Remove tags bgp-routing
article thumbnail

Visualizing Traffic Exit Points in Complex Networks

Kentik

It’s that “exit point” question in particular that led Kentik to build our BGP Ultimate Exit feature set (UE for short). In a nutshell, UE enriches all the flow data Kentik receives with tags that indicate the PoP, router, interface, etc. Kentik’s ingest layer maintains a full BGP table from each router.

Network 49
article thumbnail

Learning From Your BGP Tables

Kentik

Kentik’s Advanced Analytics Turns Routes into Insights. When it comes to routing traffic on the global Internet, BGP is the one and only protocol. That’s why network engineers have long used the BGP routing table on routers or looking glasses to get an idea of how their Internet traffic is routed.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unlocking the Power of Embedded CDNs: A Comprehensive Guide to Deployment Scenarios and Optimal Use Cases

Kentik

Getting end users to the closest cache using BGP Open Connect from Netflix stands out from most of the other players in this matter. They heavily rely on BGP (Border Gateway Protocol, the protocol that networks use to exchange routes) to define which cache an end user is directed to.

article thumbnail

Podcast with Kentik CEO Avi Freedman & Jim Metzler

Kentik

Performance data is correlated with NetFlow, BGP, and GeoIP data into a unified time series database in Kentik Detect, where it’s available in real time for monitoring, alerting, and silo-free analytics. We have customers that are automatically routing around Internet bottlenecks.

article thumbnail

Detecting Hidden Spambots

Kentik

That’s important because threat vectors are constantly evolving, so today’s network operations tools must excel at revealing anomalies as they occur and also at drilling down on unsummarized network data — flow records, BGP, SNMP — to uncover root causes. This condition makes use of Kentik’s user-defined tags functionality.

Windows 40
article thumbnail

End-User Monitoring in Production

LaunchDarkly

Think BGP route leaks in the internet, poorly performing internet service providers, all these things that you’re trying to work with. Those was the offset that synthetic probes are seeing from what the kind route time is time.apple.com. Is it some sort of third party that’s causing issues for our customers?