You can use the custom tagging feature within UNUM Insight Analytics Flow as a powerful tool to monitor application performance, Security and Resource utilization.

The following example scenarios are just some of the ways the custom tagging feature is used to plan, monitor and secure your network environment.

Application Performance Monitoring and Troubleshooting

In this example, you want to correlate, over time, application performance with transport layer performance. By custom tagging (labeling) the application servers as “Database”, “Mailer” and, “Directory”, you, as an Administrator, can easily isolate and analyze the traffic related to a specific service.

By custom tagging the iSCSI targets, you, can quickly determine how many concurrent client connections are directed to an iSCSI target. You can verify the effectiveness of the connection-based load balancer across a set of servers tagged as “LDAP_Servers” by custom tagging the servers as part of “LDAP_set_1”.


You can identify unauthorized access to a server by custom tagging the clients as part of a white list/black list. Identify unauthorized communications such as peer-to-peer file sharing between clients by tagging the devices used as client/desktops and looking for devices acting as a TCP server within the group.

Resource Utilization Monitor and Planning

By tagging all the compute resources assigned to the project team, you can track the network activity of a specific project team to plan for a services and network upgrade. This result may be achieved even if the resources are spread across multiple VLANs and IP subnets.

Monitor the level of engagement of clients and servers into a company-wide business initiative is achievd by tagging all servers that are used to support the initiative.

By tagging the related clients and servers you can collect usage data for chargeback to an organizational unit distributed in multiple buildings and branches.

Visibility and Troubleshooting a Converged Infrastructure

Tag the individual nodes and server blocks within a cluster and analyze the degree of infrastructure availability in relation to the network and racks topology.

Tag hypervisor connections involved in virtual machine mobility and identify the network traffic associated with VM mobility to verify that it remains within a healthy level.

Tag VMs with special functions to correlate application performance after the loss of a redundant component, such as a controller in a converged infrastructure.