Infrastructure monitoring | Telemetry collection | NXLog Platform
Network performance monitoring: metrics vs syslog logs vs traps
Every application depends on the network, yet networks are often the hardest part of the stack to diagnose when something goes wrong. Devices are up, utilization looks normal, and yet users report slowness or disconnections with no obvious cause in sight.
The instinct is to rely on metrics alone: poll devices at regular intervals, watch the dashboards, set thresholds. That approach catches obvious outages, but it struggles with the harder questions: Why did latency spike when nothing looked congested?
Infrastructure monitoring | Observability | Telemetry pipeline management
The shadow IT haunting your network: A Halloween horror story
It’s Halloween season, and while everyone else is worried about ghosts and goblins, you—the sysadmin holding the fort—know the real terror: that dusty print server in the corner that’s been running firmware from 2014. Or the Raspberry Pi someone set up to monitor the server room temperature "temporarily" three years ago. Or the CEO’s personal tablet that absolutely must connect to the internal network because "it’s just easier this way.
Infrastructure monitoring | Observability | Telemetry pipeline management
Watching the watchers: The need for telemetry system observability
Organizations invest heavily in sophisticated monitoring platforms, deploy countless agents across their infrastructure, and build elaborate dashboards to track every metric imaginable. Yet amid this pursuit of comprehensive visibility, a dangerous blind spot often emerges: the observability system itself becomes unobservable.
This meta-problem represents one of the most insidious risks in modern infrastructure management. When telemetry collection fails silently—whether due to misconfiguration, infrastructure changes, or system failures—operations teams continue making critical decisions based on incomplete or stale data, unaware that their digital nervous system has developed gaps in coverage.
Infrastructure monitoring | Observability | Telemetry pipeline management
Beyond the silicon: Why monitoring the infrastructure powering AI is critical to ROI
The AI gold rush has arrived, and organizations worldwide are making unprecedented investments in cutting-edge accelerator hardware. GPU clusters worth millions of dollars are being deployed at breakneck speed, with companies betting their competitive futures on these silicon powerhouses. Yet beneath the excitement of acquiring the latest H100s or MI300s lies a sobering reality: the most expensive part of your AI investment isn’t the initial purchase—it’s ensuring that hardware delivers value every single moment it’s operational.
Infrastructure monitoring | Telemetry auditing
BROP attacks - What is it and how to defend yourself?
Have you ever locked yourself out of your car? After calling for roadside service, your tow truck driver forces the internal locking mechanism open with a slim-jim. Car thieves quickly discovered this technique and began using it to steal cars. Digital thieves have devised a similar attack called a Blind Return-Oriented Programming (Blind ROP, or just BROP) attack. It’s as quiet as a jackhammer on cement, but an attacker can open a remote shell and gain remote code execution on your server if the conditions are right.
Critical infrastructure | Infrastructure monitoring
The EU's response to cyberwarfare
With open war in Europe for the first time since 1945, nations across the continent have been busy shoring up their information security defenses. The European Union is stepping up to the plate, releasing a Cyber Defence Policy to, in its words, "boost EU cyber defence capabilities and strengthen coordination and cooperation between the military and civilian cyber communities."
However, bolstering cyber defenses across a collection of countries, home to 450 million people and spanning four million square kilometers, is no easy feat.