Insight Analytics Flow Custom Tags Use Case Scenarios


There are features and functions used in UNUM Manager and UNUM Analytics that are common throughout the user interface (UI). Please refer to the Common Functions section for more information on the use of these functions and features.


You use the custom tagging feature within UNUM Insight Analytics Flow as a powerful tool to monitor application performance, Security and Resource utilization. 


The following example scenarios are just some of the ways the custom tagging feature is used to plan, monitor and secure your network environment.


Application Performance Monitoring and Troubleshooting


In this example, you want to correlate, over time, application performance with transport layer performance. By custom tagging (labeling) the application servers as “Database”, “Mailer” and, “Directory”, you, as an Administrator, can easily isolate and analyze the traffic related to a specific service. 


By custom tagging the iSCSI targets, you, can quickly determine how many concurrent client connections are directed to an iSCSI target. You verify the effectiveness of the connection-based load balancer across a set of servers tagged as “LDAP_Servers” by custom tagging the servers as part of “LDAP_set_1”.


Security


You identify unauthorized access to a server by custom tagging the clients as part of an Allowlist/Blocklist. Identify unauthorized communications such as peer-to-peer file sharing between clients by tagging the devices used as client/desktops and looking for devices acting as a TCP server within the group.


Resource Utilization Monitor and Planning


By tagging all the compute resources assigned to the project team, you track the network activity of a specific project team to plan for a services and network upgrade. This result may be achieved even if the resources are spread across multiple VLANs and IP subnets.


Monitor the level of engagement of clients and servers into a company-wide business initiative is achieved by tagging all servers that are used to support the initiative. 


By tagging the related clients and servers you collect usage data for charge-back to an organizational unit distributed in multiple buildings and branches. 


Visibility and Troubleshooting a Converged Infrastructure 


Tag the individual nodes and server blocks within a cluster and analyze the degree of infrastructure availability in relation to the network and racks topology.


Tag hypervisor connections involved in virtual machine mobility and identify the network traffic associated with VM mobility to verify that it remains within a healthy level.


Tag VMs with special functions to correlate application performance after the loss of a redundant component, such as a controller in a converged infrastructure. 

north
    keyboard_arrow_up
    keyboard_arrow_down
    description
    print
    feedback
    support
    business
    rss_feed
    south