using the Source/Dest Proto:Port dimensions. While we previously resolved only about 2000 service names, we now include approximately 12,000 port/service name mappings, and any port number listed in the public NMAP dictionary is available for resolution. NMAP sources this dictionary both from IANA's allocation master file and their own curation efforts.

New Filter for Interface List

We've added an "SNMP but no Flow" filter to narrow the interfaces listed in the Interfaces List (Admin » Interfaces). Applying the filter will restrict the list to interfaces that should have flow enabled but do not. This is particularly useful when troubleshooting ports that have traffic reported via SNMP but show no flow, the most likely cause being misconfiguration ot the flow-generating device.

Interface Filter

New View Types

We've added two new types of visualizations (see Chart View Types):

  • Sunburst visualization: A density-based view in which the dimensions that make up the key definition are represented as concentric rings that are segmented into wedges representing the top-X results (see Sunburst Chart).
    Sunburst Visualization
  • Horizon charts: A compact time-based visualization in which each of the top-X rows is represented by one "lane" into which different-colored bands of results are overlayed, with higher volume results in front (for a fuller explanation, refer to Horizon Chart).
    Horizon chart

Enhanced Usability and & UI

We've made a number of recent usability and UI improvements:

  • Alerting Device Selector: The Device selector in alerting now matches the Device selection dialog used in Data Explorer, which enables device selection by Device Labels.
  • Device Labels Scalability: Additional colors have been added to allow a greater range of Device Labels.
  • Nesting in Saved Filters: Filters can now be saved even if they contain one or more nested filter groups. Additionally, as shown below, filters with nesting (saved or ad-hoc) can now be used in Alerting (Dataset tab of Alert Policy dialog).
    Nested filters

May / June 2018

It’s been a busy time around here, so we’re just catching up with product update announcements for the last couple of months. Several of the enhancements we’ll look at this time around are foundational, meaning that they’re not only useful now, but they also lay groundwork that will enable us to further extend the capabilities of Kentik Detect in the future. We’ll start, though, with a housekeeping announcement that may affect those of you who’ve been accessing Kentik via a PostgreSQL client…

Deprecated: KDE Access Via Native SQL

Kentik Detect currently supports several ways for customers to use SQL to access their network traffic data stored by Kentik Detect in the Kentik Data Engine (KDE):

As Kentik Detect has expanded it’s become increasingly important to instrument interactions with KDE so that we can measure the impact of ongoing improvements on query performance. Our Query API provides this increased level of instrumentation, while access via native PostgreSQL (used by very few users) does not. So we’ve decided to deprecate direct PostgreSQL access.

What’s changing?

As of Tuesday, June 26th, 2018, we’re phasing out support for KDE access via PostgreSQL clients. Current users will have continued access until January 1, 2019 (your IPs are whitelisted for this interface). If you find that your queries are now blocked, please contact Kentik Customer Success.

Without the constraints of PostgreSQL clients we’ll be better able to expose and support the full capabilities of Kentik Detect via our RESTful APIs. We apologize for any inconvenience caused by this change, and we encourage you to contact us for help in working through any issues that may arise.

PREVIEW HyperScale Custom Dimensions & API

Custom Dimensions provide a mechanism by which Kentik Detect customers can effectively add custom columns — queryable dimensions — to the main tables of the Kentik Data Engine (see Main Table Schema). Our developers have worked up a major upgrade to our Custom Dimensions engine, which we’re calling Hyperscale Custom Dimensions (HSCD). This new approach increases the capacity and agility of Custom Dimensions by eliminating many constraints of the legacy system, particularly with regard to the cardinality of values.

Legacy, UI driven Custom Dimensions Hyperscale Custom Dimensions (HSCD)
Maximum of 10,000 populators
over 12 Custom Dimensions
~100,000s of populators for shared Kentik SaaS setup
~Millions of populators for single-tenant
Kentik On Prem setup
~20 min target ingest-to-flow latency <5 min target ingest-to-flow latency

HSCD Availability and Use

While HSCD is already fully functional, our engineering team is currently completing final refinements in preparation for General Availability release. In the meantime, we encourage you to get familiar with it to see what it can do. So we’re launching HSCD in preview mode and putting it into the hands of customers who request it from Customer Success (

Note that to define HSCD dimensions you’ll use our new HSCD API. Instead of exposing direct REST endpoints like we do for our query and admin APIs, we’re making HSCD available via an Open Source client library, written in Python, that we’ve published on GitHub. We will also soon add the API itself to our API Tester and publish API documentation.

New Custom Dimension UI

Once we activate the new feature for you, you’ll be able to use the Python client to push Custom Dimension mappings, and you’ll see some changes to the controls in your Custom Dimensions dialogs (see screenshot below). The new UI allows:

  • Paging when there is a large number of populators.
  • Searching for Custom Dimension values across a large number of populators.
    Hyperscale Custom Dimension

Stay tuned to this space as more details will follow soon about the powerful features that are enabled by the increased scale made possible by HSCD.

Device Labels

Selecting devices is one of the foundational functions required to return meaningful results in Kentik Detect, not only from ad-hoc queries in Data Explorer but also elsewhere, including the Library’s Saved Views and Dashboards. Our device selector has allowed you to choose groups of devices by type (router or host) or by site (physical location; see About Sites). But until now you haven’t been able to flexibly define your own device groups or to change the devices covered by Dashboards and Saved Views (e.g. add a newly deployed router) without editing the device assignments for each specific view.

Introducing Device Labels

With the recent introduction of Device Labels, those limitations are now gone. A device label is simply a non-exclusive property, any number of values for which can be assigned to (or removed from) any device at any time. Labels allow you to define groups of devices based on any criteria you choose: capacity, the customers they serve, the device manufacturer, etc.

When a query is defined using a device label then the devices whose flow data will be included in the query are determined at run time based on which devices have that label. This means that if you refer to devices via labels when building components such as dashboards, saved views, reports, and saved filters then you can change the devices that a given component covers without going back and revising the component itself. This makes the assignment of devices to queries much less tedious, and it makes the views that use those queries (Dashboards, Saved Views) much easier to maintain as your network evolves.

Using Device Labels

Device Labels are implemented in the portal with a new page (Admin » Device Labels) where you assign labels to devices as shown below.

Assign Device Labels

Depending on where you are in the portal you’ll also see a new Device Selector that’s been redesigned to take advantage of device labels. As shown below, you can still select individual devices from the sidebar, or you can select by label, so that all devices that have the label at query run-time will be covered by the query.

Device Selector

As shown below, device labels are also now available for filtering in the Ad_Hoc filter Groups dialog in both Data Explorer and Alerting:

Device Labels

It’s important to note one area where you won’t find device labels, which is in the Group-By Dimensions selector. Because multiple overlapping labels can be assigned to a given device, it’s not workable for us to break down traffic by labels. Even so, we’re sure that you’ll find device labels to be a very flexible and efficient enhancement to Kentik Detect.

Subtenant Portal

Subtenancy provides a mechanism by which a Kentik customer (e.g. an ISP) can enable each of its own external or internal customers to see a curated set of visualizations and metrics of their own traffic. This has been a recurring ask from existing and prospective Kentik users, and we’re excited to announce the availability of this feature. Subtenancy needs to be activated by Kentik (contact Customer Success for details), after which you’ll see a new page (Admin » Subtenancy) that we’ve created for you to manage subtenancy in the Kentik Detect portal.

Subtenant Portal

As shown above, you begin configuration by defining the properties of your subtenant portal (subdomain, logo, etc.; see Subtenancy Page in our Knowledge Base), which can be thought of as a customer-branded version of the portal Library (see below).

Next you’ll use the Add Subtenant dialog (shown below) to create subtenants that can access the subtenant portal. If you’re an ISP, each subtenant might correspond to one of your business accounts. Alternatively, a large Enterprise might create subtenants that each correspond to an internal team that would benefit from access to specific reports generated by Kentik. For each subtenant you can determine the reports (e.g. Dashboards and Saved Views) that will be available, the traffic that’s covered in those reports, and the subtenant users (identified by email address) that will have access.

Edit Subtenant

The subtenant portal feature will help Kentik customers boost revenue by selling subtenancy as a value-added service. And subtenancy will also increase the “stickiness” of ISP service offerings, which can provide a significant edge in a competitive provider market.

Performance Metrics in Sankey Diagrams

Sankey flow diagrams have long been an important feature of Kentik Detect, used to represent the flow of network data from hop to hop. We’ve recently refined the calculations underlying our Sankeys related to performance metrics, such as percent retransmits or latencies, to give a more accurate picture of these metrics. Our Sankeys also now support bracketing, which enables the coloring of nodes — and the links between them — based on your bracket specifications, which is very useful for performance diagrams.

Performance Metrics


BGP Status Indicators

We’ve reworked the BGP status indicators in the Device List (in Admin » Devices) to better explain the shown status. Previously, if you had v4 BGP enabled, it would show v6 BGP as “not established” even if you had not set it up. Now a tooltip (displayed on mouseover) will now tell you about non-established and not-configured BGP states. As shown below, you’ll see a separate indicator of states for v4 and v6 BGP.

  • Session is not configured:
    BGP Status
  • Session is configured but not established:
    BGP Status
  • Session is established (therefore also configured):
    BGP Enabled and Established

CSV of Unclassified Interfaces

Interface Classification is a quick and easy process that reveals the role of each interface through which your traffic enters and leaves the network. The higher the percent of interfaces you’re able to classify, the better you’ll be able to optimize your network for cost and performance. We now make available a downloadable CSV file that lists all of the interfaces that can’t currently be classified, so that you can take steps to facilitate a better interface classification percentage (e.g. revise SNMP-retrieved description strings).

To export the CSV file, click on the Unclassified Interfaces button below the ring diagram in the Classified Devices pane (right sidebar) of the Interface Classification page (Admin » Interface Classification).

Unclassified Interfaces

In the resulting Unclassified Interfaces dialog you’ll see the list of unclassified interfaces as well as a new Export CSV button at the upper right. When you click the button you’ll see alerts indicating the progress of the export, after which you’ll be able to access the Recent Reports dialog, from which you can download the Unclassified Interfaces report.

CSV of Alert History

Another report that you can now download as a CSV file is a log of all Alerts within a chosen time range and with specific attributes. To enable this oft-requested feature we’ve now added an Export to CSV button on the History page (Alerting » History). The download process is the same as for the Unclassified Interfaces report described above.

Alert History

Once downloaded and opened in a spreadsheet, the CSV file will appear as shown in the screenshot below:


It’s been a busy time around here, so we’re just catching up with product update announcements for the last couple of months. Several of the enhancements we’ll look at this time around are foundational, meaning that they’re not only useful…

April 2018

Spring is here — at least according to the calendar — and April has come to a close. Yet again, our development teams have been hard at work with their continual improvement to Kentik Detect®. So let’s dig right in and take a look at the latest changes…

Kentik Detect Library

Kentik Detect LibraryThe largest and most obvious change we made this month was the rollout of Kentik Detect v3.1, which introduces our new Library section of the portal. If you’ve logged in recently you probably noticed the announcement in a popup that appears at login. The Library gives you a single page from which to create, view, modify, and manage views of your network traffic data. It’s a big step forward in our effort to streamline your workflow when using the portal, and it will enable us to rapidly develop a rich array of preset views for specific use cases.

While the Library replaces the portal's separate Dashboard and Saved Views pages, all of your existing dashboards and saved views have been preserved and are now available in a central location. Access the Library via the main navbar, then use the sidebar to choose views that have been created within your organization or provided by Kentik. You'll be able to move quickly between different views, and to easily edit views, modify properties, and clone existing views to make variations. Learn more about the details in the following Knowledge Base articles:

Users can now make the Library their default landing page via the Default Settings pane of the User Profile (accessed via the drop-down menu at the far right of the main portal navbar).

Focus on Ease-of-Use

The Library is the latest example of our focus on portal ease-of-use, which we’ve mentioned in previous updates. The idea is to empower the consumers of information via dashboards and saved views (created by both power users and consumers). The Library also enables us to release Kentik-provided preset views that address specific use cases. The Library’s consumer-focussed UI supports this goal with the following design features:

Design Features

  • Persistent access: The Library tab is always available for direct access to dashboards and saved views. The list includes views that you’ve designated as favorites and also those that you’ve recently viewed.
  • Ubiquitous search: A search popup (shown at right) that launches from the main navbar means that you can quickly find views wherever you are in the portal.
  • Content organization: Views in the Library can be assigned to categories and are grouped into buckets (personal, company-shared, and Kentik presets).
  • Content discovery: The Library landing page gives us the ability to promote new and featured views, organized by task-specific categories or consumer teams.

The new Library is only one aspect of our recent usability efforts. Some additional steps include:

  • Adding dimensions that enable characterization of network traffic, e.g. Interface Classifiers and Network Classifiers.
  • Upping the portal’s visualization game with new view types (Gauge, Geo HeatMap) and making data more visually useful with Bracketing (application of colors based on value range).
  • Bringing interactivity to dashboards via guided-mode dashboards and dashboard navigation (drill down to deeper views).

More usability enhancements are slated for release in coming months, so keep an eye on this space…

Keyboard Shortcuts

Keyboard shortcuts, enabling greater efficiency for commonly performed tasks, have now come to the Kentik Detect portal. How do you find the shortcut for a given task? Press [SHIFT]+[?] on your keyboard to pop up the shortcuts help menu. As shown in the screenshot at right, the popup is context-sensitive and will display both global shortcuts and those that are specific to an individual page (in this case Data Explorer).

Keyboard Shortcuts

Agent Improvements

Back in October we launched kprobe, our improved host agent software that can be deployed anywhere (in your data center or in the cloud) to gather all kinds of useful data from real traffic on your hosts. We’ve been steadily enhancing kprobe ever since; this month we have a new release that includes a couple new CLI parameters:

  • --status-port gives you the ability to check the status of the agent by defining the port to listen on.
  • --status-host enables access beyond the localhost IP address (

Once the new parameters are configured, you can point your browser to http://host:port/v1/status to get a JSON output of the status.

 "flows-in": {
   "count": 953,
   "1m.rate": 4.297123404852097,
   "5m.rate": 2.286167148965094
 "flows-out": {
   "count": 953,
   "1m.rate": 4.297123404852097,
   "5m.rate": 2.286167148965094

For more information on installing and configuring kprobe, check the Knowledge Base (KB) article on Host Configuration.

Raw Flow Viewer Enhancements

In last month’s product update we introduced a new analytics view called Raw Flow, which enables you to directly examine the flow data stored in Kentik Data Engine (KDE), the back end datastore used by Kentik Detect. We’ve further improved this functionality by adding a filter box and also the option to export the results in CSV format.

Search Raw FlowWith the filter box, filtering is now as easy as entering a string. As the user types, the page refreshes with matching results. Once you’re happy with the results, click the blue Export CSV button to export the flow records. For more about this feature see our KB article on Raw Flow.

Multiple Mitigations Per Threshold

Those readers who’ve used our alerting system know that it’s based on alert policies that are each made up of one or more thresholds that enter alarm state when triggered by user-defined conditions. Alarms generate notifications (email, Slack, PagerDuty, etc.) but they can also automatically initiate mitigation. With our latest iteration you can now assign more than one mitigation per threshold.

What’s the advantage of multiple mitigations per threshold? Below are a few simple examples of why this feature is so useful:

  • You can now use a single policy to configure all of the desired mitigation methods/platforms with which you’d like to respond to a given set of conditions, which is much more scalable than cloning a given policy for each of your appliances so that they can all trigger at the same time for a given condition.
  • Users with mitigation appliances at multiple sites now have the ability to trigger them all at the same time.
  • The response for a given alarm can now include a mix of mitigation types, e.g. RTBH, A10, and Radware. A multi-location DDoS response involving multiple mitigations types is outlined in the following example:
    1. De-preference or stop-announcing a BGP route on Location #1 by injecting a route whose community has been predefined as a flag for these actions.
    2. Announce a broader routing table entry, less-specific than /24 (thus forcing acceptance by Internet peers), for Location #2.
    3. Trigger a 3rd-party mitigation method — e.g. A10 or Radware — on Location #2 to announce more specific prefixes for internal re-direction to a scrubbing center.

MitigationsTo add a second mitigation to an existing policy, head over to Alerting » Policies and click on the name of the policy. In the Edit Policy dialog click the Alert Thresholds tab and scroll down to the Mitigations section. In the drop-down Add Mitigation menu, select the appropriate mitigation platform and click the Add Mitigation button.

For more information about using mitigation, check out our KB article on Alert Mitigation.

Product and Service Notifications

NotificationsFor a while now the portal has included in-session popup notifications about service issues (red background) and when updated versions are available (blue background). Most users find this information helpful, but in some circumstances — e.g. running Kentik Detect on a large monitor in a Network Operations Center (NOC) — users may find the popups to be a distraction. We’ve addressed this by tying notification behavior to the existing "Product Updates" and "Service Updates" settings in the User Profile (accessed via the drop-down menu at the far right of the main portal navbar). Turning off Product Updates will suppress in-session version banners, and turning off Service Updates will suppress in-session popups for system messages (outages, etc). These system messages will still show at login, but new ones will not be shown during an active session. For more information on these notification settings, check out the User Profile topic in our KB.

VLAN Tags and Custom Dimensions

Add PopulatorOne of Kentik Detect’s most powerful features is the ability to add additional context to netflow data using flow tags or custom dimensions (see our Flow Tags and Custom Dimensions KB articles). We’ve now extended this feature by enabling tags and custom dimension populators to match on the VLAN ID of flow records. The value for VLAN ID accepts comma-separated values between 0 and 4095 (inclusive), as well as integer ranges, all of which can be intermingled in the same list.


Guided Mode Dashboard Dimensions

Guided ModeBack in November, our dashboards were enhanced with the guided mode feature, in which the user is prompted to enter or choose the value of a given dimension and that value determines what traffic is displayed in some or all of the dashboard’s panels. The guided-mode dimension for a given dashboard is chosen in the Dashboard Properties dialog (see Guided Mode Settings) using the drop-down Dimension family to filter by menu. We recently added the following additional dimension families that now appear on this menu:

  • Connectivity Type
  • Interface Description
  • Network Boundary
  • Provider
Spring is here — at least according to the calendar — and April has come to a close. Yet again, our development teams have been hard at work with their continual improvement to Kentik Detect®. So let’s dig right in…

March 2018

It's hard to believe it, but we are already wrapping up the first quarter of 2018. As usual, our development team has been hard at work bringing you, our customers, some new features and functionality. Let's take a look at the latest...

Bracketing Enhancements

We introduced quite a few Bracketing Enhancements in last month's product update but the news doesn't end there. This month, we added support for the following view types:

  • Geo HeatMap (for both Regions and Countries, as shown in the screenshots below)

  • Comparison Bar Chart

Additionally, we've refined the way Bracketing works by adding a couple useful controls based on popular demand:

  • Bracketing Ranges The user can now choose if they want the group headings in the table output. This can be very useful to separate the brackets but disabling it saves precious vertical real estate in places like a dashboard panel. To turn this on or off, click anywhere in the Bracketing pane of the Data Explorer sidebar to bring up the Bracketing Options dialog. Enable the Group Results selector if you want the headers or disable the selector to hide the headers
  • In the same pane, the astute reader may have noticed a Trim Overall Range button. This option allows the user to filter out value below or above a certain threshold so they do not appear in the brackets:

    Trim Overall Range

For more detailed information on bracketing, check out our Bracketing Pane Settings Knowledge Base (KB) article.

Single AS-Path Sankey

Sankey Diagrams have historically required a minimum of two dimensions to be selected in the Group-By selector in the Query pane since this visualizations shows a "from" and "to" relationship. We have now relaxed this requirement for Destination BGP AS_PATH given the fact that this dimension has both a "from" and "to" relationship within it.

Single AS-Path Sankey

Generated Charts

It is now possible to generate a series of charts based on the top-N matches for a query dimension. These panels are calculated dynamically at query time, not pre-calculated. For example, this is a set of generated charts showing the top sites for each CDN.

Generated Charts

To get started using this feature, enable the Generate One Chart Per Series selector in the Advanced Options of the Query pane in the Data Explorer sidebar. You can choose how many columns you want and what level of visualization is used for these generated charts.

This feature can be used for configuring panels on a Dashboard -- where it can be turned into an Interactive Dashboard (more on that below).

Interface & Network Classification

Classification Dependency Notification

Some users may have noticed an explanation mark in the Admin sidebar next to Interface Classification or Network Classification.  

A lot of pre-configured dashboards rely on Interface Classification, Network Classification, and Provider Classification being configured by the user. Due to this, we now alert the user when a dashboard, or Data Explorer query for that matter, requires one of these configurations and it is not matching at least 80%.

As mentioned, a notification will also be present in the Admin screen. For more information on configuring these items, check out our Interface Classification KB article or blog, as well as our articles on Network Classification and Provider Classification.

Interface Classification Based on Interface Name

Speaking of Interface Classification, we have made an improvement here as well. Some of our users have mentioned that they have strict rules in place on how they allocated interfaces on the routers and switches in their network. For example, they might put all the core-facing interfaces on the first linecard and all the edge-facing interfaces on the second linecard. For most major vendors, this gives a consistent naming convention to the interfaces (e.g. xe-0/0 for core and xe-1/0 for edge). Giving our users what they want, we have added support for Interface Classification (more information on IC is available in our KB article) based on the name of the interface, including all types of matches: equals, contains, matches Regex.

Dashboard Enhancements

As mentioned previously, Dashboards are becoming a central focus for Kentik Detect. To make dashboards more intuitive and easy to work with, we have made a few enhancements this month:

New Edit Mode

In the past, EDIT mode looked too much like VIEW mode, so we have now added a few visual clues to make it easier for the user to see at a glance which mode they are currently in.

Dashboard Enhancements

Updated Add/Edit Panel Dialog

We also created a much cleaner and easier flow for adding new panels or editing existing ones. You no longer have to switch between Data Explorer and the add/edit panel dialog. We now include the query sidebar and the resulting visualization right in the panel dialog window.

Panel Description

One additional change that users may notice is a Description field in the add/edit panel dialog. The description entered here, will appear as a mouse-over popup when viewing the dashboard panel. This allows dashboard creators to deliver more context for each panel.

Interactive Dashboards

Another new feature we added is called Interactive Dashboards. This feature allows users to click on an item in a panel to get a filtered view based on that data item. The filter applies to all panels on the dashboard and can be seen by viewing the Filters pane in the sidebar.

This feature is enabled using the Cross-Panel Filtering selector in the add/edit panel dialog.

The following view types currently support Cross-Panel Filtering:

  • Time Series Stacked Graph
  • Time Series 100% Stacked Graph
  • Time Series Bar Graph
  • Time Series Line Graph
  • Comparison Bar Chart
  • Pie Chart
  • Tables
  • Gauge

We will be adding support for the remaining view types in the near future. Keep an eye on upcoming product updates for more information.

Filtering Improvements

This month, quite a bit of work also went into improving a few different areas of Kentik Detect's filtering capabilities:

Bi-Directional Interface Classification Filters

Interface Classification results in the following filter criteria being available:

  • Interface ID
  • Interface Name
  • Interface Description

These criteria can now be applied as Source or Destination meaning if either direction matches, the filter will apply.

Invert Perspective

Changing the direction of a filter in a query just got a whole lot easier. In the Ad-Hoc Filter Groups pane of the Filtering Options dialog, there is now a button for Invert Perspective. In this example, clicking the button would change our filter to Source AS Number.

Remove Active Saved Filters

We now support the ability to quickly remove an active saved filter. In the Filtering pane of the Data Explorer sidebar, clicking the X next to an item listed in the Saved Filters section will remove it. Don't forget to re-run your query by clicking the blue Run Query button at the top of the sidebar.

For more detailed information on how to use filters in Kentik Detect, check out our KB article.

Alerting Enhancements

Kentik Detect's powerful anomaly detection, alerting, and mitigation platform has gotten some improvements this month as well. Let's take a look:

Support for Nested Filters

We have added support for nested filters in the alert policy dataset – similar to what has been available previously in Data Explorer's sidebar. This is accessed from the Policies list (Alerting » Policies) by either clicking on an existing policy or clicking the blue Add Policy button. On the Dataset tab, you click on the Edit Filters button to bring up the Filtering Options dialog. For more information on configuring nested filters, check out our AdHoc Filter Interface KB article.

Manual Mitigation TTL

In our November Product Update we mentioned that we have added the ability to start a manual mitigation as opposed to triggering a one-off alert. We've now taken this a step further and added the ability to set a time to live (TTL) on the mitigation so it will automatically stop when the timer expires.

Escalating Thresholds

Our alerting system now supports escalating thresholds. A user can configure multiple Alert Thresholds with different criteria to trigger the threshold. As traffic matching the criteria increases or decreases, the appropriate thresholds will trigger. Different notifications can be tied to threshold level, but mitigation escalation is still under development. Stay tuned to future product updates for more details on that.

For more information on Kentik Detect's powerful alerting system, check out our alerting KB articles or our recent blogs:

Cloud Aware kprobe

This month, our kprobe agent got a couple of updates to make it easier to adopt in a "cloud-native" environment. Let's take a look at what we mean by that:

In cloud deployments there is often a load-balancer that is front-ending a cluster of application server instances. An example diagram is below:

The load-balancer is accepting the HTTPS (TCP port 443) connections and then forwarding the requests to a number of cloud instances. In this type of setup, users typically look at Kentik Detect to get the sum of all HTTPS traffic handled by the instances behind the load-balancer. The ‑‑translate command line option of kprobe now allows you to map the load-balancer IP/TCP:443 to the instance IP/TCP:8080 on each of the instances.

Another cloud deployment trend is VMs being created on the fly using things like auto-scaling or stale instance killer where kprobe needs to be included in a custom image and started with each new cloud instance. This requires that the configuration of kprobe be independent of the VM hostname, IP address, or Kentik device ID. To accommodate this, we have added a couple new features:

  • Kentik Detect Plans now have an "Active Device" count, in addition to the existing "Total device" count. When kprobe first communicates with Kentik Detect, if active count < total count, a new device will automatically be registered. To facilitate this, a new command line argument: ‑‑device-plan option has been made available.
  • If ‑‑device-name isn't specified, the instance's hostname will be used, otherwise it'll be overridden by this flag and appear in the Kentik Detect platform with this name.

To learn more about the current kprobe startup options, check out our Knowledge Base article.

Raw Flow Viewer

Seeing the raw flow data that your device is outputting can be a great troubleshooting tool. To that end, we have implemented a new feature called Raw Flow Viewer (Analytics » Raw Flow) that allows the user to see their raw flow records without having to build a complicated SQL query. Keep an eye on future product updates as we expand this functionality to allow for CSV export of this data. Formal documentation in our KB is forthcoming but until then here is an example of how one might use this feature.

It’s hard to believe it, but we are already wrapping up the first quarter of 2018. As usual, our development team has been hard at work bringing you, our customers, some new features and functionality. Let’s take a look at…

February 2018

We are halfway through the first quarter of 2018 and once again we have a bunch of exciting new updates to Kentik Detect® to share with you. As mentioned in previous updates, a lot of development work these days is focused on ease of use for both technical and non-technical users. But we also made improvements to security and network performance management (NPM) and added a few new features. Let's take a look...

SNMPv3 Privacy Methods

SNMPv3You asked for it, and we added it. Kentik Detect now supports AES in addition to DES for SNMPv3 encryption (also referred to as Privacy Types). To add a new device using this method:

  • Click on Admin » Devices » Add Device to load the Add Device dialog.
  • Switch to the IP & SNMP tab.
  • Set the SNMP V3 Auth selector to On
  • Choose AES in the SNMP V3 Privacy Type drop-down menu

For more information on configuring SNMPv3 authentication, check out our Knowledge Base article.

2FA Using YubiKey

YubiKeyThe latest in our ongoing efforts to ensure the security and privacy of our customers' data, is support for two-factor authentication (2FA) using a hardware YubiKey. This new user authentication method can be enabled by clicking on your name in the upper right-hand corner, selecting My Profile and clicking the Enable YubiKey button in the Authentication section of the My Profile dialog.


This will bring up the Register YubiKey dialog. Touch your YubiKey to fill the pane with a code and click on Finish Registration. You are now setup to start using your hardware key as an authentication method.

Register YubiKey

Device Screen Refresh

Device Screen RefreshAs regular users of Kentik Detect may have already discovered, we gave the Device List table on the Devices page (Admin » Devices) a makeover. We have added a button at the top that can be used to toggle between Device Stats and Device Details views.

Device Screen Refresh

The information on the Device Stats view remains the same, although better organized. On the Device Details view we have added Interface Classification, CDN Attribution (shows a check if the device is configured to participate in CDN Attribution feeds), and Plan & Site to give the user more details about the device at a quick glance.

Device Screen Refresh

For more information about the redesigned Device List views, check out our KB article.

Updated Host Agent

We have released a new version 0.8.6 of our host agent, kprobe. While not particularly noteworthy by itself, this new version adds a couple new features to the Kentik Detect solution:

  • First Payload - MenuUI Set Sampling Rate: Up until now, you had to set the sampling rate with a CLI parameter. Now, if the sampling rate parameter is not set, kprobe will determine the sampling rate by communicating with the Kentik Data Engine to receive the value set in the portal. This allows a more standard deployment of the agent where varying sampling rates may be required across the environment.
  • First Payload Exchange Latency (FPEX) metric: This new metric measures application response time. After the TCP session is setup, this measures the time between the first request packet and the first response packet. This is especially useful for applications which Kentik cannot decode (HTTP and DNS are currently decoded). You will find this new metric in the Metrics drop-down menu in the Query pane of the Data Explorer sidebar (Data Explorer » Explorer View).

    Customize MetricsIt can also be used in Multi-Metric mode by click on Customize Metrics in the Query pane. You will find the FPEX metric at the very bottom right-hand corner of the Metrics dialog.

    This metric is also available in the Alert section of Kentik Detect. For more details on using the Alerting system, check out our KB article or Alerting Blog.

Interface Classification Enhancement

At Kentik, we strive to get all of our customers as close to 100% Interface Classification coverage (more on Interface Classification via our blog post or KB article) as possible, where we find they get the best accuracy from this feature. In keeping with this, we have added a new General Settings pane in the Configure Interface Classification screen (Admin » Interface Classification » Configure Interface Classification), which allows the user to simply discard specific interfaces from the rules computation instead of configuring a default matching rule. In this pane, you will find the following:

General Settings

  • Exclude interfaces with no description
  • Exclude interfaces with no IP address
  • Exclude host (nProbe/kProbe) interfaces

The first two settings can be evaluated as AND or OR operations by changing the selector between them. The final setting is always evaluated as an AND operation.

Provider Classification

Quite a few of our customers use Kentik Detect to answer questions about how much traffic is being sent to and from the networks they are directly connected to (transit providers, private peers, public peers, Internet Exchanges, customers, etc.). To make this task a lot easier we have removed the need to use a Custom Dimension (more details on Custom Dimensions can be found in our KB article), and we've introduced a new feature called Provider Classification as part of our existing Interface Classification feature discussed above. This feature matches a string in the interface description and sets the provider name using one of two methods:

  • Static: This method uses a static, plain-text provider name for interfaces that match. To use this configuration on an existing rule, click on the rule within Interface Classification and fill in the Provider text field in the Then pane. In the pictured example, we are matching on "IX" in our interfaces description and setting the provider for any of these interfaces to "cyrusone" (NOTE: provider names are converted to all lowercase to avoid duplications).

  • Regular Expression (RegEx): For more complex matching and classification, we support RegEx Capture Group Notation. This method allows for matching using RegEx and extracting the provider name using the RegEx Capture Group Notation. In the pictured example, our group is extracting the word that comes after "TO-" and using that ($1 refers to the first group extracted) as our provider name.


If you need a refresher on RegEx Capture Group Notation check out this helpful guide. If you need help testing your RegEx syntax, check out this useful application.

Once you are happy with your RegEx configuration, click on the Test Rule button to see what is matching. You should get a list of Device Matches list the one pictured.

Device Matches

The rows with blue in the bar and a non-zero number in the blue background have interfaces that were matched by the tested rule. Click on one of those rows (e.g. pe1_ord1) and you can see what interfaces matched and what provider was pulled out of the interface description.

Interface Description

To exit this screen and return to your rule, click the X in the upper right-hand corner.

Once you are confident you have matched what you expected, click the Save button to return to the main Interface Classification Screen. Your updated rule will be displayed with the RegEx matching and Provider group:

RegEx Matching and Provider

For more information on Provider Classification, be sure to check out our KB  article.

View Unclassified Interfaces in Interface Classification

Unclassified InterfacesSpeaking of Interface Classification (IC), we made it even easier to find which interfaces in your account are not being classified based on your existing rules. In the Classified Devices pane on the right side of the Interface Classification screen (Admin » Interface Classification) you will now see a View X Unclassified Interfaces button like the one highlighted on the right. Clicking this will bring up the Unclassified Interfaces dialog like the one below that shows a list of all the interfaces in your account, by device, that have not matched one of your IC rules.

Unclassified Interfaces

Total Overlay in Time Series Line Graph

We have now added the ability to get a Total Overlay line in a Time Series Line Graph in the Data Explorer. In the Data Explorer:

Advanced Options

  • Change your view type in the upper right-hand corner (above the chart) to Time Series Line Graph.
  • In the Query pane of the sidebar click on the Advanced Options button to expand the additional options.
  • Enable the Total Overlay selector.
  • Click Run Query at the top of the sidebar.

Bracketing Enhancements

In last month's product update we announced Gauges Visualization that supports Bracketing to change the background color depending on user-defined thresholds. We have taken this a step further and extended the Bracketing capability:

  • Bracketing now supports up to two Group By Dimensions (for more information on Group By Dimensions see our KB article) where previously it was only available for Total (no Group By Dimensions selected).
  • We have added multiple methods for the bracketing threshold computation:
    • Static: user sets the threshold for each color manually.
    • Percentages: the threshold for each color is set as a percentage of the sum of all lines in the returned data.
    • Percentiles: the threshold for each color is set as the Nth percentile of the sum of all lines in the returned data.
  • The Bracketing pane in the Data Explorer side panel is more compact and easier to read.
  • Bracketing support has been added to both the Table and Matrix view types.
  • Amongst others, it will:
    • Indicate which returned time-series scores the max value.
    • The feature is now compatible with multi-metrics: the primary sorting one will be displayed as the big value, the others on the right side of the gauge.

All of these are displayed in the example below:


For more information on using Bracketing, head on over to our Bracketing Pane Setting article in the KB.

Minimum Metric Threshold

Selected MetricsAdding on to last month's announcement of Multi-Metric, the user can now set a minimum threshold that must be reached for a data point to appear in a chart or table. In the Metrics dialog (accessed by clicking on the Customize Metrics button in the query section of the Data Explorer sidebar), you will see a new button in the Selected Metrics selector which is highlighted in the graphic to the right. This will bring up a Set Minimum Threshold dialog. Once you have input the threshold minimum you want to see, the button in the Selected Metrics selector will change from grey to orange so you know a threshold is set.

Set Minimum ThresholdThis is a common ad-hoc data filtering tool in the realm of BI tools, often referred to as a 'Noise Suppressor' because it will help weed out any background noise from the actual signal useful to the user.

We are halfway through the first quarter of 2018 and once again we have a bunch of exciting new updates to Kentik Detect® to share with you. As mentioned in previous updates, a lot of development work these days is…

January 2018

Once again our developers have been keeping busy, kicking off the new year with exciting new features and updates to Kentik Detect®. A lot of development cycles recently have been going towards Dashboard enhancements that make it even faster for users — both technical and non-technical — to find the information they need. But we’ve also made a number of significant enhancements to Data Explorer, as well as to features such as Custom Dimensions and Mitigation. Let’s dig in...

Dashboard Navigation

Dashboard Navigation reduces the time spent drilling down to root causes by enabling users to navigate from a given dashboard panel directly to another dashboard that’s related to the same use case. Kentik will be rolling out a library of these ready-made dashboard workflows, but power users can go ahead and create workflows today to match their needs. Note that the general creation and editing of Dashboards is covered in the Dashboards article of our Knowledge Base, and that an upcoming post on our blog will provide more information on how to use these new dashboard features. Creating a nested dashboard begins with the settings for the dashboard panel from which you will be navigating. In the following example, we’ll update an existing dashboard with existing panels. However, the process to create a new dashboard or panel would be very similar. Nested Dashboards - Navigate To
  1. From the Dashboard page (Dashboards on the main portal navbar), open the Dashboard to which you want to add nesting.
  2. When the dashboard opens, click the Edit Mode button at upper right (shown below). Edit Mode
  3. A round blue Navigate To button will now appear on the right edge of each of the dashboard’s panels (shown below). Because no destination has been set yet, the tooltip for these buttons will say “No Dashboard Destination Set.” Click on the button for the panel to which you wish to add a nested dashboard. No Dashboard Destination Set
  4. The Edit Dashboard Panel dialog will open with the lower section on the Navigate To tab (shown above right). Set the controls as follows: - Turn on the Enable Dashboard Navigation switch. - In the resulting Destination Dashboard selector, choose the dashboard to which this panel should navigate. - The Destination Dashboard Settings controls will appear. Choose how the destination dashboard will be affected by the devices, time-range, and filters of the current dashboard.
WAN Client LocationsOnce you’ve saved dashboard navigation edits for a panel, and taken the dashboard out of Edit Mode, only panels that use nesting will show the blue Navigate To button. The tooltip for each shown button will name that panel’s nested (destination) dashboard. Click the button to go to that dashboard. Breadcrumbs at the top of every nested dashboard make it easy to keep track of where you are in a nested dashboard workflow.  

Ultimate Exit on Guided Dashboards

Guided DashboardsIf you’re a regular reader of these updates, you’ll recall that we introduced Guided Mode Dashboards back in our November Product update. We’ve recently added the ability to filter a panel on this type of dashboard using our BGP Ultimate Exit dimensions for Site and Device. To use this new feature, you’ll need a Guided Mode dashboard on which Dimension family to filter by (in the Guided Mode settings) is set to either Site or Devices. If you already have one, go to the Dashboards page, click the options menu at the upper right of the dashboard’s tile, and choose edit to open the Edit Dashboard dialog. Otherwise, make a new dashboard by clicking the Add Dashboard button, then in the resulting Edit Dashboard dialog, choose Device or Site from the Dimension family to filter by selector. For this example, we'll use Site. Guided Mode BehaviorOnce you have a dashboard whose Guided Mode dimension is Site, you can create a panel on the dashboard and filter it with a BGP Ultimate Exit dimension. (For information on creating a panel, see the Adding Dashboard Panels topic in our KB.) Open the panel’s Edit Panel dialog (Editing Dashboard Panels) and go to the Guided Mode tab (lower section of dialog). For behavior, choose Add filter group. From the Add a new filter group with dimension selector, choose Destination BGP Ultimate Exit Site. Once you’ve set a filter for the panel using an Ultimate Exit dimension, the panel will show only traffic from the Destination BGP Ultimate Exit Site chosen with the Guided Mode selector at the top of the dashboard. While this example made use of Sites, a very similar workflow is available for Devices.

Alert Scoreboard Panels

In last month’s update, we announced our new Alerting Scoreboard, which makes it easier to see at a glance the things that most need your attention. Now we’ve added the ability to include one or more scoreboards as panels on a dashboard. This type of panel is especially useful for Dashboards designed to get insight into attacks or changes in the network environment. Alert Status To add a scoreboard from an existing Dashboard, first click Edit Mode, then click the Alert Policy Scoreboard button in the panel at top (under “Select visualization type...”). In the resulting Add Dashboard Panel dialog you’ll see the controls for configuring the scoreboard grid: Dimension (X axis), Policy (Y axis), etc. Make your grid settings, set your thresholds for inclusion of various levels of alarms, and give the panel a title before saving with the Add Dashboard Panel button.

Add Dashboard Panel

Filter-Based Dimensions in Explorer

Filter-based dimensions allow Data Explorer to represent — as plots on graphs and rows in tables — a number of time-series that are each user-defined with filters. For example, you might want to compare HTTP, HTTPs, DNS (TCP), and DNS (UDP) traffic. If you queried for total traffic with those filter parameters, you’d return their total cumulative traffic plotted as one line with a corresponding single row in the table. But with filter-based dimensions, you can see each as a Series broken out into its own plot and row. Note that a query can’t mix these Series with regular (“preset”) group-by dimensions, and you can only have one filter-based dimension at a time. So any dimensions that you already have in the group-by selector will be overwritten when you save a filter-based dimension. To use filter-based dimensions, click in the Group By Dimensions field in the Query pane of the sidebar, then click on the Filter-Based tab in the resulting dialog. Use the switch at top to enable filter-based dimensions, after which you’ll see a form similar to the below. Using our example, you’d define a series for HTTP, then add series for HTTPs, DNS (TCP), and DNS (UDP). Group By Dimensions When you save the settings any dimensions that were specified in the dimension selector of the Query pane will be overwritten with the new filter-based dimension. Run the query in Explorer and you’ll get results that look something like the below, with each series plotted in the graph and represented as a row in the table.


Customize MetricsAnother new feature in the Data Explorer is the ability to customize the metrics that are shown in the table as well as those shown on the +Y and -Y axis. By default, the Data Explorer will show a single metric with table columns for the Average, 95th Percentile, Max, and Last Datapoint calculations for that metric. Querying with multi-metric enables you to look at things like ingress and egress on the same graph or, as we’ll see in the following example, Bits/s compared to Packets/s. To enable the new multi-metric feature, click on the Customize Metrics button in the query section of the sidebar, which opens the Metrics dialog. The dialog (shown below) has the following sections that are important to note:
  1. Metric Library - A list of available metrics by category that allows you to choose (using checkboxes) the metrics you’d like to see as a column in the table returned from the query.
  2. Selected Metrics - A list of the metrics that that you’ve chosen from the library.
  3. Display & Sort Metrics - A set of dropdown menus that determine the primary and secondary metric by which the results in the table will be sorted. Note that if only a single family of metrics it selected, you will only have a Primary Display & Sort Metric option.
Metrics A query run with the settings shown above would gives us a graph (shown below) with the three metrics chosen from the Bits/s category on the +Y (top) axis and the three metrics chosen from the Packets/s category on the -Y (bottom) axis. In the table (only the heading of which are shown in the image) we have columns for all six of the metrics. The bits/s tab is sorted by our primary metric (Average bits/s) while our packets/s tab will show the same data sorted by our secondary metric (Average packets/s).

Gauge Visualization

Data Explorer’s new Gauge visualization (shown at right) displays the current value of the primary metric, which is set with the Metrics setting in sidebar’s Query pane. In the Gauge this number is set against a background that changes color depending on the metric’s current value in relation to user-defined “brackets” (ranges). Assigning colors to different value ranges allows a gauge to show at a glance whether the metric’s current value is fine or problematic. Before configuring a gauge in Data Explorer, set your dimensions, filters, time, and devices as you would for a query of any other view type. Then choose Gauge from the View Type selector at the upper right of the display area. A new Bracketing pane will appear in the Sidebar; click it to open the Bracketing Options dialog. In the dialog (shown below), you first specify the basis on which the brackets are defined (Bracketing Type), such as static ranges, percentages, or percentiles. Then you specify the current value that will be displayed and that will be evaluated to determine which bracket it’s in (and thus what the background color will be). The Bracketing Value switch determines whether “current” means the most recent datapoint of the primary metric or the primary metric’s value over query time-range (e.g. average Mbps for the last hour). Lastly you define the ranges. By default there are two, but you can have up to five ranges with different colors (e.g. orange for a range that’s slightly above normal and red for a critical peak). For more in-depth information on Bracketing, head on over to our Bracketing Pane Settings article in the KB. Bracketing Options Once you run the query you can add it to a dashboard as a panel. This is a really powerful tool, as you can see below where there’s a set of such Guage panels, each showing a different metric. With the dashboard set to Live Update you get really easy-to-grasp indicators that update as network traffic changes. Keep an eye on our Product Update, Knowledge Base, and blog sites for more upcoming features and enhancements around Dashboards and Bracketing. Gauge Panels

HeatMaps for Region and City

Another new View Type feature we first announced last month was Geo HeatMaps. Initially available for queries whose group-by dimension was source or destination country or site, HeatMaps have now been extended to cover regions and cities as well. As with countries, the mapping depends on the traffic attributable to the sites within a given region or city, which means that you must first use the Admin » Sites page to enter addresses for each of your sites (see instructions for Editing a Site in our KB).

Region Heatmap

A region HeatMap shows the total network traffic, inbound plus outbound, by each region (e.g. a state in the United States) based on the addresses specified specified for sites. In Data Explorer, choose the group-by dimensions Destination Region and Destination Country, and chose Geo HeatMap from the View Type selector at upper right of the display area. When you run the query, the resulting visualization should look similar to the below. For even more information, hover over a bubble (colored circle) on the map to open a pop-up, which states the location’s latitude, longitude, and total traffic. Region Heatmap

City Heatmap

The city heatmap is very similar to the region heatmap, but it’s more granular because it drills down to individual cities. To get a visualization similar to the one below, add Destination City to the group-by dimensions we already had (Region and Country). City Heatmap Like the other visualizations in Data Explorer, heatmaps can be turned into panels on a Dashboard so users can easily monitor traffic on a geographical basis.

Custom Dimensions Ranges

Custom Dimensions (covered in this KB article) is one of the more powerful features of Kentik Detect because it enables you to add custom columns to the traffic flow records in your Kentik database, and to populate those custom fields based on a match for a given value in the ingested flow fields. You can use those columns for any number of purposes, including overlaying business information on top of network information so you can run powerful analytics based on the two sets of data. We recently added the ability to create ranges when defining populators that match on Port and ASN. To define a port range for a populator, first go to Admin » Custom Dimensions and click on a listed dimension to open the Edit Dimension dialog. Choose the Populators tab, then click the Add Populator button, which opens the Add Populator dialog. On the IP Matching tab, define a range in the Port field as shown below. When you add the populator a match will result from any number in the range, not just a single value.

Manual Mitigations API

In our November Product Update we mentioned that we have added the ability to start a manual mitigation as opposed to triggering one off an alert. We’ve now implemented this capability as an API and added it to the extensive list of REST APIs we’ve made available to programmatically manage Kentik Detect.Our KB article contains more information and be sure to check out our API tester, which will help guide you on using this new method. Manual Mitigations
Once again our developers have been keeping busy, kicking off the new year with exciting new features and updates to Kentik Detect®. A lot of development cycles recently have been going towards Dashboard enhancements that make it even faster for…

December 2017

As usual, our development team has been hard at work, even over the holidays. So as you settle back into your work for the new year, take a minute to check out the latest features and functionality we've added to Kentik Detect®.

Network Classification

We are constantly looking for ways to make Kentik Detect easier to use, especially for users that aren't highly network savvy. One such improvement is Network Classification, which enables the following capabilities for our users:

  • Network Directionality: Group traffic based on the direction from which it enters the network and to which it leaves.
  • Host Directionality: Group host traffic captured by kprobe based on the direction it is flowing.

Network Classification Dimensions

The capabilities listed above are supported by four new dimensions that can be applied to each flow:

  • Traffic Origination: This dimension indicates whether the source for a given flow is inside or outside of your network.
  • Traffic Termination: This dimension indicates whether the destination for a given flow record is inside or outside of the network.
  • Host Direction: When the flow record has been generated on a host, this dimension indicates whether the direction of traffic is into or out of that host.
  • Traffic Profile: Derived from Traffic Origination and Traffic Termination, this dimension categorizes traffic into one of the following directionalities, which are illustrated in the graphic below:
    - Through: Traffic coming from outside the network and terminating outside the network.
    - Ingress: Traffic coming from outside the network and terminating inside the network.
    - Internal: Traffic originating and terminating inside the network.
    - Egress: Traffic coming from inside the network and terminating outside the network.

The dimensions described above are available throughout Kentik Detect as:

  • Group-by Dimensions
  • Filter match criteria
  • Alert keys (dimensions of an Alert Policy)
  • Alert filter match criteria

Network Directionality Use Case

One interesting use case involves using Network Directionality to investigate spikes in traffic. For example, in the left graph below from the Kentik portal's Data Explorer, we can see a big spike in flows to a customer called Pear, Inc.

In the corresponding Data Explorer table (below the graph; not shown), we can dig deeper into the data by clicking the Action menu at the right of the row for Pear, Inc. We choose Show By to open the Show By Dimensions dialog, then choose one of our new Network Classification dimensions, Traffic Origination (listed under Source). After closing the dialog by clicking the Show By Selected Dimensions button, we re-run the query. We can now see (right graph) that the spike is made up of traffic that originated outside of our network. If we wanted to continue digging further, we would use Show By again, this time looking at source ASN or IP address.

Note that these same dimensions can also be used in Alerting to monitor traffic that comes from outside the network separately from traffic that is internal to the network. For more information on creating alerts, check out the Policy Alerts Overview in our Knowledge Base.

Host Directionality Use Case

Another use case for Network Classification is specific to host traffic captured by kprobe (Kentik's software host agent). Since most hosts have only a single interface through which traffic can pass, kprobe captures both inbound and outbound traffic. Until now, it was difficult for a Kentik Detect user to separate which traffic was coming in and which traffic was leaving. But now it's possible to distinguish one from the other. As shown in the graph, with Host Direction used as the group-by dimension you can now see separately the flows in (black) and out (blue) of a host.

Configuring Network Classification

To benefit from the new Network Classification feature you must first enable Kentik Detect to determine what is inside and what is outside of your network. The configuration is pretty simple, assuming that you are an Admin user. Start by navigating to Admin » Network Classification, then fill in the following two fields:

  • Internal IPs: Enter a list of the IP CIDR blocks used inside the network. By default, the RFC1918 IP Space is included with the user defined list; this can be changed with the checkbox below the field.
  • Internal ASNs: Enter a list of ASNs used inside the network. By default, the Private ASN range is included with the user defined list; this can be changed with the checkbox below the field.

Once the fields are filled and you've clicked the Save button, you're ready to begin using Network Classification.

New Types for Interface Classification

Interface Classification — which debuted in our July Product Update — shows the types of interfaces through which your traffic enters and leaves your network so that you can optimize your network for cost and performance. As part of our ongoing enhancement of that feature, we just expanded the list of Connectivity Types, which are used to classify interfaces by their role in the overall network. The new types are:

  • Datacenter Interconnect
  • Aggregation Interconnect

If your network includes these types of interconnects, after you run Interface Classification you can now specify these interface types when you query, build dashboards, monitor with alerts, and more. For more information on using this feature, head to our Knowledge Base for the article on Interface Classification.

HeatMaps for Countries and Sites

One feature that's been among the most common requests from customers is the ability to visualize network data on a map. We just added mapping capabilities in the form of a new Geo Heat Map view type (accessed via a drop down view type menu like you'll find at the upper right of the display area in Data Explorer). This new type enables a couple of map visualizations that we think you'll find quite useful:

  • Country Heatmap
  • Site Heatmap

Country Heatmap

A country heatmap shows the source or destination of traffic by country on a global map. This feature uses the GeoIP data that we add, based on Source and Destination IP address, to each flow record in the Kentik Data Engine. The visualization shows one direction (source or destination) at a time of traffic using Country geo-information. A color key indicates the volume of traffic for each country.

To generate a country heatmap in Data Explorer, first set the group-by dimension to either source or destination country. Then change the visualization type in the drop down in the upper right hand corner to Geo HeatMap. The resulting graph should look similar to the map below.

Site Heatmap

A site heatmap shows the total traffic, inbound plus outbound, by each site in your network. The larger the circle on the map, the more traffic at that site. For greater detail, hover over a circle to open a pop-up giving the site's coordinates and the total amount of traffic.

Before you can use this feature you have to provide a street address for each of your sites, which you can do with the Edit Site dialog in Admin » Sites (you must be an Admin user; see Editing a Site in our Knowledge Base article) or with our Site API.

Once the site addresses have been specified, you can build a query in the Data Explorer using the group-by dimension Site (FULL) and the view type Geo HeatMap. The resulting visualization should look something like the map below.

Expanded Host Metrics

The savvy Kentik user is already aware of our software host agent, kprobe, which runs on a server and provides host performance metrics. For those not familiar with this functionality, check out our blog post on one intriguing application for this, which is using kprobe to monitor DNS infrastructure.

This month we've expanded kprobe functionality by adding the following metrics:

  • Repeated Retransmits: The number of TCP packets that have been retransmitted more than once, likely due to packet loss along the path from sender to receiver.
  • Zero-Window: The number of times the TCP receive window has been set to zero, indicating that the receiver cannot keep up with the flow of data from the sender.
  • Receive Window Size: The size of the TCP receive window reported by the receiving host.
  • Connection ID: The TCP or UDP Connection ID for the session that the reported flow belongs to.

To start leveraging the expanded metrics, install the latest version of kprobe (see kprobe download and install in our Knowledge Base).

Scoreboard for Alerting

Anomaly detection, alerting, and mitigation are core features of Kentik Detect, and we continue to devote a lot of effort toward improving workflow and usability. Recent changes to the Alerting section make this powerful functionality easier to set up and use. The first place you go when you click Alerting in the Kentik Detect navbar is the Active Alerts page, which we've just enhanced with an Alerting scoreboard. So it's now easier to see at a glance the things that most need your attention.

The top part of the scoreboard is a set of summary tiles (shown above), one for each of three types of events:

  • Mitigations: Shows a count of how many alerts are currently being mitigated, either automatically or manually. A button (+ sign) for manual mitigation is also included. The background color of the tile varies depending on the count:
    - Grey: No mitigations currently in progress.
    - Purple: 1 or more mitigations currently in progress.
  • Alarms: Shows a count of alerts that are in ALARM state, meaning that the conditions defined in the alert policy have been met and notifications have been triggered. A count of the alarms at each severity is also included. The background color of the tile varies depending on the severity (minor, major, critical) of the most severe alarm:
    - Grey: No alarms currently active
    - Dark Red: The highest severity level is Critical.
    - Red: The highest severity level is Major.
    - Orange:  The highest severity level is Minor.
  • Acknowledgements: Shows a count of alerts that are in ACK_REQ state, meaning that the conditions that resulted in an alarm are no longer present, but an acknowledgement is required from a user in your organization before the alert is removed from the active list. The background color of the tile varies depending on the count:
    - Grey: No acknowledgements pending.
    - Blue: 1 or more acknowledgements pending.

Below the summary tiles is a matrix whose rows represent either mitigations or alert policies that are in alarm. The columns represent the top values of a dimension chosen when the matrix was configured (click the gear button to edit the configuration). The matrix lets you quickly see what's going on with the policies that are most in need of attention.

Key an eye on our Knowledge Base for coming topics related to the Alerting Scoreboard.

IPv6 Support for Radware Mitigation

Kentik Detect includes the ability to integrate with mitigation systems from third parties including Radware. Until recently, you could only define a Radware Mitigation Platform using an IPv4 address. We now have the ability to make an API call to a Radware appliance using either an IPv4 or an IPv6 address.

As usual, our development team has been hard at work, even over the holidays. So as you settle back into your work for the new year, take a minute to check out the latest features and functionality we’ve added to…

November 2017

As mentioned in our update for October, we've been so busy pushing out enhancements to Kentik Detect that we've fallen behind on keeping you in the loop. With this latest batch of notable new features and improvements, we're now closer to being up to date, but development continues on additional items that we'll be sharing soon.

Guided Mode Dashboards

While Data Explorer is oriented toward ad-hoc investigation, Dashboards rely on pre-configured views to provide at-a-glance presentation of status. Guided Mode adds speed and flexibility by enabling users to quickly change — without setting complex query options — the value of the dimension that one or more panels on a given dashboard is intended to track. Guided mode dashboards allow power users to build dashboards that other users can use without having to become experts on the powerful filtering capabilities of Kentik Detect.

Once a guided mode dashboard is set up, users of that dashboard are prompted to fill in (or select from a drop-down menu) the value of the guided mode dimension. For example, if your dashboard presents different views of traffic from a given country, you could set the guided mode dimension to source country and configure a set of panels that all change when the end-user chooses a different country.

Another example is the preset dashboard called SecOps - IP Investigation, which Kentik has changed to guided mode. Instead of being locked to a specific IP range that was chosen when the dashboard was created, the dashboard's panels now follow the IP range that users are asked to specify when they go to the dashboard, and which they can change at any time.

For more information on Guided Mode Dashboards, check our Dashboards article in the Knowledge Base.

Single Sign-On (SSO)

How do you make it more convenient to maintain user security without having to constantly enter authentication credentials? Kentik's answer is to enable single sign-on (SSO) for the Kentik Detect portal. Our new SSO implementation is compliant with standard SAML2 transport and includes encrypted SAML assertions, automated user provisioning, and IdP-enforced role-based user-privileges. It has been successfully tested with the following identity providers:

For more information on the benefits of our SSO feature and how to get started, check out our SSO blog post or Knowledge Base article.

Data Explorer Enhancements

As one of the most-used sections of the Kentik Detect portal, Data Explorer is constantly assessed and refined, so there have been quite a few enhancements, more than we can report on in full. Among the highlights that we'll cover below are new dimensions for threat feed and CDN attribution, a new visualization type (Time Series 100% Stacked Graph), and IPv6 support for Ultimate Exit.

CDN Attribution & Threat Feed

We've added a few new dimensions that can be used as either source or destination dimensions for queries, filters, alerts and more. The first is CDN, which maps CDN names to IP addresses. This dimension is only available to customers who are contributing IP and DNS name mappings by running our custom kprobe agent on their DNS servers. To learn more, and see how to enable it for your account, check out our CDN Attribution article in the Kentik Knowledge Base.

Two other new dimensions help you determine if you are dealing with traffic from a suspect IP address. The diagram below shows how this system works. Our friends at SpamHaus maintain information on IP reputation, which we obtain and keep in a database that we update daily. As each flow record is ingested into the Kentik Data Engine (KDE), we compare their source and destination IP addresses with the IPs in the threat database. If anything matches, we mark it in the flow record using new KDE columns.

Once the BotNet CC and Threat List Host dimensions are in the KDE they can be used for group-by and filtering. As shown below, that enables users to query for hosts in their network that are communicating with known BotNet Command and Control (CC) servers or other known compromised hosts.

Keep an eye on the Kentik blog in the coming weeks for a post with more information on how these new dimensions work and what you can do with them.

Time Series 100% Stacked Graph

Kentik Detect already gives you lots of options for visualizing your data, and we've now added yet another. The Time Series 100% Stacked Graph shows each matching key (unique combination of dimension values) on the graph as a percentage of the total traffic returned from the query.

IPv6 for Ultimate Exit

Kentik Detect's Ultimate Exit capability enhances every flow record ingested into KDE with fields representing the Device (router), Site (Pop,) and Interface where the underlying flow will exit to an adjacent network. Until now, Ultimate Exit used to work only for IPv4 traffic (IPv6 traffic was ignored), but now both IPv4 and IPv6 traffic are included in these queries. For more details on how to use this feature, check out our Ultimate Exit blog post.

Improved Alerting

Integrated anomaly detection, alerting, and mitigation is a key feature set for Kentik Detect, and we continue to devote a lot of effort toward improved workflow and usability. Our recent changes to the Alerting section make an already powerful functionality easier for customers to set up and use.

Alert Policy Creation

Alert policies are at the heart of our alerting system, defining conditions that will result in a notification and possibly trigger a mitigation. The power and flexibility of our system brings with it some inherent complexity, but we've nonetheless been able to greatly improve the policy creation workflow. The process is now structured as a set of tabs that are each labeled with a caution symbol until all required information is provided, at which point the label switches to a check mark. The UI also now provides a better explanation of how the value of each field impacts the behavior of the overall alert.

Role-based Alerting Control

Kentik Detect supports three levels of users (Member, Admin, and Super-Admin), each with different permissions. We've now implemented this multi-level approach in our Alerting system to differentiate the tasks that can be performed by different-level users:

  • Member users are restricted to clearing alarms and stopping mitigations. Members cannot create or modify alert policies, but to facilitate troubleshooting they are able to view policies.
  • Admin and Super-Admin users have complete control over all aspects of alerting setup and operation.

Manual Mitigations

Previously a mitigation could only be triggered based on an active alert. We've added the ability to trigger a mitigation manually, even without an active alert. It's important to note that a mitigation that's been triggered manually won't end on its own; it must also be ended manually.

To trigger a manual mitigation, click Alerting on the main portal navbar, then choose Manual Mitigation from the sidebar at left. In the resulting Add Manual Mitigation dialog, fill in the following fields:

  • The Mitigation Platform and Method (must be predefined in the Platforms and Methods pages of the portal's alerting section)
  • The IP/CIDR to mitigate
  • Comment (optional)

The mitigation starts immediately once you click the Add Manual Mitigation button. Because manual mitigation is intended to be applied as a one-off, the settings in the dialog are not saved for later reuse. Instead the mitigation exists only until it is manually ended from the Active page of the alerting section.

Enhanced RTBH Mitigation

Another alerting enhancement relates to our built-in Remote Trigger Black Hole mitigation. We've added the ability for customers to set the Local Preference (the BGP LOCAL_PREF attribute) on routes that are advertised for RTBH, so that you can ensure that the blackhole route is the preferred route for forwarding traffic.

Local Preference is configured in the Add Mitigation Method or Edit Mitigation Method dialog, which you reach from the Methods page of the Alerting section. Click the Add button to add a new method, or click on an existing method to edit it, then scroll down to the Local Preference field towards the bottom of the dialog.

It's been another busy month at Kentik. Building on the new stack that we recently deployed for our V3 portal UI, we have a host of new enhancements, large and small, to share with you in this month's product update, including support for Single Sign-on (SSO), our new "guided mode" dashboards, ongoing Data Explorer enhancements, and Alerting that's been redesigned for easier use.

October 2017

As an avid follower of Kentik Detect you've no doubt noticed by now that we haven't published a product update since July. But the fact that we're long overdue doesn't mean that our team hasn't been hard at work. Let's take a look at some of the cool new features we've been developing and deploying.

V3 UI with Dark Theme

To any regular user of Kentik Detect the most obvious update is probably our new User Interface (UI), which has a cleaner, more modern layout. Users can now choose between our standard white-background theme or a new dark theme with a darker background. The dark theme is designed to minimize eye fatigue for customers who spend many hours a day looking at large screens. To use the dark theme, hover over your username at the right of the portal navbar, then choose Use Dark Theme from the drop-down menu.

BiDirectional Charting

Have you ever wanted to plot two data series on the same graph? Our new Bi-Directional Charting feature (which replaces V2's Multi-Data-Series functionality) allows the display of two graphs in one, with the second graph plotted against the negative Y axis. To use this feature, enable it under Advanced Options in the Query pane of the Data Explorer sidebar. You can use this feature either for inversion or for a secondary metric.

By default, turning on Bi-Directional Charting results in inversion, in which the original query (the dimensions and filters you specify) is plotted on the positive Y axis above and the inverse of that query is plotted on the negative Y axis below. The tables corresponding to each graph appear in the Original Query and Opposite Query tabs below the graph.

To plot a secondary metric instead of an inverse query, choose a metric from the drop-down Secondary Metric selector, which is also in the Advanced Options section. After clicking the Run Query button to update the display, both graphs will use your original dimensions and filters, but the positive axis will display results measured in the primary metric while the negative axis will show results in the secondary metric. A simple use case would be to simultaneously see bits/second and packets/second.

Interface Management

In the Admin section of the V3 portal we've created a dedicated screen for Interface Management (Admin » Interfaces) which used to be part of Device Management. At top left you choose the device whose interfaces you want to see in the Interface List below, where you'll find information about each of the device's interfaces, including description, boundary ASNs, capacity, interface classification, and more.

Among the data points you'll find on the new Interface Management page is our new Boundary ASNs indicator. This cool new feature uses the flow data collected by Kentik Detect to determine the ASNs your infrastructure connects to directly via your edge interfaces (Network Boundary = External). In the example above you'll see a “View 2 ASNs” button in the Boundary ASNs column; if you were to click on that button in the example shown, a list would pop up showing the ASNs detected on the interface as well the interface's traffic to each listed ASN as a percent of the total traffic to that ASN from the entire device.

Interface Classification

Also new to the V3 portal are a number of improvements to the Interface Classification Rules Editor (Admin » Interface Classification; see Interface Classification in the Kentik Knowledge Base). On the Interface Classification page, the Classified Devices Pane at right displays all of the devices your organization has registered in the portal and tells you how many interfaces on each device are classified. If your percent of classified interfaces is anything less than 100, you'll see an Unclassified Interfaces button that opens the Unclassified Interfaces dialog, where you'll find information about the interfaces that aren't being classified by your classification rules.

Speaking of rules, the UI for the Add Rule and Edit Rule dialogs has been improved as well. After creating a rule, you can click the Test Rule button to apply the rule on a test basis and see a list showing how many of interfaces remain unclassified.

For a fuller explanation on using Interface Classification, check out our Interface Classification blog post.

New Version Notification

Our development teams here at Kentik are continually improving Kentik Detect by pushing out new features and bug fixes. We now include a popup notification to users whenever an update is available since the browser was refreshed.

As an avid follower of Kentik Detect you've no doubt noticed by now that we haven't published a product update since July. But the fact that we're long overdue doesn't mean that our team hasn't been hard at work. Let's…

July 2017

Interface Classification

Much of our development effort in July was directed toward under-the-hood improvements that will make it faster for us to innovate in response to customer needs and feedback (more on this in coming months). At the same time, we haven't lost our focus on practical ways to make daily operations easier. With that in mind, we've added a cool new feature called Interface Classification (IC). By allowing you to more quickly and easily understand the types of interfaces your traffic uses to enter and leave the network, IC gives you the ability to optimize your network for cost and performance.

Network boundary attributes

Interface Classification relies on a couple of different types of attributes derived from network data, one category of which is “network boundary.” By classifying the interfaces as internal or external, we can compare the source and destination of the traffic to see if both are fully within your network or crossed a network boundary (came from or went to a different AS). This distinction allows Kentik Detect to avoid counting a given flow multiple times as it passes through the network. And it gives technical decision makers the ability to see how much traffic is coming in and out of their network versus how much of it is contained within the network.

Connectivity type attributes

Another category of IC attribute is connectivity type, in which interfaces are labeled by their connectivity type, such as transit, ix, paid peering, etc. Identifying the type of connectivity used by traffic through a given interface gives you a way to determine costs and optimize pricing for each category of traffic.

Defining interface classifications

Now that we understand classification attributes, how is IC enabled in Kentik Detect? The goal is to use the attributes as dimensions and filters in queries and visualizations. To do so, the attributes must be added to flow records as they are ingested into the Kentik Data Engine (KDE). The magic starts on the Interface Classification page of the portal (Admin » Interface Classification), where you create rules that classify interfaces by evaluating patterns in the interface description or IP address.

To create a new rule, click on the green Add Rule button. The “If” section tells the rules engine what to look for. In the “Then” section, you can define the Connectivity Type and optionally the Network Boundary. By default, the Network Boundary is automatically determined by the Connectivity Type (more on this in the next section).

Once you've created and saved a rule, the Evaluate Rule button (upper right) initiates evaluation of your Kentik-registered interfaces against all of your currently active rules. The number and percentage of interfaces that are matched is shown in the sidebar. If you update your IP addresses or interface descriptions, you can click on the Evaluate Rules button to re-run the classification rules. This makes it exceptionally efficient to classify all of your interfaces.

Setting up network boundaries

In the operation described above the classification of network boundary (internal or external to the network) was automatic, and it relied on Kentik Detect's preset definition of the network boundary associated with each connectivity type. However, using the Configure Network Boundaries modal (button at top of IC page), you can set your own correlation between a connectivity type (backbone, customer, host, etc.) and network boundary.

The description above just skims the surface of Interface Classification. Look to the Kentik blog in coming months for deeper insights into how IC works and what you can do with it.

Interface Classification Much of our development effort in July was directed toward under-the-hood improvements that will make it faster for us to innovate in response to customer needs and feedback (more on this in coming months). At the same time,…

June 2017

Enhanced Account Security

We've enhanced account security by incorporating email activation and TOTP 2-factor authentication.

Email activation workflows

When first creating your account, and also when changing your password, you'll now be sent an email to which you'll be required to respond in order to complete the remaining steps in the process. This change applies in the following situations:

  • You sign up on
  • An Admin creates an account for you.
  • You change your account password via your User Profile page in the Kentik Portal.

TOTP 2-factor authentication

The Kentik Detect portal now allows users to add 2-factor authentication to their account. The flavor we use is called Time-based One Time Password, aka TOTP. It works with any mobile app allowing you to register TOTP tokens, including the following, which can be found on Google Play and the Apple app store.

  • Duo Mobile
  • Google Authenticator
  • Authy

To enable TOTP in the Kentik Detect portal, open your User Profile page by clicking on your username at the right of the navbar. You will now see a 'security' section in the User Information pane at right.

Click the Register for TOTP button and follow the instructions (you'll be presented with a QR code to enroll your mobile device). Once you're enrolled, at each login you'll be prompted for a TOTP token after entering your login/password.

If for some reason you lose your token or change your device, please contact an Admin user within your organization. This user can disable TOTP for your account by going to Admin » Users to access the Edit User page for your account, then clicking the Disable TOTP button. At this point you'll be able to log back in and re-enable TOTP with your new device.

Expanded Dimensions and Metrics

Several recent changes have expanded the dimensions and metrics available for use in your queries.

Enhanced granularity on wider queries

Depending on the time-range of a Kentik Detect query, the individual one-minute slices stored in the KDE (Kentik backend) may be aggregated into wider aggregation steps for returned results (for more explanation, see Time Rounding in the Kentik KB). For queries whose time-range was 24 hours or more, each aggregation step used to represent 20 minutes. We've now halved that to 10 minutes, doubling the resolution of results from these longer queries.

Advanced computation of unique metrics

The options available for metrics include more than a dozen that count unique instances. Until recently we computed these over a single time-slice for a single device, but we announced back in May that for Unique Src/Dst IPs we were now computing across the union of all devices. From that first step toward enhanced accuracy we've now extended these improvements in two ways:

  • We now count not only for the union of all devices, but also for the union of all time-slices across the entire time range.
  • We apply this new computational method not only to counting unique IPs, but to all of our "Unique" metrics.

The ability to look across time-ranges and devices all combined together is now enabled in our portal UI with a new Total option in the drop down Display and Sort By list in the Advanced Options section of the Query pane (Data Explorer sidebar). Without using Total, the returned value would represent all devices but only in the time-slice with the greatest number of unique instances of the counted metric. Using Total, you'll instead get the total number of “uniques” across all devices for the entire width of the query, which is a much more realistic method for counting uniques across devices and time.

New Total option

While the new Total capability is particularly interesting for unique counts, it will also come in handy to compute things like total bytes, packets, flows, and retransmits that could previously be displayed and sorted by Max, Avg, or p95th for one time-slice. For non-timeseries display types you can now specify total over the entire time-range.

New metric: Unique Dst/Src Port

With the addition of this latest metric you can now look at variations in the number of unique source and destination ports over multiple devices. This should be particularly useful for the purpose of security assessment, where seeing a significant change in the number of source/destination ports could be a warning sign of scans or attacks.

Added Alert Notifications

We continue to expand the range of options available for you to receive notifications from our anomaly detection and alerting system.

PagerDuty integration

PagerDuty is the latest add to the list of our alert notification integrations. With this integration, Kentik alerts can now create incidents within PagerDuty. PagerDuty is a widely adopted and nicely straightforward Incident Resolution Platform as a service (it's the one we actually use at Kentik). If you haven't tried it before, check it out.

Each of your PagerDuty services can be configured in the Kentik Detect portal as a separate notification channel and assigned to one or more alert policies, which allows you to map notifications for various kinds of conditions to the relevant network team. For example, you can have capacity-related alerts trigger a PagerDuty incident on a service that's handled by your network provisioning team, while security incidents can trigger notifications to a different service that's owned by your network security team. Check out our knowledge base entry on PagerDuty integration for step-by-step configuration details.

Alert notification documentation

Speaking of our KB, the entries on alert notification channels have been updated with additional information to make it easier to set up channels that integrate with external systems and to assign channels to alerts. The Alert Notifications section should be your first destination for guidance on configuring notification channels. As a reminder, you can currently integrate Kentik Detect alert notifications with Syslog, JSON Webhooks, Slack notifications and, now, PagerDuty. As always, email notifications are available as well.

Enhanced Account Security We've enhanced account security by incorporating email activation and TOTP 2-factor authentication. Email activation workflows When first creating your account, and also when changing your password, you'll now be sent an email to which you'll be required…

May 2017

nProbe Hosts and NPM v2

nProbe is agent software from ntop that is used to get traffic data from hosts to Kentik Detect. Kentik's integration with nProbe has undergone significant improvement with newer versions (7.5 or higher). We've summarized some key points about the upgrades below; you can also learn more about the changes in the following Knowledge Base topics:

Selecting Host Devices

nProbe hosts are selected like any other devices in the device selector in the Devices pane of the Data Explorer (shown at right). nProbe hosts of v7.5 or higher are represented with the device type icon that is labeled “DNS WWW.”

New Metrics for NPM

nProbe-based deployments can now query on new Network Performance Monitoring (NPM) metrics (listed at right) in addition to the traditional metrics available from non-host devices (e.g. routers and switches).

Native Data Format

nProbe now communicates natively with the Kentik Detect platform, which means that there's no need to use the Kentik Proxy Agent (chfagent) for hosts, even in private IP deployments. nProbe now sends traffic data to Kentik Detect using kFlow, Kentik's own enriched and encrypted flow format.

New Host-specific Dimensions

Users running the new nProbe version are now able to query on host-based, application-level group-by dimensions. The initial set of new dimensions, which are related to DNS and WWW, are listed at right. These dimensions are available in the Group-By Dimension selector whenever any selected device is a host (see above).

Grouping by Substrings

Depending on the specific host dimensions selected to group by, a cut function for DNS/WWW dimensions will be available in the “Advanced Options” section of the Query Pane. This feature allows grouping by regex-matched substrings. In practice this means that you can dynamically pull results for metrics that are broken down by specific string patterns within those dimensions, such as TLD, domain name, specific HTTP Query arguments, or subsets of User Agent strings.

As an example, the graph and table below were generated using the DNS Query group-by dimension on an nProbe host:

Using the DNS cut function, this query can be refined to group by domains, with the result shown below:

Access Control Lists

In our constant effort to increase security around access to your critical data, we have just added the Access Control (aka ACL) feature. Access control, which is covered in the Access Control article in our Knowledge Base, is configurable through Kentik Detect Portal at Admin » Access Control menu:

What ACLs offer is the ability to filter, by IP address or subnet, access to four different subsystems of Kentik Detect:

  • Portal: controls access via the Kentik Detect portal.
  • API: controls access via Kentik APIs.
  • Agent: controls access via the Kentik Proxy Agent.
  • Database: controls access via a PostgreSQL client.

Two options are available for each individual interface:

  • “Allow All” (default setting for Portal and Agent).
  • “Deny All except,” which enables you to whitelist individual IPs/CIDRS (default for API and Database).

Data Explorer additions

Unique Count of Source and Destination IPs

The technique for calculatiing unique source and destination IP counts over multiple selected devices has been updated for improved accuracy. We used to compute the #unique destination IPs for each selected device, for each 1-minute time bucket, then return the max per-device count of IPs within the specified time range. We now get a more realistic result by computing the number of unique destination IPs for the union of all selected devices, and then take the max corresponding to the specified time range.

New metric: Unique Destination next-hop ASNs

With this new metric you'll be able to count the number of unique Next-Hop ASNs for a given device. This can be useful to track the number of peers you have on a specific Internet Exchange, as shown below.

Bi-directional Filters

We've noticed that when doing our own spelunking in Kentik Detect we often look up flows against a given ASN or IP/CIDR regardless of whether it's a destination or a source. That used to require two filters, which could add up to a lot of extra work when stacking filters to narrow a query. So, as shown below, we've now provided a whole additional column in the Filter selector with dimensions that match source OR destination. Dimensions with this convenience include Country, ASN, AS Name, Flow Tag, IP Port, Mac Address, IP/CIDR, Interface ID, Interface Name, Interface Description and Route Prefix.

SNMPv3 Polling

We've added SNMPv3 to the existing SNMP v2c methods for automated polling of meta-data on your devices. SNMPv3 is a more secure iteration of SNMP and is preferable when your SNMP information will travel over the open Internet (i.e. when you are not directly peered with Kentik's AS).

SNMPv3 adds two layers of security to the v1 and v2c model: authentication and privacy (a.k.a. encryption).

When configuring a device, you can now enable SNMPv3 by turning on the toggle.

Both can be individually enabled and configured in the SNMP section of the device page:

  • Authentication: Both MD5 and SHA methods are supported.

  • Privacy (encryption): Only 56-bit DES is supported for encryption (AES or 3DES are not currently supported).

Alerting Updates

Slack Notifications Channels

Our Alerting system is gaining output capabilities as we move to enable more seamless integration with your internal workflows. In addition to email, syslog, and JSON, we've now added Slack notifications to our range of available Alerting Notification Channels. Check it out at Alerting » Notification Channels, where you can now create a Slack notification channel

After you set configurations in a series of Slack web pages where you select your Slack Team and the channels to post in, this newly created Notification Channel is then available for use in the thresholds of your Alert Policies.

The below example shows a Kentik alert notification in Slack:

Weekend-aware baselining

Baseline settings in an Alert Policy now include a “Weekend Aware” option (shown below). When active, this setting takes into account the day on which traffic will be evaluated against the baseline:

  • If evaluated over the weekend (Saturday, Sunday), only weekend days in the look-back period will be considered.
  • If evaluated over a weekday, weekend days will be discarded from the loopback.

This option can be a life-saver for situations like content networks, where there is a lot of traffic over the weekend and much less traffic on weekdays. Without taking the day of week into account, weekend traffic could set off false positives for alerts that track unusually high traffic.

Miscellaneous Alerting Updates

Additional improvements to Alerting:

  • Bi-directional filters (see above): available in alerting too!
  • Packet-Size: now available in Alert Policies, a both:
    - a Dimension to use for Group-By;
    - a Filter to include or exclude specific packet sizes.
  • View in Explorer: a button on Alert Policy page that allows you to look at the existing, current flow data against which you are trying to build a policy.

BGP Events Notifications

You asked for it: we've added a notification toggle for BGP events to the notification setting on the User Profile, which is accessible by clicking your username at the top right of the navbar.

With this setting toggled to "Yes" you will be informed via email of any BGP event on Kentik Detect's ingest points, including all service-affecting issues. We will continue to notify about BGP-affecting maintenance windows via our usual channels.

This May, our engineering team has released a few significant update: we've further streamlined our first foray in to NPM with a v2 release of our nProbe-based solution. We have also been ramping up user security by rolling out Access Control Lists to govern Web Portal, API and SQL access to Kentik via configurable access lists. More secure SNMP v3 is now generally available when registering devices, and our Alerting system now integrates with your Pager Duty setup, while it has also been made weekend aware. Enjoy!

April 2017

Ultimate Exit Release #1

Fasten your seat-belts, this one is a big deal. It's the first release within a bigger plan for end-to-end visibility of your traffic, which is a holy grail objective of flow data reconciliation. What do we mean by “end-to-end visibility”? It means an easy way to figure out what volumes of traffic are flowing in and out of your network, from any source to any destination network.

A great example of this is assessing potential peer or transit prospects. How many times have you had to toggle between multiple spreadsheets that contain only approximations of traffic to or from various ASNs, getting bogged down in hacked, convoluted excel formulas, all in order to guess the ROI of what should be a simple decision?

What about trying to figure out how much traffic from a peer is being routed locally versus over more costly long-haul links? You need to able to figure out precisely at the site and device level — and at the interface level in the future — the traffic flowing between network entry and exit points.

It turns out that the sophistication of flow consolidation and reconciliation needed to achieve this task is beyond home-grown tools, data infrastructure, and software engineering capacities of many network engineering teams. And for good reason. It’s a hard problem.

Voila! New Exit Dimensions in Kentik Detect

Introducing two newly added destination dimensions (fanfare, please):

  • Ultimate Exit Site
  • Ultimate Exit Device

How do you use these? Let's say you are a transit provider. You move packets from content providers to eyeball ISPs, and carry them over a costly global backbone. You want to look at the traffic you're exchanging with one of the major content providers like Google, and see where it comes in, and where it comes out of your network.

Let’s further assume that you run a well organized network, so you indicate within your Interface description nomenclatures any interconnections with Google. This means you can easily include these interconnects with a simple filter. For example:

Filtering Google PNIs

BTW, if you know that you're going to be looking at these often, you can also make yourself a nice Saved Filter (see below) and just apply it any time you need it.

Saved filter: Google PNI

Then you can use that saved filter in any Data Explorer query you're working on.

Applying Google Saved Filter

So here's what you want to look at, in sequence:

  • The site where the traffic enters the network.
  • The site where the traffic leaves the network.
  • The next-hop Network.
  • Which eyeball network it is terminating at, i.e. Destination AS.

Using Kentik Detect's handy new dimensions you can now answer this question with the following query:

ultimate exit dimensions

For a useful visualization, select the Sankey display type:

Ultimate Exit Sankey

Looking at the generated Sankey diagram (above), you can now instantly see what traffic is flowing between the entry Site and the Ultimate Exit site, and which eyeball networks are reached. What you would typically do at this point is look at where transport is the most expensive or least performant between your Entry Site and Ultimate Exit site and optimize for either of them.

In the above Sankey chart, you can see that you're shipping a lot of traffic from Frankfurt to Marseilles. So a few questions come to mind that can be explored further in Kentik Detect:

  • Should you track Google's ability to PNI in Marseilles and save yourself some Frankfurt→Marseilles transport costs?
  • Do you want to review your prices for transport for London→Marseilles based on how much of that capacity is consumed by your Google PNI?
  • What portion of the private links between Frankfurt and Marseilles is going to those Google PNIs, and therefore what’s the real ROI you're getting from these links?

You can’t even start this ROI exploration when you’re stuck in spreadsheet hell. Stay tuned, because there's a lot more coming over the next few months in this arena.


Custom Dimensions Update

Our Custom Dimension infrastructure has been upgraded, allowing us to upgrade our default provisioning rules:

  • Max Custom Dimensions per customer account: increased from 5 to 10.
  • Max characters per dimension: increased from 12 to 128.
  • Max populators: upgraded from 5000 per dimension to 10,000 overall across all dimensions (no additional per-dimension limit).

User Based Filtering [PREVIEW]

Every now and then we will preview an upcoming feature. We also believe that occasionally there is value in releasing an early/crude version of a feature-set in order to get early feedback from our users, which we can then use to quickly iterate until we arrive at the feature that users really want. In the case of User-Based Filtering (see Knowledge Base article), we are previewing here a feature that we have decided to introduce as an early release.

Kentik Detect currently supports two different user levels: Member and Admin. User-Based Filtering allows an Admin user to apply a user filter that restricts the data available to a Member user. The underlying idea is for Admins to be able to grant (very) granular rights on what specific Members are allowed to see and/or query.

Admin users can set up a user filter on the Users page (Admin » Users).

Admin > User

Modify user prefs in Admin > User list

A user-based filter is composed like a filter in the Filters pane of the Data Explorer sidebar. Once a user filter is associated with a given user, these filters are systematically appended (ANDed) with any query run by that user, including:

  • Data Explorer queries via Kentik Portal UI
  • SQL queries from the SQL Query explorer or via PGSQL connections
  • API queries

One use case example is allowing only certain users to query flows from backbone routers, as shown in the following screenshot:

User Based Filter example

Another example, shown below, allows certain users to query only flows for CUSTOMER interfaces on 'Ashburn DC3' and 'Ashburn DC4':

User Based Filter example

As explained above, we have released the minimum amount of functionality for this feature, and hope to leverage the feedback of interested users to iterate it.

Some open questions we have for this feature include:

  • Should filtered users be made aware in the UI that they are being filtered? In the current version of this feature, the user wouldn't know.
  • If filtered users are made aware, should we indicate a permanently locked filter setting in the Data Explorer?
  • Should we let users know they are being administratively filtered, but not indicate what the filter constraints are?
  • Should the display of filtering information be administratively configurable at the user level?
  • How do we mention or indicate user filtering in the API and SQL? For example, when a user submits a SQL query, should we return a modified version of the submitted requests with the appended filtering in its SQL form?

Please let us know your feedback on Is this a useful feature that you would like to rely on? What should the next iteration look like?

Sampling Rate

This is one for the nerdier users out there. As you may know, our ingest platform includes smart ways of re-sampling flows exported by your devices to match your contracted FPS. We’ve been improving this functionality quite a lot recently. Our goal is to resample accurately and keep the resampling-bound distortion as close to zero as possible.

In order to keep our engineering work accurate, we actually had to add Sampling Rate to our available dimensions, metrics, and filters, as shown in the images below:

Available Dimensions:

New dimension: Sampling Rate

Available Metrics:

New Metric: Sampling Rate

Available Filters:

New Filter: Sampling Rate * 100

This could come in handy on your end when debugging potential flow sampling misconfigurations.

Extra Data Explorer niceties

As we see our customer's usage of the Data Explorer evolve we often throw in additional convenience features that we think will streamline the overall user experience. This time around, we've added a couple of convenience tweaks, both of which are geared towards making queries return faster by allowing users to optionally skip certain processes.

  • Disable Total: You can now disable computation of Total over a metric if you already know you aren't interested in looking at the total value for your breakdown. This saves processing time on our mid-layer, resulting in faster return of query results.

Disable total

  • Disable Hostname lookups: You can also now disable Hostname lookups directly from the Data Explorer query panel, which reduces query response time because IPs won't need to be reverse DNSed before returning the results of an IP/CIDR breakdown.

With reverse DNS enabled:

Reverse DNS enabled Data table with reverse DNS enabled

With reverse DNS disabled:

Reverse DNS disabled Data table with reverse DNS disabled

Alerting Update

Syslog Alert Notification Channel

We've just added the capability for you to ship alert notifications to good ole Syslog infrastructure. This has been a recurring ask since we've released v3 of our Anomaly Detection and Alerting platform.  Your voice has been heard! Syslog alerting works in the same way than the JSON Webhook feature does, which is by offering a new type of notification channel, aptly named "Syslog."

When configuring a threshold in an Alert Policy (Alerting Alert Policies edit a policy), you will notice that in addition to the existing Email and JSON webhook options a new entry has been added to the Create Notification Channel button. You can tune all of the config knobs when you create the channel, including Port, UDP/TCP transport, Syslog Severity, and Syslog Facility.

syslog config panel

Alerting: new dimensions and filters

We've just added new support in our Alert Policies for:

  • IPV6 (for Dimensions as well as Filters)
  • inet_family (for Dimensions as well as Filters - this is to select IPv4 vs IPv6)
Ultimate Exit Release #1 Fasten your seat-belts, this one is a big deal. It’s the first release within a bigger plan for end-to-end visibility of your traffic, which is a holy grail objective of flow data reconciliation. What do we…

February 2017

Flow Type Auto-Detection

Users no longer have to indicate to Kentik what flow type they are sending (e.g. NetFlow, sFlow, IPFIX) - from now on, Flow Type isn't specified anymore at device creation time and will be auto-detected by the Kentik Detect Ingest point itself.
In the Admin Device List, the “Flow” column now indicates what flow type we are receiving and auto-detecting from each device.

Auto-detect Flow-Type

Flow Type Auto-Detection Users no longer have to indicate to Kentik what flow type they are sending (e.g. NetFlow, sFlow, IPFIX) – from now on, Flow Type isn’t specified anymore at device creation time and will be auto-detected by the Kentik…

March 2017

Major Alerting v3 updates

Custom dimensions are now supported in Alerting

Anomaly detection users can now leverage all the profiling power of Kentik’s Alerts capabilities with their own Custom Dimensions. What this practically means is that baselining and thresholding are now available on user defined custom dimensions - like location, service name, customer ID, or any other way you’d like to support meaningfully slicing traffic.

A simple use case could be a jump in bits/s for traffic you have classified as “Transit” via custom dimensions. Or a drop in bits/s for traffic you have classified as “Settlement-Free Peering.”  Or even major new traffic destinations on a per-application basis.

Alerting JSON webhook triggers

A lot of our anomaly detection users have been asking us to add means to trigger homegrown REST endpoints when alerts are firing, primarily to allow integration to in-house tools and workflow systems.
If you are one of these, your voices have been heard 🙂

Whether you want to integrate Kentik’s Anomaly Detection capabilities into your existing monitoring systems or trigger your own form of remediation, this is now possible!

You can now set up a Notification Channel that corresponds to a webhook URL which can be posted to.  The Channel will receive all of the relevant JSON data context for you to code against.

JSON webhook UI

Route Traffic Analytics

Route Traffic analysis is the fruit of a hackathon we held earlier this year at Kentik.

You may have heard about studies finding it isn’t uncommon for a given network to have over 95% of its traffic delivered by a minuscule number of routes.

The reason behind these studies is that the FIB capacity of low-end black box L3 switching gear is limited to around 30K prefixes.  If you can find a way to live with only 30K routes in FIB and a default route to cover the rest, you don’t need to purchase very expensive routing gear that has a FIB capacity in the millions of routes.  The operational question is which 30K routes?

The Route Traffic Analysis feature, under Analysis → Route Traffic, precisely answers this question.

Feature overview:

Accessed from the Analytics menu, Route Traffic Analytics feature provides insight into the number and percentage of traffic flows correlated to the number and percentage of routes, plus Mbps per analyzed tranche of routes.  The summary view provides both histogram and tabular data views.

Conveniently, the histogram on top of the table will display stops for p95th, p90th, p80th for Traffic and Routes on its X and Y axises. 

Route Traffic Analysis - Summary

A listing of the top 1000 routes by traffic density, which provides more details per routes

Top 1000 routes by traffic density

Export to CSV of top routes, which could be used to configure routers

A quick calculation of average and max Mbps per route

New Packet Size, Interface Capacity Dimensions

Packet Size Dimension

In our constant effort to bring more and more dimensions for our users to slice and dice from, we have just added Packet Size and Packet Size_100 grouping dimensions and filters to our Data Explorer and Dashboards.

The Packet Size_100 dimension segments packet size statistics in buckets of multiples of 100 Bytes, well suited for Comparison Bar Charts.

Packet Sizes buckets in a bar chart

Interface Capacity Dimension

Interface Capacity has also been added to flow grouping dimensions and filtering in the Data Explorer and Dashboards.

This allows our users to display a graph of all 10Gig links, another of all 20gig links, etc, so customers can eyeball hot links or capacity issues per link type.

This dimension will come in handy when going through a capacity management exercise in your network: it is well paired with a table view, in which you could for instance list your topX 10Gbps interfaces by order of traffic, as displayed in the screenshot below:

10Gbps interface capacity report

With reports using the Interface Capacity dimension, you can now answer questions such as:

“How is traffic versus capacity for the 1Gbps, 10Gbps, 20Gbps, 30Gbps, 40Gbps, 100Gbps interfaces on our sites?  Are any of them maxed out?”

To illustrate the above, we have created a 'Capacity Management' Preset Dashboard readily usable for this purpose, load it directly from the Dashboards Library section:

Capacity Management Dashboard


SNMP / Interface Overrides

This capability lets users manually set interface level information that is usually polled via SNMP.

 Our Knowledge Base entry for Interfaces has been updated with this feature.
 The associated API reference is available here in our Knowledge base, and here in our sandbox, within the /device endpoint

The main use cases for this new features are:

  • Providing query-able interface info on a Router/Switch device when SNMP is not enabled.
  • Providing query-able interface info on nProbe hosts as SNMP isn’t available for these by default.

The implementation of this feature can be seen in the Device → Interface screen.

Hovering on an interface line will present options to override an interface, as shown below:

Interface override

Navigating to the Edit button will bring up an in-place edit panel for this interface:

Edit interface override

Upon saving, override fields of the interface will be displayed with an orange triangle in the bottom left corner, as in the example here:

Interface override flag

...and hovering the aforementioned orange triangle will display the initial value when there is one:

Overriden interface description

An additional handy toggle in the interface table’s header allows you to filter it to only view interfaces with an override:

Overridden interfaces display filter


New User Profile Settings

User Profile settings have been updated to allow enabling or disabling of history, default time-zone and DNS lookups.  Settings are in the “User Information” table found by clicking on the username at the upper right of the navigation top bar.

Disabling history in the User Information panel sets the Historical Overlay switch (shown below) to off by default in the Data Explorer.  This shortens query response time as data points for the selected number of days of history don’t have to be fetched anymore:

Disabling history

Disabling DNS lookups will also reduce query time, as Hostnames for displayed IPs in the Data Explorer query result table won’t have to be fetched before returning the result.  Depending on how many IP addresses are being resolved, disabling lookup can greatly speed any graphs or queries returning IP addresses.

Default landing page

A newly added option in User Information is the ability to configure a landing page, which is the page that will show by default upon login.
The landing page can either be a Dashboard, a Saved View, or your the Alert Summary page if you are a user of our anomaly detection feature-set.

Default Page Settings


Misc additions

  • We now display distinct flow types for NetFlow v9 and IPFIX on the device listing page.
  • Alerting learning mode default is now +6 days.
Kentik's engineering team busy at work this March 2017, and we're happy to bring you updates on a lot of anticipated features: Major Alerting/Anomaly Detection add-ons (including one of your most popular requests: JSON Alert Webhooks), an entirely new Route Traffic tool in our Analysis section, Interfaces Overrides, additional native flow columns (Interface Capacity, Packet Sizes...), as well as a flurry of new User Preferences. Enjoy!

September / October 2016

In graph zooming

Data Explorer now supports graph highlighting and click and drag operation on the timeline to zoom in to the selected timeframe.
Following on to a horizontal click and drag, the side query panel will automatically update its “Time” fields and a zoomed-in graph will be spawned.

New 'Table' visualization type

A table view has been added to the existing display types on top of the existing chart types.

Beyond their basic appearance, Table views are highly customizable in terms of columns they display and can amongst others allow to build computed fields in a very comprehensive manner.
These advanced options for the table widget are available by clicking on the hamburger menu at the top right end of the table component.

View hamburger menuTable widget view options

→ Table View Options details can be found in our Knowledge Base under this article.

Custom Dimensions

Custom Dimensions correspond to user defined Flow Enrichment Custom Columns. What that means in practice is that users are now able to programmatically enrich their flow data with columns (5 custom dimensions are allowed per account) that can be grouped-by, summed, max’ed, etc.

Unlike Tags or Saved Filters, Custom Dimensions only affect the flows being considered in a request.  Custom Dimensions provide an efficient way of breaking down your visualizations by your own business contextualized data groupings.

Values for each custom dimension can be set via:

Interesting examples of how one would use Custom Dimensions include:

  • Marking different types of customers: populating a customer_type Custom Dimension based on the IP Ranges within which the customers are hosted.
  • Marking arbitrary tiers of cheap to expensive destinations or sources by relying on source or destination ASNs.
  • Marking Peering (paid, free), Transit, and IX traffic based on matching interface description.

→ The extensive documentation around Custom Dimensions can be found here in our KB

Saved Filters

→ The extensive documentation around Saved Filters is located here in our KB

Saved Filters are a new addition to Kentik Detect’s take on how to slice and dice data in the Data Explorer in an increasingly quick and convenient manner.

Remember the days where you needed to build a complex filter from scratch when going back to the Data Explorer screen?  Those days are over. With Saved Filters, you can conveniently save filters you use on a regular basis and call them from the Data Explorer Filter section any time.

You're welcome 😉

Here's what filters look like now:
If you were to build that filter of destination French ISPs every time you create a query, it could be quite a chore… here's what your filter would look like (apologies if I forgot any French ISP)

Filter for French ISPs

Saved Filters to the rescue:
Now you can now save that filter by clicking on the disk icon at the top of the filter group, and re-use it sometime later.

Save filter modal

Voila !
You can now invoke this filter any time directly from the filter screen:

Load saved filter

Double-click the filter’s name and you can invoke its opposite, in this case filter on any destination ASN but the French ones you previously listed !

Negate saved filter

Additionally, Saved Filters are shareable between users at a company level, as well as Kentik offers common pre-set filters. To get a view of all filters, just hop on to Admin → Saved Filters:

In a future release, Saved Filters will adopt some form of a library view to facilitate collaboration and sharing, stay tuned!

In graph zooming Data Explorer now supports graph highlighting and click and drag operation on the timeline to zoom in to the selected timeframe. Following on to a horizontal click and drag, the side query panel will automatically update its…

December 2016

A10 Integration with Anomaly Detection

A10 logoOn top of the already offered RTBH mitigation method, our Anomaly Detection system now supports integration with A10's Thunder TPS Series mitigation hardware.
What this basically means is that if you already own or plan on acquiring such appliances, you can leverage all of Kentik Detect's powerful Anomaly Detection system and couple it with A10 for mitigation.

To configure the Kentik end of an A10 TPS mitigation platform for use within policies, go to the Mitigation menu under the Alerts and click on the +Create Mitigation Platform, as shown in the screenshots below:

A10 Integration

Matrix visualization

 Matrix visualizations are described at length in this Knowledge Base article.

A "Matrix view" is now available in the Data Explorer, find it amongst the already existing Display Types section of the query side panel
Matrix view type 

Here are a few concrete examples of uses cases for Matrix Views:

  • Transit providers might want to look at Top 10 Source ASNs vs Destination ASNs matrix of traffic. This might be a good way of trying to identify strategic content or eyeball prospects to engage in the future.
  • Building a matrix of cross-PoP traffic for capacity planning purposes.
  • Looking at PPS between different farms of servers or even between top talkers in a Datacenter setup...

Alerting v3 Updates

Minimum look-back for baselining

→ More details on Look-back Alert Policy settings in this Knowledge Base entry.

You can now use the Minimum Look-back setting to specify the minimum number of hours or days that baseline data collection is performed before a baseline is made available for comparison by alerting policies. 

In-policy creation of notification channels

→ More details on Alert Notification Channels in this Knowledge Base entry.

You now create a new notification channel from directly within the threshold notification-add function. 

Dashboard editing overhaul

→ Knowledge Base entries detailing Dashboard usage and creation are located here.

The dashboard layout infrastructure has been redesigned to improve speed and ease of use. This comes with a streamlined user experience as part of our constant effort to streamline usability of our most used features.

Dashboard Edit screen

Scheduled exports

Exports and scheduled reports have been redesigned for ease of use.
Here’s an example of the overhauled Email Subscription experience:


And the Export feature in Dashboards and Views updated experience:

Export feature alert

BGP Status within device screen

You can now tell the state of your BGP sessions in the Device List table in the Devices page, which is found under the Admin menu.

A10 Integration with Anomaly Detection On top of the already offered RTBH mitigation method, our Anomaly Detection system now supports integration with A10’s Thunder TPS Series mitigation hardware. What this basically means is that if you already own or plan on…

August 2016

IPv4 and IPv6 CIDR grouping/breakdown

When selecting dimensions in Data Explorer, users now can configure separate aggregation/grouping levels for IPv4 or IPv6, from a single location in the Query Side Panel:

CIDR breakdown in Data Explorer

Kentik support for nProbe

→ Detailed steps to get setup with nProbe and Kentik are detailed over in this Knowledge Base section.

nProbe logonProbe
now allows you to export flow data to Kentik Detect’s Flow Data platform, unveiling a whole new array of host-level traffic and performance info.
While previously limited to flow-data from your networking gear, Kentik now brings server/data-center level metrics to the powerful performance analysis tools it already offers (Custom Dimensions, Tagging, Filtering…).

With nProbe able to send flow data to the Kentik Detect big data platform, the realm of query-able metrics now extends to network performance for such devices, including:

  • Retransmits/s, %Retransmits,
  • Out of Order/s, %Out of Order,
  • Fragments/s, %Fragments,
  • RTT/2 Client latency
  • RTT/2 Server latency
  • RTT/2 Application latency

This first set of performance metrics paves the way for the future addition of application-specific Dimensions to enrich flows exported from servers.
The screenshot below shows how registration of nProbe hosts happens in the Kentik Detect Portal:


Multiple time series

→ The multiple time series view options will soon enough be detailed in this section of our knowledge base.

Currently in its Beta stage, this feature now allows you to combine multiple graphs in the Data Explorer (and dashboards) into one single, comprehensively configurable representation.
This can prove handy when trying to establish causality between different observed phenomena.

Below is a simplistic view of Destination and Source traffic broken down by ASNs:

IPv4 and IPv6 CIDR grouping/breakdown When selecting dimensions in Data Explorer, users now can configure separate aggregation/grouping levels for IPv4 or IPv6, from a single location in the Query Side Panel: Kentik support for nProbe → Detailed steps to get setup with…

January 2017

Data Explorer Pivot to Dashboard

Every now and then, the simplest feature unveils a world of possibilities.  The new ability to "pivot" a row in the Data Explorer is a great example.

Clicking on the menu at the right of a row in the Data Explorer and selecting “Pivot” opens a (configurable) dashboard showing many different views of the chosen row of data based on different combinations of dimensions and metric.

This pivot feature allows rapid and comprehensive data exploration, reducing the need to manually construct a series of several ad-hoc views in the Data Explorer, for example when trying to identify “why this unexplained bump over this traffic graph occurred.

For instance, if I am suspicious of traffic sourced in the Netherlands going to a specific IP address, here’s what I would do, taking advantage of the pivot feature:

Below, we see a dashboard that decomposes this NL → dest. IP traffic into multiple different dimensions, without making me go through the trouble of building a unique dashboard.

The pivot feature makes new paths of investigation practical that wouldn’t otherwise have been explored due to the time required to build such a dashboard, and the interruption building a dashboard causes to the investigation workflow.

 The pivot feature is discussed in this Knowledge Base entry


Data Explorer side-bar overhaul, Saved Views

As you’ve probably noticed, we revamped the UI of Data Explorer’s Query sidebar to further streamline its appearance.

At the same time, we’ve also added the ability to Create, Edit, and Save Views. Where you previously needed to rebuild your favorite queries in Data Explorer, you can now save them and go back to them to refine them or even share them.

 The full documentation on Saved Views is available in our knowledge base under this article

Saved Views come with an overhauled Data Explorer menu allowing quick access to them.

Saved Views options in the revamped Data Explorer menu

A new Saved Views Library section has been started, allowing users to share Saved Views within the same company, or even leverage Kentik’s library of pre-existing views.

This marks the initial steps towards a community driven initiative that will be started in the future for Kentik users to share their recipes on Dashboards, Views, Alerting policies.

Directly from the Data Explorer, look for the Save and Load controls at the top. With these, no more starting all over from scratch when improving on your (or your co-users') existing visualizations. Conveniently load them and save them anytime.

Saved Views - new look

Here's a quick display of what the new Saved Views Library looks like:

Saved Views Library

Stay tuned and watch this community concept trickle down into further areas of the Kentik Detect Portal in the future.

Further IPv6 support in Data Explorer

Kentik has fully supported storage and querying of IPv6 for some time, and we are steadily adding support for IPv6 in any place where addresses or prefixes are used.

IPv6 Next-Hop flow dimension

Next-hop IP dimension in explorer and dashboards now supports IPv6 on top of the existing IPv4, as displayed in the Data Explorer Dimension selector below. Note that different CIDR thresholds can be set independently for IPv4 and IPv6

Next-hop IP dimension

IPv6 Source/Dest prefixes dimension

Metrics support for IPv6 added to explorer and dashboards: Unique src/dst prefix, Unique SRC/DST ASN, and Unique src/dst IP now support ipv6

Metrics support for IPv6

Alerting feature update

Alerting is now fully documented in our Knowledge Base , feel free to swing by and get a more detailed view of what it offers!

Additionally, Alerting now supports Route Prefix and Length (Prefix/LEN) both as a Dimension and in Filters.

API v5 updates

APIv5 documentation has been entirely updated, and is now available to our users at the following locations:

v5 API for administration of Kentik Detect Objects     here
v5 Query API to pull data from Kentik Detect Engine     here
v5 API sandbox / tester     here

Additionally, an API functionality to return a URL to open an API call in browser (authenticated) has also been added.

Important note:
The current plan is to shut down former API versions (namely v1 and v4) on May 5th.


ICMP code and type for v9/IPFIX is now supported.
It is overloaded into the IP DST PORT values based on NetFlow v5 ICMP encoding.

Another strong month, feature-wise over at Kentik Engineering: major Data Explorer redesign, new Saved Views that allows you to save and iterate on your favorite visualizations, and further IPv6 support throughout Kentik Detect Portal.

November 2016

Tags feature update

Tagging now supports regex for device names and interface fields, and supports IPv6.
As a reminder, a comprehensive table references all types of inputs for all of the available Tag Fields, it is located here.

For instance, if your interfaces always include consistent descriptions, you could potentially match said interface descriptions on either 'PNI' or 'Peer' or 'customer' and tag all the matches as 'Peering' to then be able to filter them in or out of any Data Explorer query.

Prettified JSON output to describe API calls

You can now see the API calls in Data Explorer as prettified JSON, making it much easier for your users to identify the fields at play in your API calls.

The idea here is to further simplify the task of integrating with the Kentik API under the following methodology:

  1. Building a satisfactory View, tweaking it until it shows exactly what you are after
  2. Exploring the resulting JSON
  3. Building an integration

To describe the underlying API call of a given view, proceed as illustrated below - starts with clicking the Hamburger Menu icon on the top-right side of a view

Show API callHamburger menu #2Prettified JSON REST call

Peering Analytics IPv6

Peering analytics now supports IPv6 as well as showing the full path on mouseover

Tags feature update Tagging now supports regex for device names and interface fields, and supports IPv6. As a reminder, a comprehensive table references all types of inputs for all of the available Tag Fields, it is located here. For instance, if your…
Back To Top