Skip to main content

Battling Network Zombies This Halloween?

Megan Assarrane

On Halloween, there's no shortage of horror movies to scare and entertain you. Among the usual cast of creepy characters, zombies are among the most popular underdogs. They're (often) embarrassingly slow and brainless. They have terrible personal hygiene. They can't operate machinery of any kind, they can't drive and they don't know how to use a computer or a smartphone.

Speaking of technology, network zombies, on the other hand, are an all too real menace for the modern-day IT administrator. They are smarter than the average zombie, impossible to predict because they appear randomly without warning and dangerous because they cause downtime and lost productivity. Without the right approach, they are nearly impossible to locate and kill.

Network Zombies Are Real

The process required to detect and eliminate network zombies is far more challenging than the swift headshot that eradicates their human counterparts. Network zombies are much harder to track down and kill because they often appear, wreak havoc and disappear. There's no trail of abandoned vehicles and half-eaten bodies to follow.

The only trace evidence is captured in event logs that are often buried in large volumes of hard to connect data. The root cause can be hidden almost anywhere because most business applications are complex entities that interact with multiple resources, such as databases, web servers, directory services and the network itself. That complexity forces the administrator through a slow, labor-intensive investigative process that can delay other daily tasks and projects.

Without a clear view of the zombie, the system administrator is forced to review event logs from every part of the application environment, analyzing long lists of events in multiple logs item by item to find an outstanding event, error condition, or combination of conditions that correlate to the timeframe in which users began to complain. The process can take many hours, if not weeks.

Hunting for Zombies Doesn't Have to be Hard – Using the Yools You Have

The greatest challenge in hunting zombies is where to begin. Is the zombie in an application, database or web server? Or is it a network issue? Without a valid starting point, there is no way to select the right diagnostic path and conduct an efficient hunt.

Effective Application Performance Monitoring (APM) can overcome this impasse by linking all application dependencies. Most organizations have a tool already in place to do this, but it is often underused or even overlooked as a tool for battling zombies. If used well, targeted, real-time monitoring puts administrators on the right diagnostic path, while clear graphic displays make it easy to follow that path to find the zombies causing the problems.

APM uses application profiles to locate and identify zombies. Application profiles define how an application is monitored and what actions should be taken when an application or one of its components fails. The most useful APM tools also define complex relationships and dependencies – from simple n-tier applications to large server farms to complete IT services.

In a SQL server farm, an application profile can be created to monitor each SQL server instance for zombies. Individual profiles can then be embedded into a higher-level profile to monitor the entire SQL server farm. Once the server farm profile is created, it can be embedded into an even higher-level profile that encompasses the entire service it is part of, such as CRM.

Replicating this process for each IT service component creates a comprehensive service profile to hunt and trap network zombies. The profile ensures the administrator can view the status of the entire service or drill down to any component within that service, to a specific instance or component of an application.

The resulting comprehensive service monitoring profile is the foundation for fast, accurate zombie eradication. Completing a service profile generally takes less than two hours but after that small investment in time, the process of hunting zombies can be collapsed from hours, days and weeks of time into a straightforward process that takes just minutes. If you multiply this by the number of zombie complaints an administrator receives, the amount of time saved could be considerable.

Expanding APM capabilities to the network can also help an administrator to identify the root cause of a network zombie attack easily.

Greater Protection Against the Zombie Menace

Once zombies have been caught, system administrators can use APM to create multi-step action zombie traps to address future invasions more quickly. Traps can include event logging, real-time alerts and PowerShell self-healing scripts such as reboot and service restart. Setting zombie trap policies can be assigned at the service, application and component level. Dependency-aware application profiles enable coordinated multi-tier zombie traps to ensure optimal performance of complex applications and IT services.

An APM tool can streamline the process of hunting and trapping zombies, whether they reside in a device or in the network itself, from many hours of exhausting work into a few highly-productive minutes.

Now there's a weapon people confronted with shuffling zombies in a horror film might wish they had at their disposal.

Megan Assarrane is Product Marketing Manager at Ipswitch.

Hot Topics

The Latest

Developers building AI applications are not just looking for fault patterns after deployment; they must detect issues quickly during development and have the ability to prevent issues after going live. Unfortunately, traditional observability tools can no longer meet the needs of AI-driven enterprise application development. AI-powered detection and auto-remediation tools designed to keep pace with rapid development are now emerging to proactively manage performance and prevent downtime ...

Every few years, the cybersecurity industry adopts a new buzzword. "Zero Trust" has endured longer than most — and for good reason. Its promise is simple: trust nothing by default, verify everything continuously. Yet many organizations still hesitate to implement Zero Trust Network Access (ZTNA). The problem isn't that ZTNA doesn't work. It's that it's often misunderstood ...

For many retail brands, peak season is the annual stress test of their digital infrastructure. It's also when often technical dashboards glow green, yet customer feedback, digital experience frustration, and conversion trends tell a different story entirely. Over the past several years, we've seen the same pattern across retail, financial services, travel, and media: internal application performance metrics fail to capture the true experience of users connecting over local broadband, mobile carriers, and congested networks using multiple devices across geographies ...

PostgreSQL promises greater flexibility, performance, and cost savings compared to proprietary alternatives. But successfully deploying it isn't always straightforward, and there are some hidden traps along the way that even seasoned IT leaders can stumble into. In this blog, I'll highlight five of the most common pitfalls with PostgreSQL deployment and offer guidance on how to avoid them, along with the best path forward ...

The rise of hybrid cloud environments, the explosion of IoT devices, the proliferation of remote work, and advanced cyber threats have created a monitoring challenge that traditional approaches simply cannot meet. IT teams find themselves drowning in a sea of data, struggling to identify critical threats amidst a deluge of alerts, and often reacting to incidents long after they've begun. This is where AI and ML are leveraged ...

Three practices, chaos testing, incident retrospectives, and AIOps-driven monitoring, are transforming platform teams from reactive responders into proactive builders of resilient, self-healing systems. The evolution is not just technical; it's cultural. The modern platform engineer isn't just maintaining infrastructure. They're product owners designing for reliability, observability, and continuous improvement ...

Getting applications into the hands of those who need them quickly and securely has long been the goal of a branch of IT often referred to as End User Computing (EUC). Over recent years, the way applications (and data) have been delivered to these "users" has changed noticeably. Organizations have many more choices available to them now, and there will be more to come ... But how did we get here? Where are we going? Is this all too complicated? ...

On November 18, a single database permission change inside Cloudflare set off a chain of failures that rippled across the Internet. Traffic stalled. Authentication broke. Workers KV returned waves of 5xx errors as systems fell in and out of sync. For nearly three hours, one of the most resilient networks on the planet struggled under the weight of a change no one expected to matter ... Cloudflare recovered quickly, but the deeper lesson reaches far beyond this incident ...

Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space ...

Every modern industry is confronting the same challenge: human reaction time is no longer fast enough for real-time decision environments. Across sectors, from financial services to manufacturing to cybersecurity and beyond, the stakes mirror those of autonomous vehicles — systems operating in complex, high-risk environments where milliseconds matter ...

Battling Network Zombies This Halloween?

Megan Assarrane

On Halloween, there's no shortage of horror movies to scare and entertain you. Among the usual cast of creepy characters, zombies are among the most popular underdogs. They're (often) embarrassingly slow and brainless. They have terrible personal hygiene. They can't operate machinery of any kind, they can't drive and they don't know how to use a computer or a smartphone.

Speaking of technology, network zombies, on the other hand, are an all too real menace for the modern-day IT administrator. They are smarter than the average zombie, impossible to predict because they appear randomly without warning and dangerous because they cause downtime and lost productivity. Without the right approach, they are nearly impossible to locate and kill.

Network Zombies Are Real

The process required to detect and eliminate network zombies is far more challenging than the swift headshot that eradicates their human counterparts. Network zombies are much harder to track down and kill because they often appear, wreak havoc and disappear. There's no trail of abandoned vehicles and half-eaten bodies to follow.

The only trace evidence is captured in event logs that are often buried in large volumes of hard to connect data. The root cause can be hidden almost anywhere because most business applications are complex entities that interact with multiple resources, such as databases, web servers, directory services and the network itself. That complexity forces the administrator through a slow, labor-intensive investigative process that can delay other daily tasks and projects.

Without a clear view of the zombie, the system administrator is forced to review event logs from every part of the application environment, analyzing long lists of events in multiple logs item by item to find an outstanding event, error condition, or combination of conditions that correlate to the timeframe in which users began to complain. The process can take many hours, if not weeks.

Hunting for Zombies Doesn't Have to be Hard – Using the Yools You Have

The greatest challenge in hunting zombies is where to begin. Is the zombie in an application, database or web server? Or is it a network issue? Without a valid starting point, there is no way to select the right diagnostic path and conduct an efficient hunt.

Effective Application Performance Monitoring (APM) can overcome this impasse by linking all application dependencies. Most organizations have a tool already in place to do this, but it is often underused or even overlooked as a tool for battling zombies. If used well, targeted, real-time monitoring puts administrators on the right diagnostic path, while clear graphic displays make it easy to follow that path to find the zombies causing the problems.

APM uses application profiles to locate and identify zombies. Application profiles define how an application is monitored and what actions should be taken when an application or one of its components fails. The most useful APM tools also define complex relationships and dependencies – from simple n-tier applications to large server farms to complete IT services.

In a SQL server farm, an application profile can be created to monitor each SQL server instance for zombies. Individual profiles can then be embedded into a higher-level profile to monitor the entire SQL server farm. Once the server farm profile is created, it can be embedded into an even higher-level profile that encompasses the entire service it is part of, such as CRM.

Replicating this process for each IT service component creates a comprehensive service profile to hunt and trap network zombies. The profile ensures the administrator can view the status of the entire service or drill down to any component within that service, to a specific instance or component of an application.

The resulting comprehensive service monitoring profile is the foundation for fast, accurate zombie eradication. Completing a service profile generally takes less than two hours but after that small investment in time, the process of hunting zombies can be collapsed from hours, days and weeks of time into a straightforward process that takes just minutes. If you multiply this by the number of zombie complaints an administrator receives, the amount of time saved could be considerable.

Expanding APM capabilities to the network can also help an administrator to identify the root cause of a network zombie attack easily.

Greater Protection Against the Zombie Menace

Once zombies have been caught, system administrators can use APM to create multi-step action zombie traps to address future invasions more quickly. Traps can include event logging, real-time alerts and PowerShell self-healing scripts such as reboot and service restart. Setting zombie trap policies can be assigned at the service, application and component level. Dependency-aware application profiles enable coordinated multi-tier zombie traps to ensure optimal performance of complex applications and IT services.

An APM tool can streamline the process of hunting and trapping zombies, whether they reside in a device or in the network itself, from many hours of exhausting work into a few highly-productive minutes.

Now there's a weapon people confronted with shuffling zombies in a horror film might wish they had at their disposal.

Megan Assarrane is Product Marketing Manager at Ipswitch.

Hot Topics

The Latest

Developers building AI applications are not just looking for fault patterns after deployment; they must detect issues quickly during development and have the ability to prevent issues after going live. Unfortunately, traditional observability tools can no longer meet the needs of AI-driven enterprise application development. AI-powered detection and auto-remediation tools designed to keep pace with rapid development are now emerging to proactively manage performance and prevent downtime ...

Every few years, the cybersecurity industry adopts a new buzzword. "Zero Trust" has endured longer than most — and for good reason. Its promise is simple: trust nothing by default, verify everything continuously. Yet many organizations still hesitate to implement Zero Trust Network Access (ZTNA). The problem isn't that ZTNA doesn't work. It's that it's often misunderstood ...

For many retail brands, peak season is the annual stress test of their digital infrastructure. It's also when often technical dashboards glow green, yet customer feedback, digital experience frustration, and conversion trends tell a different story entirely. Over the past several years, we've seen the same pattern across retail, financial services, travel, and media: internal application performance metrics fail to capture the true experience of users connecting over local broadband, mobile carriers, and congested networks using multiple devices across geographies ...

PostgreSQL promises greater flexibility, performance, and cost savings compared to proprietary alternatives. But successfully deploying it isn't always straightforward, and there are some hidden traps along the way that even seasoned IT leaders can stumble into. In this blog, I'll highlight five of the most common pitfalls with PostgreSQL deployment and offer guidance on how to avoid them, along with the best path forward ...

The rise of hybrid cloud environments, the explosion of IoT devices, the proliferation of remote work, and advanced cyber threats have created a monitoring challenge that traditional approaches simply cannot meet. IT teams find themselves drowning in a sea of data, struggling to identify critical threats amidst a deluge of alerts, and often reacting to incidents long after they've begun. This is where AI and ML are leveraged ...

Three practices, chaos testing, incident retrospectives, and AIOps-driven monitoring, are transforming platform teams from reactive responders into proactive builders of resilient, self-healing systems. The evolution is not just technical; it's cultural. The modern platform engineer isn't just maintaining infrastructure. They're product owners designing for reliability, observability, and continuous improvement ...

Getting applications into the hands of those who need them quickly and securely has long been the goal of a branch of IT often referred to as End User Computing (EUC). Over recent years, the way applications (and data) have been delivered to these "users" has changed noticeably. Organizations have many more choices available to them now, and there will be more to come ... But how did we get here? Where are we going? Is this all too complicated? ...

On November 18, a single database permission change inside Cloudflare set off a chain of failures that rippled across the Internet. Traffic stalled. Authentication broke. Workers KV returned waves of 5xx errors as systems fell in and out of sync. For nearly three hours, one of the most resilient networks on the planet struggled under the weight of a change no one expected to matter ... Cloudflare recovered quickly, but the deeper lesson reaches far beyond this incident ...

Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space ...

Every modern industry is confronting the same challenge: human reaction time is no longer fast enough for real-time decision environments. Across sectors, from financial services to manufacturing to cybersecurity and beyond, the stakes mirror those of autonomous vehicles — systems operating in complex, high-risk environments where milliseconds matter ...