Wednesday, April 13, 2016

Network Monitoring Best Practices


1. Overview:

The fact that monitoring is one of the most important components of a network has been reiterated multiple times throughout this document. It is only with continuous monitoring that a network admin can maintain a high performance IT infrastructure for an organization.
Like the common practices which we discussed earlier, there are also best practices that are applicable to network monitoring. While common practices define the basic components that are essential for network monitoring and are applicable to every network, best practices for monitoring is a guideline to implement a good network monitoring strategy. Adopting the best practices can help the network admin streamline their network monitoring to identify and resolve issues much faster with very less MTTR (Mean Time To Resolve). Let us look at a few network monitoring best practices that are followed in many enterprises world-wide to help create a high performing network.

2. Baseline network behavior:

To be able to identify potential problems even before users start complaining, the admin needs to be aware of what is normal in the network. Baselining network behavior over a couple of weeks or even months will help the network admin understand what normal behavior in the network is. Once normal or baseline behavior of the various elements and services in the network are understood, the information can be used by the admin to set threshold values for alerts.
When an element in the network is malfunctioning, some of the metrics associated with the node performance would display a deviation from their mean value. For example, the temperature of a core switch in the network may shoot-up. The increase in temperature can be due to an increase in CPU utilization on the switch. Understanding the normal temperature and CPU utilization of the device will help the network admin detect the deviation and take corrective actions before a malfunction occurs.
Knowledge of baseline behavior in regards to network elements helps an admin decide the thresholds at which an alert has to be triggered. This aids proactive troubleshooting and even prevents network downtime rather than being reactive after users in the network start complaining.

3. Escalation matrix:

One of the reasons why potential network issues become an actual network problem is because the alerts triggered based on a threshold are ignored or the right person is not alerted. In a large network, there are can be multiple administrators or people who take care of different aspects of the network. There can be the security admin who looks at firewall devices and Intrusion Prevention Systems, the systems admin, or even an admin responsible only for virtualization.
When setting up monitoring and reporting, the organization should have a policy on who has to be alerted when a malfunction occurs, or a potential problem is detected. Based on the policy, the right person who is administers the network aspect that is having an issue can be alerted. This in turn can reduce the time needed for analysis which further reduced the MTTR.
In addition to alerting the right admin, an escalation matrix is also necessary. An escalation plan ensures that issues are looked at and resolved on time. Specifically, when the person in charge of that element is not available or takes a long time to resolve the issue. The implementation of a well-thought out escalation matrix prevents small issues from growing into large scale organizational-wide problems.
Image result for osi 7 layer model pic

4. Reports at every layer:

Networks function based on the OSI layer and every communication in a network involves transfer of data from one system to another through various nodes, devices and links. Each element in the network that contributes to data transfer functions at one of the layers, such as cables at the physical layer, IP addresses at the network layer, transport protocols at the transport layer, and so on.
When a data connection fails, the failure can happen at any one of the layers or even at multiple points. Using a monitoring system that supports multiple technologies to monitor at all layers, as well as different types of devices in the network would make problem detection and troubleshooting easier. Thus, when an application delivery fails, the monitoring system can alert whether it is a server issue, a routing problem, a bandwidth problem, or a hardware malfunction.

5. Implement High Availability with failover options:

Most monitoring systems are set up in the network they monitor. This allows for quicker and better data collection from monitored devices. But if a problem occurs and the network goes down, the monitoring system can go down too, rendering all the collected monitoring data useless or inaccessible for analysis.
This is why it is recommended to implement a monitoring strategy with High-Availability through failover. High Availability (HA) ensures that the monitoring system does not have a single point of failure and so even when the entire network goes down, the monitoring system is accessible, providing data to the network engineer for issue detection and resolution. One method for HA is failover where the monitoring data collected by an NMS is replicated and stored in a remote site. In case of failure at the primary monitoring system, the failover system can be brought up (or automatically come up) and provide data needed for troubleshooting. And to avoid a single point of failure, it is recommended to set up the failover system at a remote DR site.

6. Configuration management:

Most network issues originate from incorrect configurations. There are several instances where even minor configuration mistakes have led to network downtime or loss of data. For example, when a new service is implemented in the network and firewall rules are being added, the person adding the new firewall rule may end blocking a business critical application, or allowing non-business traffic.
This is where configuration management is applicable. When configurations are changed on devices, which include network and security devices, like routers, switches, or firewalls—with the help of configuration management, the network administrator can verify that the changes being made do not break an already working feature. Configuration management can also be used for backing up working configurations, and to make bulk configuration changes, which otherwise could take a significant amount of time and prevent unauthorized changes. Unauthorized configuration changes to devices can lead to serious security lapses that include hacking and data theft. With configuration management, the admin can keep an eye on who is making a change, what change is being made, and even provide access control to configuration changes.
Configuration management is the proactive part of network monitoring. Furthermore, configuration management helps prevent issues from occurring in the network, rather than alerting about potential problems after they begin.
Image result for networking pic

7. Capacity planning and Growth:

This applies to both the network in general and network management. When an organization grows, the IT infrastructure associated with the organization also should grow. An increase in business or addition of employees for an organization has effects on the number of devices needed, network and WAN bandwidth, storage space, and many more factors.
Monitoring systems allows you to keep tabs on resources in the network and be it with free, open-source, or licensed monitoring tools—there is always a limit on the number of resources and elements that can be monitored with a specific configuration or installation. In some cases, the server on which the monitoring system is installed may need upgrades to processing power and memory. In other instances, it might be the need to add-on installations to increase functionality, or in some cases it can be an increase in the license needed for the monitoring system.
When setting up a monitoring system account for future growth, it can affect the server sizing for installation, and for licensing—which controls the number of resources that can be monitored. Separate purchases, upgrades, or even moving to a new monitoring system as the network grows is much more expensive than spending a bit more capex when setting up the monitoring system.

8. Tips / Resources

  1. The Ultimate CPU Alert
  2. Monitoring Feature Function Matrix
  3. Network Management Tool

How to Update Router Firmware



Update the router firmware from the web interface. Locate the firmware upgrade option, typically listed under "Administration" as update or upgrade firmware. Once located, a dialogue box will prompt you to select the file from a location on your hard drive. Click the "Browse" button and locate the firmware update file you just downloaded. Once you have located the file, click upgrade or update firmware and wait for the firmware update process to complete. The router's firmware has been updated to the latest version.

Image titled Update Router Firmware Step 1


Determine the router's model and version number. Locate and write down the model and version numbers, typically located on the underside or backside of the router. The required information often is located near the manufacturer's logo.

Image titled Update Router Firmware Step 2

Download the latest firmware update. Using your Internet browser, navigate to the manufacturer's website. Navigate to the support or download section of the website and select your model from the list of products, or try entering the product information in the search field.
  • Select the link for the latest firmware upgrade and click "OK" to save the file when prompted. The download will be completed in a few minutes or less. The firmware update has been downloaded and saved to the system's hard drive.
Image titled Update Router Firmware Step 3

Locate the default gateway and IP address for your router on a PC running Windows. You will need to locate either the router's default gateway or IP address, depending on the router's manufacturer, in order to access the router's web interface. From the start menu enter "cmd" into the search field. With the command screen open, type "ip/config/all. The default gateway and IP addresses will be located under the IP configuration information.

Image titled Update Router Firmware Step 4

Locate the default gateway and IP address for your router on a Mac running any version of Mac OS X. Click the Apple icon on the far left of the menu bar and select the system preferences option from the pull-down menu. Then select "Internet and Wireless" from the network menu.
  • Click the "Advanced" button in the Network dialogue box and open the TCP/IP tab. The default gateway address will be listed under "Network." Write down the gate default gateway and IP address information, and exit the dialogue box.
  • Type "ip/config/all" with the command screen open. The default gateway and IP address will be listed among the IP configuration information.
Image titled Update Router Firmware Step 5

Access your router's web interface using the default gateway. Use the default gateway number or IP address, depending on your router's specifications, to access the web interface for your router. Type the default gateway or IP address into the address bar of your Internet browser. Press enter if you are not immediately directed to your router's web interface. The web interface will appear in your web browser window.

Image titled Update Router Firmware Step 6


Boko Haram Widely Deploying Female Suicide Bombers

Boko Haram has deployed 50 female suicide bombers according to a confession by an arrested teenage girl bomber, aiming to kill 100,000 by years end.
A casualty of an earlier suicide bombing by Boko Haram in a marketplace in the city of Jos (Photo: © Reuters)

The head of the Nigerian Air Force has said that his warplanes have been able to incapacitate Boko Haram with a concerted bombing campaign according to local newspaper The Sun. Chief of Air Staff, Air Mar­shal Adesola Amosu said that the air force had inflicted considerable damage to Boko Haram militants  in the north-east of the country.  

This does not seem in keeping with the recent information coming out of Nigeria. Despite advances in several areas, such as the recapture of the town of Mubi in Adawama State and the return of their Emir, Alhaji Abubakar Isa a few days ago, Boko Haram have continued their campaign of terror. Over the last 12 months, Boko Haram has killed 10,000 people, a comparable number to the Islamic State.

Sen. Ahmed Zanna, who represents Nigeria's violence-plagued Borno state told NBC News: "The violence has become so bad that people don't have lives anymore. They cannot go to their farms, they cannot go to their businesses. It dominates people's lives every single day. They have no help from the army, the people who are supposed to protect them. They are scared, and that fear is real."

Indeed, they are ramping up their assaults. Two female suicide bombers were arrested in Maiduguri, the capital of Borno State and a city that has seen a rash of attacks over the past few months.  One, arrested at the beginning of December, confessed to a Boko Haram plan that posted 50 female suicide bombers across Maiduguri ready to blow themselves up before the end of the year with the intention of killing 100,000 people.

Mia Bloom, of a Professor of the Center for Terrorism and Security Studies at the University of Massachusetts Lowell, told Vice news that the recent epidemic of female suicide bombings in Nigeria could have been carried out by the kidnapped schoolgirls of Chibok.


Speaking as to why the girls might be acting in this way, she said "either because of brain washing, or because Boko Haram has humiliated them sexually, like with rape, so that there's no option but to become a suicide bomber because of the honor code in place in traditional Nigerian societies" 

For more information about the Sunni Islamist group wreaking havoc across Nigeria, see Clarion Project's Factsheet: Boko Haram: Nigeria's Islamist Group.

RECENT ARTICLES

Live or retire in Nicaragua

I'm simply going to share some links, most that wish to live overseas are well aware of these info sites.


Live in Nicaragua
Live In Nicaragua


Numbeo


Currency Converter


CList


Google Translate


 Everyone has their own thing yet let me share, the beaches are the best I've been on around the world. I'm not a sand person.
 The food? How can it get any better, 95% of the time what you are eating was just killed or picked that morning. The seasonings available are a Miskito Indian, Caribbean and a Spanish blend.
 I'm a two star chef, nope, didn't finish yet the combinations that I was able to create... You'll simply love it. Be aware, when ordering from the buffet styled eateries, they cook food done done done. 
 All your American favorite foods are here as well. One more caution, sweetened products are about 5 times as sweet as what you're use to.
 The drinking water is fine, I tested it with a pool kit, simple. The closer you are to the mountains or ocean, the better it gets.
 Don't be a putz, leave all your bling at home. Stick to the well traveled paths at night. I travel alone yet I'd suggest a buddy system if feasible.
 I find it cheaper and more convenient to catch taxis, the driving here could be compared to Virginia Beach after a snow storm plus, I don't want to be responsible for anyone's crap.
Dating is easy, life is easy and no one's going to stress you about anything.


How to Detox Your Life of Negative People and Feel Good About It

negativity

“Keep away from people who try to belittle your ambitions. Small people always do that, but the really great make you feel that you, too, can become great.” – Mark Twain
First, let me state my definition of a toxic person- A person who complains and dumps their problems on you but doesn’t do anything to change their situation. Someone who is not supportive. Someone who makes you feel badly about yourself. Someone who shoots down your bright ideas, big goals, or bold (and risky) decisions. Toxic people are usually in a place in their life where they are not open to constructive feedback or changing, so they are stuck in their current situation and don’t have the insight to see beyond their own struggles.

Secondly, this article isn’t intended to paint toxic people in a negative light. This article is meant to guide you in making sure their negativity doesn’t impact your life.
First, why it’s important to detox your life of negative people:
  • Negative people slow you down towards achieving your goals. They discourage you from being ambitious or following your dreams by questioning what you’re doing and planting doubts into your head.
  • Negative energy from toxic people effect your energy level, not to mention your stress and anxiety.
  • You need to create space for positive change to happen. Being in toxic relationships with people and allowing their negative energy into your life will hold you back from manifesting opportunities for success. Also, releasing negative people creates space for positive people to enter, who will encourage, support, and help you grow as a person.
How to detox negative people from your life:
Step 1: Decide that you’re worth it
  • You need to feel as if you’re worthy of achieving your goals and changing into the person you want to be. Letting go of any negativity in your life will help you get there faster.
  • How to realize you’re worth it, you ask. Simply make the choice and decide that it’s time you committed to yourself, your goals, and your dreams and you won’t let anything or anyone slow you down.
  • Think about the negative side effects of holding onto these relationships. Ask yourself:
    • What effect are these relationships having on my life?
    • What are my goals and how badly do I want to achieve them? Are these people supporting my goals or slowing me down?

Step 2: Identify the toxic people
  • Toxic people make you feel worse than when you started talking to them. They bring your energy level down. They leave you feeling bummed out. Notice how your body feels after talking to them, particularly your chest and stomach which are areas where most of us carry stress and anxiety.
  • There is a difference between someone sharing with you their struggles/challenges versus someone who constantly complains.
  • Toxic people shoot down your ideas. They always question what you’re doing. They may say something like, “Well, maybe you shouldn’t change careers because you have so much job security here. What about your benefits? Or your retirement?” This is pretty common and sometimes subtle and harder to notice. Even though it may sound like they’re giving you advice, in the end they’re just putting more doubts into your head because your actions may bring up their own fears and insecurity.
  • Toxic people can fall within the spectrum of being subtly draining to all around toxic and poisonous. Even if they fall on the less severe end of the spectrum, it’s important to identify this and work towards letting them go as they will still affect you negatively.
Image result for bye pics
Step 3: Let them go
  • Just start. Use whatever method you think is appropriate. Avoid them. Don’t pick up their calls. Apologize for being distant but know that you do not need to explain why or defend your actions.
  • Avoid explanation because they are probably in a state of mind where they are not open to listening. They may take it personally that you are letting them go, and will probably get on the defensive if you try to justify your reasons.
  • Do it gracefully and with love. Send them off with love and a prayer. Be open to the possibility that if and when they are ready to change and be more positive/supportive, then you would be open to rekindling the relationship.
Image result for happy dance pic
Step 4: Don’t feel guilty
  • Again, you are worth it. You must be your own BEST FRIEND. If you don’t take charge of your life and well-being, nobody will do it for you!
  • You are not abandoning them even though you may feel like that. There is a distinction between abandoning someone and letting them go so they can find their own way. If you’ve already tried giving them advice, encouragement, or even a wake-up call and nothing happened, then no amount of wise words from you will change their thinking or behavior.
  • It’s not your obligation to keep these people in your life regardless of the relationship. Whatever the reason, people grow and change and it’s normal for relationships to evolve, or dissolve.
Step 5: Bring in the positivity!
Surround yourself with positive people. These are people who:
  • Support your ambitions
  • Encourage your ideas no matter how scary, risky, or seemingly unknown the outcome could be because they know how important it is for you.
  • Are up to big things. They are people you admire because you think they kick ass in life!
You are worth it and you can do this. It begins with an intention to change your life and a commitment to yourself.
This week’s tush-kickin’ challenge: Start identifying the negative relationships that you want to let go of and share with me below!
Chinh Pham is fear conqueror, life coach, Hot Hula Fitness instructor, wellness guru, and lover of life! She helps women in their 20’s and 30’s find their purpose, embrace what they’re passionate about, and find the courage to create the life of their dreams! Her vision includes helping each and every woman on this planet look and feel beautiful, inspired, and empowered enough to create a kick-ass life for herself!
To learn more about Chinh, check out her virtual homeFacebook, and sign up for FREE updates here!
 Read more at > http://tinyurl.com/8nmjzah

Featured Posts

Rental Properties for Sale, Santa Marianita, Ecuador

  Beautiful rental with beach access. Utilities and WiFi are included, just bring your food and move in. *Be sure to ask about our long-term...

Popular Posts