<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=1110556&amp;fmt=gif">
Skip to content
    September 8, 2021

    Painting a Complete Network Monitoring Picture: Why Context is Critical

    In order to produce their masterpieces, artists like van Gough, Rembrandt, Picasso, and Monet painted with more than just one color. Being able to choose from multiple colors (not to mention an abundance of talent, inspiration, and creativity) is what allowed these artists to see their complete vision come to life on canvas.

    However, if you’re relying on a single set of data to troubleshoot network issues, it’s like you’re stuck painting with one color. You just won’t be able to see the complete picture.

    Teams should always have the ability to paint with a full range of colors. For network operations triage, this means harnessing intelligence from alarms, faults, network flows, performance data, network configurations, and logs. All relevant network data must be collected, correlated, and analyzed. This complete visibility is vital if teams are to make fast, intelligent decisions.

    Additionally, metrics collected by advanced network monitoring, such as physical network performance correlated with software-defined control plane performance, enables operations teams to frame their completed picture and hang it on the wall with confidence, knowing they had everything they needed to create a masterpiece.

    DX NetOps network monitoring software provides this complete picture to network operations teams. With the solution, teams can troubleshoot quickly and easily, within the context of a specific network device, interface, or virtual network function—all with one click from the initial alarm.

    This is very unique in the industry. Our DX NetOps network monitoring context pages enable you to see different network data formats and different data streams, all within the context of the specific network element you are troubleshooting. By seeing all the metrics collected that relate to a specific network device, you can make an intelligent decision about the root cause of any performance issue.

    What “colors” does Broadcom provide you to paint a complete network monitoring picture?

    • Alarm data, offering instant notifications into problems on the network, with troubleshooting tools at your fingertips.
    • Configuration data, delivering insights into the current configuration of a device, as well as whether anything has changed, and whether the timing of any changes coincides with an alarm or performance change.
    • Log data, providing granular visibility into what is happening over time.
    • Performance data, revealing insights on current and future network utilization, congestion, packet loss, and capacity planning.
    • Fault data, enabling teams to do network event correlation, root cause analysis, service modeling, topology inspection, and relationship investigation.
    • Flow data, offering visibility into network traffic identification, behavior, utilization, and anomalies, as well as the impact on application performance.

    The best part about this is that we do all the hard lifting for you. We have figured out how to analyze disparate information and organize it into a unified inventory for you. As a result, you can have confidence that you have everything you need to know about a device—in one click.

    Just having network performance data is not enough. Just collecting network fault data is not enough. Our network monitoring software efficiently delivers a complete picture, one based on all disparate data sources. With this complete picture, you can triage faster and reconcile with confidence.

    Here’s a real word example: Suddenly there is a significant change in network utilization. If a network team is only collecting performance data, they won’t be able to efficiently ascertain where the issue is originating. Maybe it is more application traffic, but you would need network flow data to find out. Maybe there was a change in a network configuration and now an interface is dropping packets, but you’d need configuration data to determine that. Maybe a device was hacked, but with no visibility into log data, you wouldn’t know for sure.

    Having all the relevant data at your fingertips produces reliable and efficient troubleshooting scenarios like the following. Users complain about slow application performance. You are able to see network fault data from a border gateway protocol (BGP) that is rerouting events, which reveals that traffic isn’t moving over the intended path. You also have access to performance data, where you see interface errors and packet discards on that same device. Finally, the syslog data collected reveals transceiver errors on a small form-factor pluggable (SFP) optical connector on that exact device.

    Without a complete network monitoring picture composed of all these collected metrics and data, you could be troubleshooting with your internet provider about a suspected but non-existent BGP configuration change. But with collected network configuration data, you would have already determined that there were no configuration changes on that device and immediately moved on to the next area of investigation.

    Broadcom is proud to uniquely enable our customers to paint their network monitoring masterpiece with a full range of colors based on data from alarms, faults, flows, performance, configuration, and logs—so they can make intelligent network triage decisions and reconcile with confidence.

    John Murdough

    John began his career in network operations in 1995. He’s been working with Spectrum for 14 years, helping with the implementation of capabilities like SPM and Service Manager. For the past several years, he has been the R&D lead for network operations, helping lead the team that designed and implemented CA...

    Other resources you might be interested in

    icon
    Blog November 19, 2025

    Is Your Network Modernization Frozen by Fear?

    See how the “if it ain’t broke, don’t fix it” mindset delays many network modernization projects. Employ network observability and migrate with confidence.

    icon
    Blog November 13, 2025

    The Seven Wastes of Network Operations

    Discover the seven common areas of waste in network operations, and see how network observability helps you systematically eliminate this waste.

    icon
    Blog November 13, 2025

    Your NOC's Most Important New Skill? Ignoring Things

    See why collecting more data has backfired, creating alert fatigue and burying critical problems in noise. Harness observability to focus on what’s relevant.

    icon
    Office Hours November 13, 2025

    Rally Office Hours: November 13, 2025

    This session featured a product announcement of the new Rally AI chatbot, a Q&A about defect count roll-ups and the ability to impersonate a user, and a segment on upcoming events.

    icon
    Course November 6, 2025

    AppNeta: Create Monitoring Policies for Active Monitoring

    Learn how to create and configure monitoring policies in AppNeta in order to set up active network and web application monitoring.

    icon
    Office Hours November 6, 2025

    Rally Office Hours: November 6, 2025

    Track AI usage with custom views, perform advanced API reporting, find inactive teams, and the understand the power of the Rally Excel Add-on.

    icon
    Course November 5, 2025

    AAI - Using Dashboards for Workload Monitoring

    Learn how to use dashboards in AAI to monitor workload performance and track SLA health. Discover how to add widgets, configure layouts, and organize dashboards into tabs that match your monitoring...

    icon
    Course November 3, 2025

    Getting Started with Automic SaaS Administration for New Customers

    This course equips Automic SaaS administrators with clear, step-by-step instructions to master the crucial onboarding phases and enable their instance.

    icon
    Blog October 30, 2025

    This Halloween, the Scariest Monsters Are in Your Network

    See how network observability can help you identify and tame the zombies, vampires, and werewolves lurking in your network infrastructure.