Lindsay Hill network control, visibility, management

NMS Primer 3: Choosing an NMS

This article is Part 3 in a 7-Part Series.

(Read more...)

NMS Primer 2: How Do They Work?

This article is Part 2 in a 7-Part Series.

(Read more...)

NMS Primer 1: What is an NMS?

This article is Part 1 in a 7-Part Series.

(Read more...)

HP Communities - Enabling Full Post Content Email

The HP Communities forums offer email subscriptions for threads you’ve participated in, or all posts for a specific message board. By default these emails only contain the subject of the post, along with a lot of other text you don’t care about. Here’s how to make those emails useful, by including the post content:

(Read more...)

Accounting Models and Cloud Service

Everyone talks about how moving to Cloud-based services can reduce CapEx, and that you only “pay for what you need.” People seem to assume this is a Good Thing, and to my mind, it probably is. But many businesses are obsessed with reducing OpEx, not CapEx. In fact, they will use all manner of tricks to move expenditure to the CapEx bucket. Why is that, and what might it mean for “Pay as you go” models?

(Read more...)

HP IMC: Troubleshooting Device Backup Problems

HP IMC is great at backing up your switch configurations, but it can be very frustrating when it doesn’t work. Here’s a list of steps I go through when debugging device backups:

(Read more...)

OpenFlow implications for network monitoring

I’ve been reading more about OpenFlow recently, and something that was pointed out to me was that OpenFlow offers features that could give us deeper insights into our traffic flows, without necessarily modifying them. Whilst not being a full replacement for NetFlow/sFlow, it would be far better than just guessing at what an application is doing. I’m pretty excited about the possibilities.

(Read more...)

Should I Monitor My Service Provider?

How much monitoring should I do for services that I’ve outsourced? This question comes up frequently with my clients. They’ve paid someone else to manage a service for them, and they’re wondering if they should just leave all monitoring to the service provider. They’re paying for it, so why have a dog and bark yourself? This applies to all sorts of outsourcing agreements - it might be for a simple SaaS-based service, or it might be a complex network environment that you designed and built, and then handed over to a third party to manage.

(Read more...)

Service Timestamps - make your log timestamps readable

The default logging style for Cisco IOS-based devices is to insert the system uptime in the log entry. This makes it basically useless. Here’s some typical log output:

(Read more...)

Help Me Do Business With You

A good customer of mine needs to replace their Service Desk system. Having a fair idea of their requirements, I asked them if they had looked at $(insert very well-known player here).

(Read more...)