SlideShare a Scribd company logo
1 of 26
Download to read offline
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 1
SIG-NOC Tools Survey
What software tools R&E Network Operations Centres use
June 2016
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 2
Table of Contents
1. Introduction ....................................................................................................................................3
2. Survey Participants .........................................................................................................................3
3. NOC Functions.................................................................................................................................4
4. NOC Tools........................................................................................................................................6
4.1. Monitoring ..............................................................................................................................6
4.2. Problem Management............................................................................................................8
4.3. Ticketing..................................................................................................................................9
4.4. Performance Management...................................................................................................10
4.5. Reporting and Statistics ........................................................................................................11
4.6. Configuration Management and Backup..............................................................................12
4.7. Communication, Coordination and Chat ..............................................................................13
4.8. Knowledge Management and Documentation.....................................................................14
4.9. Change Management............................................................................................................15
4.10. Out-of-band Access Management ....................................................................................16
4.11. Security Management.......................................................................................................17
4.12. Inventory Management ....................................................................................................18
4.13. DDoS Mitigation................................................................................................................19
4.14. Resources Management ...................................................................................................20
4.15. Data Aggregation, Representation and Visualisation.......................................................21
5. Standards and trainings ................................................................................................................22
6. Conclusions ...................................................................................................................................25
7. Acknowledgement ........................................................................................................................25
8. References ....................................................................................................................................25
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 3
1. Introduction
The Special Interest Group – Network Operations Centres (SIG-NOC) is a community effort [1]
initiated by the National Research and Education Network organisations (NRENs) gathered under the
GÉANT association in Europe. SIG-NOC creates an open forum where experts from the GÉANT
Community and beyond exchange information, knowledge, ideas and best practices about specific
technical or other areas of business relevant to the research and education networking community.
SIG-NOC is the successor of the former TERENA Task Force on NOCs (TF-NOC).
TF-NOC completed and published its first ‘NOC Survey’ by December 2011 [2]. That survey had a
wider scope covering the NOCs’ taxonomy, structures, resources, tools and other aspects. Towards
the end of 2015, SIG-NOC decided to repeat only the NOC tools related part, because it was realised
that the tools and techniques used by the NOCs had progressed a lot since the last survey.
In the second ‘NOC Tools Survey’ covered in this report, information about the software tools that
NOCs use to operate networks and services was collected between December 2015 and February
2016. One section was dedicated to the adoption of standards and industry best practices as well as
training activities.
Since the survey was mainly focusing on tools and operation practices it was recommended to be
filled out by someone who has an overview of the whole NOC’s operations.
The results of the survey are summarised in this report. The anonymised survey data is also available
on the SIG-NOC home page [1] in MS Excel format (i.e. raw data and zoomable graphs) for further
analysis.
2. Survey Participants
We received 78 individual responses to the survey of which 64 were valid and fully or partly
complete. It represents a much better turn out compared to the first survey in 2011, where we were
able to analyse only 43 responses.
Chart 1 shows the type and range of networks that participated in the survey. We got more coverage
in each category. This is partly due to the fact that the SIG-NOC group has been growing and able to
reach out to more operators, but it could also be caused by the fact that the same NOCs are covering
more and more networks, services and functionalities. The numbers of national research and
education networks, campus networks, and Internet Exchanges clearly stand out, compared to the
results in 2011.
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 4
Chart 1. Type (range) of networks answering the survey
In 2016, the other category included datacentre, cross-border fibre and e-government network
operators as special types.
3. NOC Functions
The survey covered 15 functions that the NOCs may be responsible for. Table 1 lists all the functions
in the order of their importance as rated by the respondents. In comparison to 2011, the relevance
of problem management, performance management, configuration management, change
management and DDoS mitigations have grown significantly. The importance of monitoring stayed
constantly high, while resources management is often covered outside of the NOCs.
December 2011 February 2016 Trend
Monitoring Monitoring 0
Ticketing Problem Management +5
Reporting and Statistics Ticketing -1
Communication, Coordination and Chat Performance Management +4
Knowledge Management and Documentation Reporting and Statistics -2
Out-of-band Access Management Configuration Management and Backup +3
Problem Management Communication, Coordination and Chat -3
Performance Management Knowledge Management and Documentation -3
Configuration Management and Backup Change Management +3
Inventory Management Out-of-band Access Management -4
0
5
10
15
20
25
30
35
40
45
National
research and
education
network
(NREN)
Regional,
metropolitan
network
Wide area
network,
among
several
countries
Specific
research
network (any
range)
Campus,
university
network
Commercial
network, ISP
(any range)
Internet
Exchange
operator
(any size)
Other (please
specify)
41
18
13 13
24
4
10
3
25
15
11
8
6
3 2 1
Type (range) of the network that your organization is responsible for
February 2016
December 2011
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 5
Security Management Security Management 0
Change Management Inventory Management -2
Data Aggregation, Representation, Visualization DDoS Mitigation +2
Resources Management Resources Management 0
DDoS Mitigation Data Aggregation, Representation, Visualisation -2
Table 1. Comparison of NOC functions
The 2015 data is also depicted in Chart 2. The functions in the first 9 columns (from monitoring to
change management) are covered by more than 60% of the NOCs that responded to the survey.
Chart 2. NOCs responsible for the particular functions
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
Responsibilities and functions of the NOC
Yes No Skipped
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 6
4. NOC Tools
In this chapter, the various software tools used to fulfil the particular functions are shown rated by
their importance and quality: horizontally the importance, vertically the ratings are depicted. The
larger the circle the more the answers that we got regarding the particular tool. The smaller circles
represent some tools that may be below or above average, but bear in mind that this is based on the
opinion of a smaller set of respondents only. We suggest to take into account the bigger circles or
the ones with the same/similar relative sizes in any comparison.
4.1. Monitoring
Chart 3. Software tools used for monitoring
SYSLOG is the preferred way to gather the information from the equipment, closely followed by
SNMP and NETFLOW. The best rated tools are the same as in 2011: CACTI and NAGIOS. ZINO has got
a high rating but its importance is less and it is not used by that many NOCs. For instance,
PERFSONAR and RIPE Atlas are in the same size and importance, and the quality of the later is rated
higher by the NOCs.
Table 2 below lists some of the other tools and in-house developed solutions not included in the
survey.
SYSLOG
SNMP
NETFLOW
CACTI
NAGIOS
LOOKING-GLASSRIPE Atlas / Stats
WEATHERMAP
MRTG
LOGGING
NFSEN
RANCID
SMOKEPING
PERFSONAR
ICINGA
NFDUMP
RIPE RIS / BGPlayOBSERVIUM
OPENVIEW
CRICKET
SPECTRUM
ZENOSS
ZINO
INTERMAPPER
1
1.5
2
2.5
3
3.5
4
4.5
5
1 1.5 2 2.5 3 3.5 4 4.5
Rating
Importance
Monitoring
SYSLOG
SNMP
NETFLOW
CACTI
NAGIOS
LOOKING-GLASS
RIPE Atlas / Stats
WEATHERMAP
MRTG
LOGGING
NFSEN
RANCID
SMOKEPING
PERFSONAR
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 7
Other tools: • Zabbix (4)
• Munin (3)
• CheckMK (2)
• AS-Stats
• LibreNMS
• CENTREON
• Swatch
• Ciena OneControl
• IBM Tivoli
• NAV
• Netdisco
• Net-minder
• Speedtest
• Puppet
• Racktables
• Patchmanager
• Splunk
• Network Polygraph
• NMS from DWDM vendors
In-house
developed
solutions:
• GINS (GARR Integrated Networking Suite)
• minemon (ICMP and BGP session checks, perl-based)
• NAV developed by UNINETT
• Rancid frontend
• MRTG front-end, Netflow analyser
• Service availability overview: RRDtool
• FTAS, G3 by CESNET
• SMARTxAC
• Turbo Krt
• ViaIpe: a distributed cacti+smokeping on a georeferenced interface by RNP
Table 2. Other tools and in-house developed solutions for monitoring
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 8
4.2. Problem Management
Chart 4. Software tools used for problem management
NAGIOS, REQUEST TRACKER and ELK Stack are rated the highest with relatively high importance
although ELK Stack is not used by that many NOCs. There are a few good tools that are useful for
problem management but less important, such as RIPE Atlas and RIPE RIS/BGplay.
Other tools: • JIRA (3)
• Kibana
• HP Openview
• SpiceWorks
• Observium
• Munin
In-house developed
solutions:
• TTS
• Syslog-analyzer, alarm features on CheckMK and MRTG
• GN6, based on Ofbiz
• RT integration with Zenoss and Customer - link database
Table 3. Other tools and in-house developed solutions for problem management
NAGIOS
REQUEST TRACKER
RIPE Atlas / Stats
OTRS
RIPE RIS / BGplay
SPLUNKNLNOG RING
ZABBIX
ELK stack
ZINO
1
1.5
2
2.5
3
3.5
4
4.5
5
1 1.5 2 2.5 3 3.5 4 4.5
Rating
Importance
Problem Management
NAGIOS
REQUEST TRACKER
RIPE Atlas / Stats
OTRS
RIPE RIS / BGplay
SPLUNK
NLNOG RING
ZABBIX
ELK stack
ZINO
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 9
4.3. Ticketing
Chart 5. Software tools used for ticketing
REQEST TRACKER, OTRS and JIRA are in this exact order in terms of importance, quality and use.
SERVICE NOW is rated highly, but only in a small sample and it’s not primarily for ticketing.
Other tools: • MANTIS Bug Tracker
• TRAC
• HP Openview Service Desk
• VC4 IMS
• Clocking
• SpiceWorks
• GLPI
In-house developed
solutions:
• TTS (2)
• GN6, based on OfBiz
• ticketing for drupal
Table 4. Other tools and in-house developed solutions for ticketing
REQUEST TRACKER
OTRSJIRA
ARS (Remedy)
SERVICE NOW
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Ticketing
REQUEST TRACKER
OTRS
JIRA
ARS (Remedy)
SERVICE NOW
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 10
4.4. Performance Management
Chart 6. Software tools used for performance management
IPERF, WIRESHARK, MRTG and SMOKEPING are the most important tools. ZINO has got a high rating
but only on a small sample.
Other tools: • Mgen (2)
• RRD
• Spirent appliances
• Speedtest
• NAV
In-house developed
solutions:
• BWM, Live BWM by CARnet
• Threshold alarming in MRTG and CheckMK
Table 5. Other tools and in-house developed solutions for performance management
IPERF
WIRESHARK
MRTG
PERFSONAR SMOKEPING
RIPE Atlas
NDT
BWCTL
NLNOG RING tools
HADES
ZINO
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Performance Management
IPERF
WIRESHARK
MRTG
PERFSONAR
SMOKEPING
RIPE Atlas
NDT
BWCTL
NLNOG RING tools
HADES
ZINO
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 11
4.5. Reporting and Statistics
Chart 7. Software tools used for reporting and statistics
CACTI, NAGIOS and MRTG stand out, but most of the tools are very close to each other in terms of
importance and quality.
Other tools: • RequestTracker (2)
• Zabbix (2)
• Kibana
• LibreNMS
• Torrus
• RRDtool
• infovista
• sanet
• Grafana is included in NAV, NFDump and manual analysis
In-house developed
solutions:
• GINS
• SNMP stats export, Netflow stats
• Pinger tool with added extensions, Nagios extensions
Table 6. Other tools and in-house developed solutions for reporting and statistics
CACTI
MRTG
NAGIOS
NFSENGRAFANAMUNIN
ARBOR
SPLUNK
ZENOSS
ZINO
CA SPECTRUM
TABLEAU
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Reporting and Statistics
CACTI
MRTG
NAGIOS
NFSEN
GRAFANA
MUNIN
ARBOR
SPLUNK
ZENOSS
ZINO
CA SPECTRUM
TABLEAU
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 12
4.6. Configuration Management and Backup
Chart 8. Software tools used for configuration management and backup
Git, RANCID, SUBVERSION and CVS are the popular tools, the others were not rated as important.
Other tools: • RCS (4)
• CA Spectrum and FTP server
• Puppet
• Backuppc
• etckeeper
• Racktables
• Patchmanager
• Ciena NMS
• SCCS
• veeam
• imc
In-house developed
solutions:
• Rancid-like tools
• GN6, based on OfBiz
Table 7. Other tools and in-house developed solutions for configuration management and backup
RANCID
Git
SUBVERSION
CVS
IMS
OXIDIZED
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
0.00 0.50 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Configuration Management and Backup
RANCID
Git
SUBVERSION
CVS
IMS
OXIDIZED
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 13
4.7. Communication, Coordination and Chat
Chart 9. Software tools used for communication, coordination and chat
Interestingly traditional communication and new social tools are considered almost equally good.
However, e-mail, mailing lists and mobile phone are still the most important tools.
Other tools: • Asterisk
• Kamailio
• CalDav
• ServiceInfo (webbased sender for mailing lists)
• SharePoint
In-house developed
solutions:
• N/A
Table 8. Other tools and in-house developed solutions for communication, coordination and chat
E-mail
MAILING LISTS
WIKI
SKYPE
MobileJABBER
IM
TWITTER
Landline
WHATSAPP IRC
SLACK
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Communication, Coordination and Chat
E-mail
MAILING LISTS
WIKI
SKYPE
Mobile
JABBER
IM
TWITTER
Landline
WHATSAPP
IRC
SLACK
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 14
4.8. Knowledge Management and Documentation
Chart 10. Software tools used for knowledge management and documentation
Wiki platforms are considered the best for many users. Confluence has go the highest rating with
slightly less users. Different cloud storage solutions are used by many NOCs, but their importance is
relatively low.
Other tools: • MoinMoin Wiki
• TRACwiki
• TiddlyWiki
• FosWiki
• Drupal CMS
• File server
• Subversion
• Plone
• ownCloud
• SURFdrive
• OneDrive
In-house developed
solutions:
• Home-grown inventory / CMDB system (KIND)
• Database (GIS)
• Comunitats, based on Plone
Table 9. Other tools and in-house developed solutions for knowledge management and
documentation
WIKI
Cloud storage*REQUEST TRACKER
MEDIAWIKI
CONFLUENCE
DOCUWIKI
SHAREPOINTOTRS
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Knowledge Management and Documentation
WIKI
Cloud storage*
REQUEST TRACKER
MEDIAWIKI
CONFLUENCE
DOCUWIKI
SHAREPOINT
OTRS
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 15
4.9. Change Management
Chart 11. Software tools used for change management
REQUEST TRACKER is the most important and highly used tool for change management followed by
JIRA and OTRS.
Other tools: • Redmine
• gitlab
• Racktables
• Patchmanager
• HP Openview Service Desk
In-house developed
solutions:
• pymetric
• Wiki
• GN6, based on OfBiz
• In house Change Request generator
• ticketing for drupal
Table 10. Other tools and in-house developed solutions for change management
REQUEST TRACKER
OTRS
JIRA
CONFLUENCE
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Change Management
REQUEST TRACKER
OTRS
JIRA
CONFLUENCE
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 16
4.10. Out-of-band Access Management
Chart 12. Software tools used for out-of-band access management
CONSOLE SERVER is felt to be the most highly rated and important solution.
Other tools: • ISDN (2)
• DWDM OSC
• we currently use POTS for access, but want to move away from that
In-house developed
solutions:
• N/A
Table 11. Other tools and in-house developed solutions for out-of-band access
CONSOLE SERVER
ADSL
DRAC
HP ILO
LandlineKVM (not the
hypervisor)Mobile tech
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Out-of-band Access Management
CONSOLE SERVER
ADSL
DRAC
HP ILO
Landline
KVM (not the hypervisor)
Mobile tech
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 17
4.11. Security Management
Chart 13. Software tools used for security management
Firewalls and ACLs are used by almost all the institutions who answered this question. BGPmon is
highly rated, but not used by so many NOCs.
Other tools: • FirewallBuilder (2)
• RTIR
• Netflow analyzer
In-house developed
solutions:
• N/A
Table 12. Other tools and in-house developed solutions for security management
FIREWALL ACL
FREERADIUS
REQUEST TRACKER
TACACS+
BGMON
RADIATOR
KERBEROS
RSA Software
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Security Management
FIREWALL
ACL
FREERADIUS
REQUEST TRACKER
TACACS+
BGMON
RADIATOR
KERBEROS
RSA Software
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 18
4.12. Inventory Management
Chart 14. Software tools used for inventory management
Almost all the listed tools are in the same quality and importance range however not primarily
designed for proper inventory management. Better tools are listed in Table 13.
Other tools: • RackTables (2)
• IIR (2)
• Patchmanager
• HP Openview Service Desk
• HP Openview NNM
• Ciena NMS
• filemaker
• netdisco
• Observium
In-house developed
solutions:
• KIND (home-grown inventory/
CMDB)
• In-house developed tool based on
SNMP, RANCID, Apache & MySQL
• CMT
• GarrDB
• MySQL + Perl + lots of text
• GIS Database
• inventory PHP based
• GN6, based on OfBiz
• home-grown database-
application
• Asset Database
• Grejp
• own database tool
Table 13. Other tools and in-house developed solutions for inventory management
EXCELRANCID
WIKI
IMS1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Inventory Management
EXCEL
RANCID
WIKI
IMS
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 19
4.13. DDoS Mitigation
Chart 15. Software tools used for DDoS mitigation
FLOWSPEC, ARBOR and Firewall on Demand are highly rated tools in general, but most of the NOCs
use Blackholing and ACLs.
Other tools: • Fastnetmon
In-house developed
solutions:
• DDoS detection and traffic washers
Table 14. Other tools and in-house developed solutions for DDoS mitigations
ACL
Blackholing
RATE-LIMITING
Firewall on Demand
FLOWSPEC
ARBOR
Traffic-washing
AKAMAI Solutions
UTRS
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
DDoD Mitigation
ACL
Blackholing
RATE-LIMITING
Firewall on Demand
FLOWSPEC
ARBOR
Traffic-washing
AKAMAI Solutions
UTRS
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 20
4.14. Resources Management
Chart 16. Software tools used for resources management
VISO, Wiki and Excel are the commonly used tools for resources management although this function
is often considered outside the remit of the NOC.
Other tools: • Racktables (4)
• omnigraffle (2)
• Commercial GIS application
• vi, flat files, rcs, scripts
• Network Inventory
• Plaintext-files
• GestioIP
• HP Openview Service
Desk
• phpipam
In-house developed
solutions:
• KIND (home-grown inventory/ CMDB)
• Web pages using PHP
• IPAM
• Resources Management: Web-based
list of networks and router-interfaces
• GIS Database
• BDcom database
• home-grown database
application
Table 15. Other tools and in-house developed solutions for inventory management
VISIO
EXCEL
WIKI
CONFLUENCE
6CONNECT
IPPlanINFOBLOXBLUECAT
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Resources Management
VISIO
EXCEL
WIKI
CONFLUENCE
6CONNECT
IPPlan
INFOBLOX
BLUECAT
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 21
4.15. Data Aggregation, Representation and Visualisation
Chart 17. Software tools used for data aggregation, representation and visualisation
CACTI, WEATHERMAP and ELASTICSEARCH are the most important tools: their qualities are almost
the same.
Other tools: • MRTG, Tivoli maps, Juniper RIM
• Zino
• Zenoss
• CheckMK
• Observium
In-house developed
solutions:
• N/A
Table 16. Other tools and in-house developed solutions for data aggregation, representation and
visualisation
CACTI
WEATHERMAP
ELASTICSEARCHLOGSTASHKIBANASPLUNK
1.00
1.50
2.00
2.50
3.00
3.50
4.00
4.50
5.00
1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50
Rating
Importance
Data Aggregation, Representation and Visualisation
CACTI
WEATHERMAP
ELASTICSEARCH
LOGSTASH
KIBANA
SPLUNK
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 22
5. Standards and trainings
As part of the survey, SIG-NOC wanted to figure out the level of adoption by the NOCs of the various
standards and industry best practice-based procedures and methodologies. These results will serve
as an input to the NOC training development exercise that SIG-NOC intends to carry out later in
2016.
Chart 18 shows the various standard adoptions. The ISO 27001 Information Security Management
standard has been implemented by 23.5% of the respondents somewhere in 60 to 100%
completeness. On the other hand, 47% of the respondents have not yet started implementing ISO
27001 standard at all. ISO 27000 is part of a growing family of ISO/IEC Information Security
Management Systems (ISMS) standards, but its level of adoptions is not that significant. ITIL is not a
standard but a set of industry best practices therefore it provides some room for implementation
that is happening at many NOCs. About 80% of NOCs started to comply with ITIL recommendations,
about one third of them are in 5 to 30% and another one third of them are in 30 to 60%. It
represents a real take up and transitional path towards ITIL based operations.
Chart 18. Estimated level of adoption of the given standards and methodologies
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
NONE
5-10%
10-30%30-60%
60-100%
Estimated level of adoption of the given standard or methodology at the NOC
ISO
ISO 20000
ISO 27001
eTOM
ITIL
NITS
FIPS
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 23
There was a question about the various internal trainings that the NOCs offer to their employees.
Regarding the same set of standards and methodologies above, ITIL training yet again stands out a
little, but in general it can be seen on Chart 19 that an ‘average’ NOC person is not necessarily
certified or trained fully to understand all the context and details of these standards and
methodologies. They are just expected to follow the procedures relevant to them.
Chart 19. Percentage of NOC people certified or trained
In conclusion, it can be said that there is an opportunity for SIG-NOC to develop a training
programme primarily based on ITIL best practices that can be extended and applied to specific NREN
NOC scenarios and provide that training to the GÉANT NOC community and beyond.
The various training opportunities provided by NOCs to their people are listed in Table 17.
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0-10%
10-30%
30-60%
60-100%
Percentage of the NOC people certified or trained
ISO
ISO 20000
ISO 27001
eTOM
ITIL
NITS
FIPS
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 24
General/Procedural
trainings
• Seminars, improvement courses
• Mixed in-house training
• Transmission training
• Crisis and communication training
• On the job training
• General technical training: Coursera MOOC
• We train our NOC members by:
o having generic documentation
o having specific documentation for our networks and/or customers
o going on site to work with them
o letting them come to our site for them to work with us
o inviting them when the NREN technical staff is trained for a
product / technology that is useful for the NOC
• Internal procedures walkthrough and working together with an older
member (‘shadowing’)
• Initial training to practical NOC duties.
• In-house training on relevant topics at random intervals (rarely)
• In-house. Many procedures are described in Dokuwiki and the rest is
practice.
• ITIL foundations
• Network Auditing
• English language training
• Basic, in house, NOC training. Fibre safety. Data centre design/management.
Troubleshooting.
• No standard trainings. Most is learning by doing with the background of
long-year experience with most of the staff-members.
Tool/Technology
specific trainings
• Usually training on the job from the vendor when installing new equipment;
in-house studies and workshops
• DWDM / optical management
• Juniper training
• Vendor related training: Juniper, Fortigate, Cumulus
• Dedicated courses on specific equipment (for instance Alcatel, Cisco, etc.),
CCNA, Linux certification LPIC, RIPE NCC trainings
• CCNA, CCNP, MikroTik academy, different in-house trainings
• We do attend Juniper/Cisco/Alcatel education when appropriate
Table 17. List of training opportunities that NOCs provide to their people
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 25
6. Conclusions
As is evident, the range of tools in use across the NOCs who responded the survey is extremely wide.
This report explicitly does not attempt to draw any conclusions on which tools are best. However it
should be helpful in determining which tools are most commonly used and therefore likely have a
healthy community around them. It also illustrates situations where tools are widely used, but
perhaps not as widely found to be useful.
While further conclusions are left to the reader; should this survey report raise any questions with
you, then please engage with the SIG-NOC community [1] to find discussion and answers.
7. Acknowledgement
SIG-NOC acknowledges the contributions of all the organisations and their NOCs who participated in
the survey and extends its special thanks to the SIG-NOC Steering Committee members: Brian Nisbet
(HEAnet), Maria Isabel Gandía Carriedo (CSUC), Jonny Lundin (NORDUnet) and Pieter Hanssens
(Belnet).
8. References
[1] GÉANT SIG-NOC home page https://wiki.geant.org/display/SIGNOC/
[2] First NOC Survey 2012 https://www.terena.org/activities/tf-noc/survey.html
© GÉANT 2016 - All rights reserved.
Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 26
www.geant.org

More Related Content

Viewers also liked

Rez gateway (RezOS) innovate the future
Rez gateway  (RezOS) innovate the futureRez gateway  (RezOS) innovate the future
Rez gateway (RezOS) innovate the futureindikaMaligaspe
 
Five pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringFive pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringDaniel Koller
 
Open Source Approach to Design and Deployment of Microservices-based VNF
Open Source Approach to Design and Deployment of Microservices-based VNFOpen Source Approach to Design and Deployment of Microservices-based VNF
Open Source Approach to Design and Deployment of Microservices-based VNFOpen Networking Summit
 
Performance Pack
Performance PackPerformance Pack
Performance Packday
 
Joomladagen 2015 Joomla Performance
Joomladagen 2015 Joomla PerformanceJoomladagen 2015 Joomla Performance
Joomladagen 2015 Joomla PerformanceSimon Kloostra
 
Home Brewing R.U.M - Analyzing application performance with real user monitoring
Home Brewing R.U.M - Analyzing application performance with real user monitoringHome Brewing R.U.M - Analyzing application performance with real user monitoring
Home Brewing R.U.M - Analyzing application performance with real user monitoringAnkit Rastogi
 
How to build a Distributed Serverless Polyglot Microservices IoT Platform us...
How to build a Distributed Serverless Polyglot Microservices IoT Platform us...How to build a Distributed Serverless Polyglot Microservices IoT Platform us...
How to build a Distributed Serverless Polyglot Microservices IoT Platform us...Animesh Singh
 
Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014Rodrigo Montoro
 
EMC World 2015 - The Devops Toolkit
EMC World 2015 - The Devops ToolkitEMC World 2015 - The Devops Toolkit
EMC World 2015 - The Devops ToolkitJonas Rosland
 
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...OpenWhisk
 
WTF is Sensu and Monitoring
WTF is Sensu and MonitoringWTF is Sensu and Monitoring
WTF is Sensu and MonitoringToby Jackson
 
Tech Chat – What's New in Sumo Logic
Tech Chat – What's New in Sumo LogicTech Chat – What's New in Sumo Logic
Tech Chat – What's New in Sumo LogicSumo Logic
 
Metrics, Logs, Transaction Traces, Anomaly Detection at Scale
Metrics, Logs, Transaction Traces, Anomaly Detection at ScaleMetrics, Logs, Transaction Traces, Anomaly Detection at Scale
Metrics, Logs, Transaction Traces, Anomaly Detection at ScaleSematext Group, Inc.
 
George Park Workshop 1 - Cosumnes CSD
George Park Workshop 1 - Cosumnes CSDGeorge Park Workshop 1 - Cosumnes CSD
George Park Workshop 1 - Cosumnes CSDCosumnes CSD
 

Viewers also liked (20)

OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
Dialogue Assessment
Dialogue AssessmentDialogue Assessment
Dialogue Assessment
 
Rez gateway (RezOS) innovate the future
Rez gateway  (RezOS) innovate the futureRez gateway  (RezOS) innovate the future
Rez gateway (RezOS) innovate the future
 
Five pillars of Infrastructure Monitoring
Five pillars of Infrastructure MonitoringFive pillars of Infrastructure Monitoring
Five pillars of Infrastructure Monitoring
 
Open Source Approach to Design and Deployment of Microservices-based VNF
Open Source Approach to Design and Deployment of Microservices-based VNFOpen Source Approach to Design and Deployment of Microservices-based VNF
Open Source Approach to Design and Deployment of Microservices-based VNF
 
Performance Pack
Performance PackPerformance Pack
Performance Pack
 
Joomladagen 2015 Joomla Performance
Joomladagen 2015 Joomla PerformanceJoomladagen 2015 Joomla Performance
Joomladagen 2015 Joomla Performance
 
An Introduction to event sourcing and CQRS
An Introduction to event sourcing and CQRSAn Introduction to event sourcing and CQRS
An Introduction to event sourcing and CQRS
 
Home Brewing R.U.M - Analyzing application performance with real user monitoring
Home Brewing R.U.M - Analyzing application performance with real user monitoringHome Brewing R.U.M - Analyzing application performance with real user monitoring
Home Brewing R.U.M - Analyzing application performance with real user monitoring
 
Mohamed Ahmed Abdelkhalek
Mohamed Ahmed AbdelkhalekMohamed Ahmed Abdelkhalek
Mohamed Ahmed Abdelkhalek
 
How to build a Distributed Serverless Polyglot Microservices IoT Platform us...
How to build a Distributed Serverless Polyglot Microservices IoT Platform us...How to build a Distributed Serverless Polyglot Microservices IoT Platform us...
How to build a Distributed Serverless Polyglot Microservices IoT Platform us...
 
Tic’s y enfermería
Tic’s y enfermeríaTic’s y enfermería
Tic’s y enfermería
 
Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014Lost in Translation - Blackhat Brazil 2014
Lost in Translation - Blackhat Brazil 2014
 
Powerupcloud - Corporate Deck
Powerupcloud - Corporate DeckPowerupcloud - Corporate Deck
Powerupcloud - Corporate Deck
 
EMC World 2015 - The Devops Toolkit
EMC World 2015 - The Devops ToolkitEMC World 2015 - The Devops Toolkit
EMC World 2015 - The Devops Toolkit
 
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
IBM Bluemix OpenWhisk: IBM Seminar 2016, Tokyo, Japan: The Future of Cloud Pr...
 
WTF is Sensu and Monitoring
WTF is Sensu and MonitoringWTF is Sensu and Monitoring
WTF is Sensu and Monitoring
 
Tech Chat – What's New in Sumo Logic
Tech Chat – What's New in Sumo LogicTech Chat – What's New in Sumo Logic
Tech Chat – What's New in Sumo Logic
 
Metrics, Logs, Transaction Traces, Anomaly Detection at Scale
Metrics, Logs, Transaction Traces, Anomaly Detection at ScaleMetrics, Logs, Transaction Traces, Anomaly Detection at Scale
Metrics, Logs, Transaction Traces, Anomaly Detection at Scale
 
George Park Workshop 1 - Cosumnes CSD
George Park Workshop 1 - Cosumnes CSDGeorge Park Workshop 1 - Cosumnes CSD
George Park Workshop 1 - Cosumnes CSD
 

Similar to SIG-NOC Tools Survey

IRJET- Factors in Selection of Construction Project Management Software i...
IRJET-  	  Factors in Selection of Construction Project Management Software i...IRJET-  	  Factors in Selection of Construction Project Management Software i...
IRJET- Factors in Selection of Construction Project Management Software i...IRJET Journal
 
The Complete Guide to Embedded Analytics
The Complete Guide to Embedded AnalyticsThe Complete Guide to Embedded Analytics
The Complete Guide to Embedded AnalyticsJessica Sprinkel
 
Application Rationalization with LeanIX
Application Rationalization with LeanIXApplication Rationalization with LeanIX
Application Rationalization with LeanIXLeanIX GmbH
 
IRJET- Creating a Dashboard using Tableau
IRJET- Creating a Dashboard using TableauIRJET- Creating a Dashboard using Tableau
IRJET- Creating a Dashboard using TableauIRJET Journal
 
Development and Evaluation of an Employee Performance Appraisal Insight Repor...
Development and Evaluation of an Employee Performance Appraisal Insight Repor...Development and Evaluation of an Employee Performance Appraisal Insight Repor...
Development and Evaluation of an Employee Performance Appraisal Insight Repor...IRJET Journal
 
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...csandit
 
Interactive Design Coursework (ID Coursework)
Interactive Design Coursework (ID Coursework)Interactive Design Coursework (ID Coursework)
Interactive Design Coursework (ID Coursework)Aung Hein Htet
 
Graphical Analysis of Simulated Financial Data Using R
Graphical Analysis of Simulated Financial Data Using RGraphical Analysis of Simulated Financial Data Using R
Graphical Analysis of Simulated Financial Data Using RIRJET Journal
 
An introductory study on sectoral agile customization
An introductory study on sectoral agile customizationAn introductory study on sectoral agile customization
An introductory study on sectoral agile customizationAnna Vicent Soria
 
Emotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine LearningEmotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine LearningIRJET Journal
 
An Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionAn Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionIRJET Journal
 
Overview Sphere M&E system
Overview Sphere M&E systemOverview Sphere M&E system
Overview Sphere M&E systemsphereworld
 
IRJET- Data Analytics and Visualization through R Programming
IRJET-  	  Data Analytics and Visualization through R ProgrammingIRJET-  	  Data Analytics and Visualization through R Programming
IRJET- Data Analytics and Visualization through R ProgrammingIRJET Journal
 
GBS Benchmarking Solutions
GBS Benchmarking SolutionsGBS Benchmarking Solutions
GBS Benchmarking SolutionsPhilippe FIXEL
 
IRJET- Vendor Management System using Machine Learning
IRJET-  	  Vendor Management System using Machine LearningIRJET-  	  Vendor Management System using Machine Learning
IRJET- Vendor Management System using Machine LearningIRJET Journal
 
How Can I Use SNAP to Improve My Estimation Practices?
How Can I Use SNAP to Improve My Estimation Practices?How Can I Use SNAP to Improve My Estimation Practices?
How Can I Use SNAP to Improve My Estimation Practices?DCG Software Value
 
INF 220 RANK Introduction Education--inf220rank.com
INF 220 RANK Introduction Education--inf220rank.comINF 220 RANK Introduction Education--inf220rank.com
INF 220 RANK Introduction Education--inf220rank.comagathachristie277
 
IRJET- Opinion Mining and Sentiment Analysis for Online Review
IRJET-  	  Opinion Mining and Sentiment Analysis for Online ReviewIRJET-  	  Opinion Mining and Sentiment Analysis for Online Review
IRJET- Opinion Mining and Sentiment Analysis for Online ReviewIRJET Journal
 
Inf 220 Future Our Mission/newtonhelp.com
Inf 220 Future Our Mission/newtonhelp.comInf 220 Future Our Mission/newtonhelp.com
Inf 220 Future Our Mission/newtonhelp.comamaranthbeg40
 
Agile ERP_ Continuous Improvements Through Rapid, Incremental Implementations...
Agile ERP_ Continuous Improvements Through Rapid, Incremental Implementations...Agile ERP_ Continuous Improvements Through Rapid, Incremental Implementations...
Agile ERP_ Continuous Improvements Through Rapid, Incremental Implementations...Steven Parker
 

Similar to SIG-NOC Tools Survey (20)

IRJET- Factors in Selection of Construction Project Management Software i...
IRJET-  	  Factors in Selection of Construction Project Management Software i...IRJET-  	  Factors in Selection of Construction Project Management Software i...
IRJET- Factors in Selection of Construction Project Management Software i...
 
The Complete Guide to Embedded Analytics
The Complete Guide to Embedded AnalyticsThe Complete Guide to Embedded Analytics
The Complete Guide to Embedded Analytics
 
Application Rationalization with LeanIX
Application Rationalization with LeanIXApplication Rationalization with LeanIX
Application Rationalization with LeanIX
 
IRJET- Creating a Dashboard using Tableau
IRJET- Creating a Dashboard using TableauIRJET- Creating a Dashboard using Tableau
IRJET- Creating a Dashboard using Tableau
 
Development and Evaluation of an Employee Performance Appraisal Insight Repor...
Development and Evaluation of an Employee Performance Appraisal Insight Repor...Development and Evaluation of an Employee Performance Appraisal Insight Repor...
Development and Evaluation of an Employee Performance Appraisal Insight Repor...
 
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...
LINKING SOFTWARE DEVELOPMENT PHASE AND PRODUCT ATTRIBUTES WITH USER EVALUATIO...
 
Interactive Design Coursework (ID Coursework)
Interactive Design Coursework (ID Coursework)Interactive Design Coursework (ID Coursework)
Interactive Design Coursework (ID Coursework)
 
Graphical Analysis of Simulated Financial Data Using R
Graphical Analysis of Simulated Financial Data Using RGraphical Analysis of Simulated Financial Data Using R
Graphical Analysis of Simulated Financial Data Using R
 
An introductory study on sectoral agile customization
An introductory study on sectoral agile customizationAn introductory study on sectoral agile customization
An introductory study on sectoral agile customization
 
Emotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine LearningEmotion Recognition By Textual Tweets Using Machine Learning
Emotion Recognition By Textual Tweets Using Machine Learning
 
An Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps AdoptionAn Approach of Improve Efficiencies through DevOps Adoption
An Approach of Improve Efficiencies through DevOps Adoption
 
Overview Sphere M&E system
Overview Sphere M&E systemOverview Sphere M&E system
Overview Sphere M&E system
 
IRJET- Data Analytics and Visualization through R Programming
IRJET-  	  Data Analytics and Visualization through R ProgrammingIRJET-  	  Data Analytics and Visualization through R Programming
IRJET- Data Analytics and Visualization through R Programming
 
GBS Benchmarking Solutions
GBS Benchmarking SolutionsGBS Benchmarking Solutions
GBS Benchmarking Solutions
 
IRJET- Vendor Management System using Machine Learning
IRJET-  	  Vendor Management System using Machine LearningIRJET-  	  Vendor Management System using Machine Learning
IRJET- Vendor Management System using Machine Learning
 
How Can I Use SNAP to Improve My Estimation Practices?
How Can I Use SNAP to Improve My Estimation Practices?How Can I Use SNAP to Improve My Estimation Practices?
How Can I Use SNAP to Improve My Estimation Practices?
 
INF 220 RANK Introduction Education--inf220rank.com
INF 220 RANK Introduction Education--inf220rank.comINF 220 RANK Introduction Education--inf220rank.com
INF 220 RANK Introduction Education--inf220rank.com
 
IRJET- Opinion Mining and Sentiment Analysis for Online Review
IRJET-  	  Opinion Mining and Sentiment Analysis for Online ReviewIRJET-  	  Opinion Mining and Sentiment Analysis for Online Review
IRJET- Opinion Mining and Sentiment Analysis for Online Review
 
Inf 220 Future Our Mission/newtonhelp.com
Inf 220 Future Our Mission/newtonhelp.comInf 220 Future Our Mission/newtonhelp.com
Inf 220 Future Our Mission/newtonhelp.com
 
Agile ERP_ Continuous Improvements Through Rapid, Incremental Implementations...
Agile ERP_ Continuous Improvements Through Rapid, Incremental Implementations...Agile ERP_ Continuous Improvements Through Rapid, Incremental Implementations...
Agile ERP_ Continuous Improvements Through Rapid, Incremental Implementations...
 

More from Pavel Odintsov

DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentDDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentPavel Odintsov
 
Network telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationNetwork telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationPavel Odintsov
 
BGP FlowSpec experience and future developments
BGP FlowSpec experience and future developmentsBGP FlowSpec experience and future developments
BGP FlowSpec experience and future developmentsPavel Odintsov
 
Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points  Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points Pavel Odintsov
 
VietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedVietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedPavel Odintsov
 
DDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresPavel Odintsov
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolPavel Odintsov
 
Flowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoiseFlowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoisePavel Odintsov
 
Detectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSDetectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSPavel Odintsov
 
DeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPSDeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPSPavel Odintsov
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flPavel Odintsov
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersPavel Odintsov
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkPavel Odintsov
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiPavel Odintsov
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simplePavel Odintsov
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool Pavel Odintsov
 
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaDetecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaPavel Odintsov
 
Blackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossBlackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossPavel Odintsov
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaPavel Odintsov
 

More from Pavel Odintsov (20)

DDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environmentDDoS Challenges in IPv6 environment
DDoS Challenges in IPv6 environment
 
Network telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentationNetwork telemetry for DDoS detection presentation
Network telemetry for DDoS detection presentation
 
BGP FlowSpec experience and future developments
BGP FlowSpec experience and future developmentsBGP FlowSpec experience and future developments
BGP FlowSpec experience and future developments
 
Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points  Using MikroTik routers for BGP transit and IX points
Using MikroTik routers for BGP transit and IX points
 
VietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume BasedVietTel AntiDDoS Volume Based
VietTel AntiDDoS Volume Based
 
DDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP InfrastructuresDDoS Defense Mechanisms for IXP Infrastructures
DDoS Defense Mechanisms for IXP Infrastructures
 
FastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection toolFastNetMon Advanced DDoS detection tool
FastNetMon Advanced DDoS detection tool
 
Flowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoiseFlowspec contre les attaques DDoS : l'expérience danoise
Flowspec contre les attaques DDoS : l'expérience danoise
 
Detectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOSDetectando DDoS e intrusiones con RouterOS
Detectando DDoS e intrusiones con RouterOS
 
DeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPSDeiC DDoS Prevention System - DDPS
DeiC DDoS Prevention System - DDPS
 
Lekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_flLekker weer nlnog_nlnog_ddos_fl
Lekker weer nlnog_nlnog_ddos_fl
 
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routersLekker weer nlnog_how_to_avoid_buying_expensive_routers
Lekker weer nlnog_how_to_avoid_buying_expensive_routers
 
Implementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit networkImplementing BGP Flowspec at IP transit network
Implementing BGP Flowspec at IP transit network
 
Janog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka IshizakiJanog 39: speech about FastNetMon by Yutaka Ishizaki
Janog 39: speech about FastNetMon by Yutaka Ishizaki
 
Protect your edge BGP security made simple
Protect your edge BGP security made simpleProtect your edge BGP security made simple
Protect your edge BGP security made simple
 
Keeping your rack cool
Keeping your rack cool Keeping your rack cool
Keeping your rack cool
 
Jon Nield FastNetMon
Jon Nield FastNetMonJon Nield FastNetMon
Jon Nield FastNetMon
 
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De LucaDetecting and mitigating DDoS ZenDesk by Vicente De Luca
Detecting and mitigating DDoS ZenDesk by Vicente De Luca
 
Blackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_vossBlackholing from a_providers_perspektive_theo_voss
Blackholing from a_providers_perspektive_theo_voss
 
DDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner MaiaDDoS detection at small ISP by Wardner Maia
DDoS detection at small ISP by Wardner Maia
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

SIG-NOC Tools Survey

  • 1. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 1 SIG-NOC Tools Survey What software tools R&E Network Operations Centres use June 2016
  • 2. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 2 Table of Contents 1. Introduction ....................................................................................................................................3 2. Survey Participants .........................................................................................................................3 3. NOC Functions.................................................................................................................................4 4. NOC Tools........................................................................................................................................6 4.1. Monitoring ..............................................................................................................................6 4.2. Problem Management............................................................................................................8 4.3. Ticketing..................................................................................................................................9 4.4. Performance Management...................................................................................................10 4.5. Reporting and Statistics ........................................................................................................11 4.6. Configuration Management and Backup..............................................................................12 4.7. Communication, Coordination and Chat ..............................................................................13 4.8. Knowledge Management and Documentation.....................................................................14 4.9. Change Management............................................................................................................15 4.10. Out-of-band Access Management ....................................................................................16 4.11. Security Management.......................................................................................................17 4.12. Inventory Management ....................................................................................................18 4.13. DDoS Mitigation................................................................................................................19 4.14. Resources Management ...................................................................................................20 4.15. Data Aggregation, Representation and Visualisation.......................................................21 5. Standards and trainings ................................................................................................................22 6. Conclusions ...................................................................................................................................25 7. Acknowledgement ........................................................................................................................25 8. References ....................................................................................................................................25
  • 3. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 3 1. Introduction The Special Interest Group – Network Operations Centres (SIG-NOC) is a community effort [1] initiated by the National Research and Education Network organisations (NRENs) gathered under the GÉANT association in Europe. SIG-NOC creates an open forum where experts from the GÉANT Community and beyond exchange information, knowledge, ideas and best practices about specific technical or other areas of business relevant to the research and education networking community. SIG-NOC is the successor of the former TERENA Task Force on NOCs (TF-NOC). TF-NOC completed and published its first ‘NOC Survey’ by December 2011 [2]. That survey had a wider scope covering the NOCs’ taxonomy, structures, resources, tools and other aspects. Towards the end of 2015, SIG-NOC decided to repeat only the NOC tools related part, because it was realised that the tools and techniques used by the NOCs had progressed a lot since the last survey. In the second ‘NOC Tools Survey’ covered in this report, information about the software tools that NOCs use to operate networks and services was collected between December 2015 and February 2016. One section was dedicated to the adoption of standards and industry best practices as well as training activities. Since the survey was mainly focusing on tools and operation practices it was recommended to be filled out by someone who has an overview of the whole NOC’s operations. The results of the survey are summarised in this report. The anonymised survey data is also available on the SIG-NOC home page [1] in MS Excel format (i.e. raw data and zoomable graphs) for further analysis. 2. Survey Participants We received 78 individual responses to the survey of which 64 were valid and fully or partly complete. It represents a much better turn out compared to the first survey in 2011, where we were able to analyse only 43 responses. Chart 1 shows the type and range of networks that participated in the survey. We got more coverage in each category. This is partly due to the fact that the SIG-NOC group has been growing and able to reach out to more operators, but it could also be caused by the fact that the same NOCs are covering more and more networks, services and functionalities. The numbers of national research and education networks, campus networks, and Internet Exchanges clearly stand out, compared to the results in 2011.
  • 4. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 4 Chart 1. Type (range) of networks answering the survey In 2016, the other category included datacentre, cross-border fibre and e-government network operators as special types. 3. NOC Functions The survey covered 15 functions that the NOCs may be responsible for. Table 1 lists all the functions in the order of their importance as rated by the respondents. In comparison to 2011, the relevance of problem management, performance management, configuration management, change management and DDoS mitigations have grown significantly. The importance of monitoring stayed constantly high, while resources management is often covered outside of the NOCs. December 2011 February 2016 Trend Monitoring Monitoring 0 Ticketing Problem Management +5 Reporting and Statistics Ticketing -1 Communication, Coordination and Chat Performance Management +4 Knowledge Management and Documentation Reporting and Statistics -2 Out-of-band Access Management Configuration Management and Backup +3 Problem Management Communication, Coordination and Chat -3 Performance Management Knowledge Management and Documentation -3 Configuration Management and Backup Change Management +3 Inventory Management Out-of-band Access Management -4 0 5 10 15 20 25 30 35 40 45 National research and education network (NREN) Regional, metropolitan network Wide area network, among several countries Specific research network (any range) Campus, university network Commercial network, ISP (any range) Internet Exchange operator (any size) Other (please specify) 41 18 13 13 24 4 10 3 25 15 11 8 6 3 2 1 Type (range) of the network that your organization is responsible for February 2016 December 2011
  • 5. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 5 Security Management Security Management 0 Change Management Inventory Management -2 Data Aggregation, Representation, Visualization DDoS Mitigation +2 Resources Management Resources Management 0 DDoS Mitigation Data Aggregation, Representation, Visualisation -2 Table 1. Comparison of NOC functions The 2015 data is also depicted in Chart 2. The functions in the first 9 columns (from monitoring to change management) are covered by more than 60% of the NOCs that responded to the survey. Chart 2. NOCs responsible for the particular functions 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Responsibilities and functions of the NOC Yes No Skipped
  • 6. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 6 4. NOC Tools In this chapter, the various software tools used to fulfil the particular functions are shown rated by their importance and quality: horizontally the importance, vertically the ratings are depicted. The larger the circle the more the answers that we got regarding the particular tool. The smaller circles represent some tools that may be below or above average, but bear in mind that this is based on the opinion of a smaller set of respondents only. We suggest to take into account the bigger circles or the ones with the same/similar relative sizes in any comparison. 4.1. Monitoring Chart 3. Software tools used for monitoring SYSLOG is the preferred way to gather the information from the equipment, closely followed by SNMP and NETFLOW. The best rated tools are the same as in 2011: CACTI and NAGIOS. ZINO has got a high rating but its importance is less and it is not used by that many NOCs. For instance, PERFSONAR and RIPE Atlas are in the same size and importance, and the quality of the later is rated higher by the NOCs. Table 2 below lists some of the other tools and in-house developed solutions not included in the survey. SYSLOG SNMP NETFLOW CACTI NAGIOS LOOKING-GLASSRIPE Atlas / Stats WEATHERMAP MRTG LOGGING NFSEN RANCID SMOKEPING PERFSONAR ICINGA NFDUMP RIPE RIS / BGPlayOBSERVIUM OPENVIEW CRICKET SPECTRUM ZENOSS ZINO INTERMAPPER 1 1.5 2 2.5 3 3.5 4 4.5 5 1 1.5 2 2.5 3 3.5 4 4.5 Rating Importance Monitoring SYSLOG SNMP NETFLOW CACTI NAGIOS LOOKING-GLASS RIPE Atlas / Stats WEATHERMAP MRTG LOGGING NFSEN RANCID SMOKEPING PERFSONAR
  • 7. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 7 Other tools: • Zabbix (4) • Munin (3) • CheckMK (2) • AS-Stats • LibreNMS • CENTREON • Swatch • Ciena OneControl • IBM Tivoli • NAV • Netdisco • Net-minder • Speedtest • Puppet • Racktables • Patchmanager • Splunk • Network Polygraph • NMS from DWDM vendors In-house developed solutions: • GINS (GARR Integrated Networking Suite) • minemon (ICMP and BGP session checks, perl-based) • NAV developed by UNINETT • Rancid frontend • MRTG front-end, Netflow analyser • Service availability overview: RRDtool • FTAS, G3 by CESNET • SMARTxAC • Turbo Krt • ViaIpe: a distributed cacti+smokeping on a georeferenced interface by RNP Table 2. Other tools and in-house developed solutions for monitoring
  • 8. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 8 4.2. Problem Management Chart 4. Software tools used for problem management NAGIOS, REQUEST TRACKER and ELK Stack are rated the highest with relatively high importance although ELK Stack is not used by that many NOCs. There are a few good tools that are useful for problem management but less important, such as RIPE Atlas and RIPE RIS/BGplay. Other tools: • JIRA (3) • Kibana • HP Openview • SpiceWorks • Observium • Munin In-house developed solutions: • TTS • Syslog-analyzer, alarm features on CheckMK and MRTG • GN6, based on Ofbiz • RT integration with Zenoss and Customer - link database Table 3. Other tools and in-house developed solutions for problem management NAGIOS REQUEST TRACKER RIPE Atlas / Stats OTRS RIPE RIS / BGplay SPLUNKNLNOG RING ZABBIX ELK stack ZINO 1 1.5 2 2.5 3 3.5 4 4.5 5 1 1.5 2 2.5 3 3.5 4 4.5 Rating Importance Problem Management NAGIOS REQUEST TRACKER RIPE Atlas / Stats OTRS RIPE RIS / BGplay SPLUNK NLNOG RING ZABBIX ELK stack ZINO
  • 9. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 9 4.3. Ticketing Chart 5. Software tools used for ticketing REQEST TRACKER, OTRS and JIRA are in this exact order in terms of importance, quality and use. SERVICE NOW is rated highly, but only in a small sample and it’s not primarily for ticketing. Other tools: • MANTIS Bug Tracker • TRAC • HP Openview Service Desk • VC4 IMS • Clocking • SpiceWorks • GLPI In-house developed solutions: • TTS (2) • GN6, based on OfBiz • ticketing for drupal Table 4. Other tools and in-house developed solutions for ticketing REQUEST TRACKER OTRSJIRA ARS (Remedy) SERVICE NOW 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Ticketing REQUEST TRACKER OTRS JIRA ARS (Remedy) SERVICE NOW
  • 10. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 10 4.4. Performance Management Chart 6. Software tools used for performance management IPERF, WIRESHARK, MRTG and SMOKEPING are the most important tools. ZINO has got a high rating but only on a small sample. Other tools: • Mgen (2) • RRD • Spirent appliances • Speedtest • NAV In-house developed solutions: • BWM, Live BWM by CARnet • Threshold alarming in MRTG and CheckMK Table 5. Other tools and in-house developed solutions for performance management IPERF WIRESHARK MRTG PERFSONAR SMOKEPING RIPE Atlas NDT BWCTL NLNOG RING tools HADES ZINO 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Performance Management IPERF WIRESHARK MRTG PERFSONAR SMOKEPING RIPE Atlas NDT BWCTL NLNOG RING tools HADES ZINO
  • 11. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 11 4.5. Reporting and Statistics Chart 7. Software tools used for reporting and statistics CACTI, NAGIOS and MRTG stand out, but most of the tools are very close to each other in terms of importance and quality. Other tools: • RequestTracker (2) • Zabbix (2) • Kibana • LibreNMS • Torrus • RRDtool • infovista • sanet • Grafana is included in NAV, NFDump and manual analysis In-house developed solutions: • GINS • SNMP stats export, Netflow stats • Pinger tool with added extensions, Nagios extensions Table 6. Other tools and in-house developed solutions for reporting and statistics CACTI MRTG NAGIOS NFSENGRAFANAMUNIN ARBOR SPLUNK ZENOSS ZINO CA SPECTRUM TABLEAU 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Reporting and Statistics CACTI MRTG NAGIOS NFSEN GRAFANA MUNIN ARBOR SPLUNK ZENOSS ZINO CA SPECTRUM TABLEAU
  • 12. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 12 4.6. Configuration Management and Backup Chart 8. Software tools used for configuration management and backup Git, RANCID, SUBVERSION and CVS are the popular tools, the others were not rated as important. Other tools: • RCS (4) • CA Spectrum and FTP server • Puppet • Backuppc • etckeeper • Racktables • Patchmanager • Ciena NMS • SCCS • veeam • imc In-house developed solutions: • Rancid-like tools • GN6, based on OfBiz Table 7. Other tools and in-house developed solutions for configuration management and backup RANCID Git SUBVERSION CVS IMS OXIDIZED 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 0.00 0.50 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Configuration Management and Backup RANCID Git SUBVERSION CVS IMS OXIDIZED
  • 13. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 13 4.7. Communication, Coordination and Chat Chart 9. Software tools used for communication, coordination and chat Interestingly traditional communication and new social tools are considered almost equally good. However, e-mail, mailing lists and mobile phone are still the most important tools. Other tools: • Asterisk • Kamailio • CalDav • ServiceInfo (webbased sender for mailing lists) • SharePoint In-house developed solutions: • N/A Table 8. Other tools and in-house developed solutions for communication, coordination and chat E-mail MAILING LISTS WIKI SKYPE MobileJABBER IM TWITTER Landline WHATSAPP IRC SLACK 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Communication, Coordination and Chat E-mail MAILING LISTS WIKI SKYPE Mobile JABBER IM TWITTER Landline WHATSAPP IRC SLACK
  • 14. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 14 4.8. Knowledge Management and Documentation Chart 10. Software tools used for knowledge management and documentation Wiki platforms are considered the best for many users. Confluence has go the highest rating with slightly less users. Different cloud storage solutions are used by many NOCs, but their importance is relatively low. Other tools: • MoinMoin Wiki • TRACwiki • TiddlyWiki • FosWiki • Drupal CMS • File server • Subversion • Plone • ownCloud • SURFdrive • OneDrive In-house developed solutions: • Home-grown inventory / CMDB system (KIND) • Database (GIS) • Comunitats, based on Plone Table 9. Other tools and in-house developed solutions for knowledge management and documentation WIKI Cloud storage*REQUEST TRACKER MEDIAWIKI CONFLUENCE DOCUWIKI SHAREPOINTOTRS 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Knowledge Management and Documentation WIKI Cloud storage* REQUEST TRACKER MEDIAWIKI CONFLUENCE DOCUWIKI SHAREPOINT OTRS
  • 15. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 15 4.9. Change Management Chart 11. Software tools used for change management REQUEST TRACKER is the most important and highly used tool for change management followed by JIRA and OTRS. Other tools: • Redmine • gitlab • Racktables • Patchmanager • HP Openview Service Desk In-house developed solutions: • pymetric • Wiki • GN6, based on OfBiz • In house Change Request generator • ticketing for drupal Table 10. Other tools and in-house developed solutions for change management REQUEST TRACKER OTRS JIRA CONFLUENCE 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Change Management REQUEST TRACKER OTRS JIRA CONFLUENCE
  • 16. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 16 4.10. Out-of-band Access Management Chart 12. Software tools used for out-of-band access management CONSOLE SERVER is felt to be the most highly rated and important solution. Other tools: • ISDN (2) • DWDM OSC • we currently use POTS for access, but want to move away from that In-house developed solutions: • N/A Table 11. Other tools and in-house developed solutions for out-of-band access CONSOLE SERVER ADSL DRAC HP ILO LandlineKVM (not the hypervisor)Mobile tech 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Out-of-band Access Management CONSOLE SERVER ADSL DRAC HP ILO Landline KVM (not the hypervisor) Mobile tech
  • 17. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 17 4.11. Security Management Chart 13. Software tools used for security management Firewalls and ACLs are used by almost all the institutions who answered this question. BGPmon is highly rated, but not used by so many NOCs. Other tools: • FirewallBuilder (2) • RTIR • Netflow analyzer In-house developed solutions: • N/A Table 12. Other tools and in-house developed solutions for security management FIREWALL ACL FREERADIUS REQUEST TRACKER TACACS+ BGMON RADIATOR KERBEROS RSA Software 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Security Management FIREWALL ACL FREERADIUS REQUEST TRACKER TACACS+ BGMON RADIATOR KERBEROS RSA Software
  • 18. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 18 4.12. Inventory Management Chart 14. Software tools used for inventory management Almost all the listed tools are in the same quality and importance range however not primarily designed for proper inventory management. Better tools are listed in Table 13. Other tools: • RackTables (2) • IIR (2) • Patchmanager • HP Openview Service Desk • HP Openview NNM • Ciena NMS • filemaker • netdisco • Observium In-house developed solutions: • KIND (home-grown inventory/ CMDB) • In-house developed tool based on SNMP, RANCID, Apache & MySQL • CMT • GarrDB • MySQL + Perl + lots of text • GIS Database • inventory PHP based • GN6, based on OfBiz • home-grown database- application • Asset Database • Grejp • own database tool Table 13. Other tools and in-house developed solutions for inventory management EXCELRANCID WIKI IMS1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Inventory Management EXCEL RANCID WIKI IMS
  • 19. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 19 4.13. DDoS Mitigation Chart 15. Software tools used for DDoS mitigation FLOWSPEC, ARBOR and Firewall on Demand are highly rated tools in general, but most of the NOCs use Blackholing and ACLs. Other tools: • Fastnetmon In-house developed solutions: • DDoS detection and traffic washers Table 14. Other tools and in-house developed solutions for DDoS mitigations ACL Blackholing RATE-LIMITING Firewall on Demand FLOWSPEC ARBOR Traffic-washing AKAMAI Solutions UTRS 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance DDoD Mitigation ACL Blackholing RATE-LIMITING Firewall on Demand FLOWSPEC ARBOR Traffic-washing AKAMAI Solutions UTRS
  • 20. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 20 4.14. Resources Management Chart 16. Software tools used for resources management VISO, Wiki and Excel are the commonly used tools for resources management although this function is often considered outside the remit of the NOC. Other tools: • Racktables (4) • omnigraffle (2) • Commercial GIS application • vi, flat files, rcs, scripts • Network Inventory • Plaintext-files • GestioIP • HP Openview Service Desk • phpipam In-house developed solutions: • KIND (home-grown inventory/ CMDB) • Web pages using PHP • IPAM • Resources Management: Web-based list of networks and router-interfaces • GIS Database • BDcom database • home-grown database application Table 15. Other tools and in-house developed solutions for inventory management VISIO EXCEL WIKI CONFLUENCE 6CONNECT IPPlanINFOBLOXBLUECAT 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Resources Management VISIO EXCEL WIKI CONFLUENCE 6CONNECT IPPlan INFOBLOX BLUECAT
  • 21. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 21 4.15. Data Aggregation, Representation and Visualisation Chart 17. Software tools used for data aggregation, representation and visualisation CACTI, WEATHERMAP and ELASTICSEARCH are the most important tools: their qualities are almost the same. Other tools: • MRTG, Tivoli maps, Juniper RIM • Zino • Zenoss • CheckMK • Observium In-house developed solutions: • N/A Table 16. Other tools and in-house developed solutions for data aggregation, representation and visualisation CACTI WEATHERMAP ELASTICSEARCHLOGSTASHKIBANASPLUNK 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 5.00 1.00 1.50 2.00 2.50 3.00 3.50 4.00 4.50 Rating Importance Data Aggregation, Representation and Visualisation CACTI WEATHERMAP ELASTICSEARCH LOGSTASH KIBANA SPLUNK
  • 22. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 22 5. Standards and trainings As part of the survey, SIG-NOC wanted to figure out the level of adoption by the NOCs of the various standards and industry best practice-based procedures and methodologies. These results will serve as an input to the NOC training development exercise that SIG-NOC intends to carry out later in 2016. Chart 18 shows the various standard adoptions. The ISO 27001 Information Security Management standard has been implemented by 23.5% of the respondents somewhere in 60 to 100% completeness. On the other hand, 47% of the respondents have not yet started implementing ISO 27001 standard at all. ISO 27000 is part of a growing family of ISO/IEC Information Security Management Systems (ISMS) standards, but its level of adoptions is not that significant. ITIL is not a standard but a set of industry best practices therefore it provides some room for implementation that is happening at many NOCs. About 80% of NOCs started to comply with ITIL recommendations, about one third of them are in 5 to 30% and another one third of them are in 30 to 60%. It represents a real take up and transitional path towards ITIL based operations. Chart 18. Estimated level of adoption of the given standards and methodologies 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 NONE 5-10% 10-30%30-60% 60-100% Estimated level of adoption of the given standard or methodology at the NOC ISO ISO 20000 ISO 27001 eTOM ITIL NITS FIPS
  • 23. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 23 There was a question about the various internal trainings that the NOCs offer to their employees. Regarding the same set of standards and methodologies above, ITIL training yet again stands out a little, but in general it can be seen on Chart 19 that an ‘average’ NOC person is not necessarily certified or trained fully to understand all the context and details of these standards and methodologies. They are just expected to follow the procedures relevant to them. Chart 19. Percentage of NOC people certified or trained In conclusion, it can be said that there is an opportunity for SIG-NOC to develop a training programme primarily based on ITIL best practices that can be extended and applied to specific NREN NOC scenarios and provide that training to the GÉANT NOC community and beyond. The various training opportunities provided by NOCs to their people are listed in Table 17. 0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0-10% 10-30% 30-60% 60-100% Percentage of the NOC people certified or trained ISO ISO 20000 ISO 27001 eTOM ITIL NITS FIPS
  • 24. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 24 General/Procedural trainings • Seminars, improvement courses • Mixed in-house training • Transmission training • Crisis and communication training • On the job training • General technical training: Coursera MOOC • We train our NOC members by: o having generic documentation o having specific documentation for our networks and/or customers o going on site to work with them o letting them come to our site for them to work with us o inviting them when the NREN technical staff is trained for a product / technology that is useful for the NOC • Internal procedures walkthrough and working together with an older member (‘shadowing’) • Initial training to practical NOC duties. • In-house training on relevant topics at random intervals (rarely) • In-house. Many procedures are described in Dokuwiki and the rest is practice. • ITIL foundations • Network Auditing • English language training • Basic, in house, NOC training. Fibre safety. Data centre design/management. Troubleshooting. • No standard trainings. Most is learning by doing with the background of long-year experience with most of the staff-members. Tool/Technology specific trainings • Usually training on the job from the vendor when installing new equipment; in-house studies and workshops • DWDM / optical management • Juniper training • Vendor related training: Juniper, Fortigate, Cumulus • Dedicated courses on specific equipment (for instance Alcatel, Cisco, etc.), CCNA, Linux certification LPIC, RIPE NCC trainings • CCNA, CCNP, MikroTik academy, different in-house trainings • We do attend Juniper/Cisco/Alcatel education when appropriate Table 17. List of training opportunities that NOCs provide to their people
  • 25. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 25 6. Conclusions As is evident, the range of tools in use across the NOCs who responded the survey is extremely wide. This report explicitly does not attempt to draw any conclusions on which tools are best. However it should be helpful in determining which tools are most commonly used and therefore likely have a healthy community around them. It also illustrates situations where tools are widely used, but perhaps not as widely found to be useful. While further conclusions are left to the reader; should this survey report raise any questions with you, then please engage with the SIG-NOC community [1] to find discussion and answers. 7. Acknowledgement SIG-NOC acknowledges the contributions of all the organisations and their NOCs who participated in the survey and extends its special thanks to the SIG-NOC Steering Committee members: Brian Nisbet (HEAnet), Maria Isabel Gandía Carriedo (CSUC), Jonny Lundin (NORDUnet) and Pieter Hanssens (Belnet). 8. References [1] GÉANT SIG-NOC home page https://wiki.geant.org/display/SIGNOC/ [2] First NOC Survey 2012 https://www.terena.org/activities/tf-noc/survey.html
  • 26. © GÉANT 2016 - All rights reserved. Parts of this document may be freely copied, unaltered, provided that the original source is acknowledged and the copyright preserved. 26 www.geant.org