<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best practice for monitoring network switch interfaces without generating noise from unused ports in Alerting</title>
    <link>https://community.dynatrace.com/t5/Alerting/Best-practice-for-monitoring-network-switch-interfaces-without/m-p/299616#M6330</link>
    <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/101147"&gt;@Gewo&lt;/a&gt;&amp;nbsp;If you are trying to monitor a network switch you would ideally be looking at interfaces that are critical to be monitored like ports that are connecting to upstream/downstream devices, critical servers etc.,.&lt;/P&gt;&lt;P&gt;Normally the network administrators would label these critical switch ports using the ifAlias field for easy identification. If its setup in a similar way in your environment you can look at&amp;nbsp;ifAlias field on the interfaces to identify and filter only those for monitoring instead of setting up alerting on all the ports&amp;nbsp; .&lt;/P&gt;</description>
    <pubDate>Tue, 19 May 2026 02:27:28 GMT</pubDate>
    <dc:creator>p_devulapalli</dc:creator>
    <dc:date>2026-05-19T02:27:28Z</dc:date>
    <item>
      <title>Best practice for monitoring network switch interfaces without generating noise from unused ports</title>
      <link>https://community.dynatrace.com/t5/Alerting/Best-practice-for-monitoring-network-switch-interfaces-without/m-p/299464#M6323</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;I’m working on a use case where a customer wants to monitor network switch/router interfaces and generate Problems only when critical ports go down.&lt;/P&gt;
&lt;P&gt;We are using the Dynatrace network device extension metric com.dynatrace.extension.network_device.if.status.&lt;/P&gt;
&lt;P&gt;The initial idea was to alert when an interface is admin up but oper down or lowerLayerDown.&lt;/P&gt;
&lt;P&gt;This technically works, but it creates too much noise because many ports are admin up and oper down simply because nothing is connected to them. They match the condition, but they are not real incidents.&lt;/P&gt;
&lt;P&gt;So the actual requirement is:&lt;/P&gt;
&lt;P&gt;admin up + oper down + expected-up interface = alert&lt;/P&gt;
&lt;P&gt;The customer also wants to classify interfaces as P1, P2 or P3. Only P1 interfaces should automatically open tickets in Halo ITSM through Problem Notifications / Alerting Profiles.&lt;/P&gt;
&lt;P&gt;I’m considering these options:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Maintain an allowlist of expected-up interfaces and alert only on those.&lt;/LI&gt;
&lt;LI&gt;Tag interfaces with expected_up:true and priority:P1/P2/P3.&lt;/LI&gt;
&lt;LI&gt;Create separate DQL alerts for P1/P2/P3 and route only P1 Problems to Halo.&lt;/LI&gt;
&lt;LI&gt;Use lookup data or an external source instead of hardcoding all interfaces in the DQL query.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;What would be the recommended Dynatrace approach for this use case?&lt;/P&gt;
&lt;P&gt;Is tagging network interface entities reliable for this, or would you recommend handling the classification directly in DQL with an allowlist/lookup?&lt;/P&gt;
&lt;P&gt;Has anyone implemented a scalable way to avoid alerting on unused admin up / oper down switch ports?&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2026 12:31:13 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/Best-practice-for-monitoring-network-switch-interfaces-without/m-p/299464#M6323</guid>
      <dc:creator>Gewo</dc:creator>
      <dc:date>2026-05-14T12:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: Best practice for monitoring network switch interfaces without generating noise from unused ports</title>
      <link>https://community.dynatrace.com/t5/Alerting/Best-practice-for-monitoring-network-switch-interfaces-without/m-p/299616#M6330</link>
      <description>&lt;P&gt;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/101147"&gt;@Gewo&lt;/a&gt;&amp;nbsp;If you are trying to monitor a network switch you would ideally be looking at interfaces that are critical to be monitored like ports that are connecting to upstream/downstream devices, critical servers etc.,.&lt;/P&gt;&lt;P&gt;Normally the network administrators would label these critical switch ports using the ifAlias field for easy identification. If its setup in a similar way in your environment you can look at&amp;nbsp;ifAlias field on the interfaces to identify and filter only those for monitoring instead of setting up alerting on all the ports&amp;nbsp; .&lt;/P&gt;</description>
      <pubDate>Tue, 19 May 2026 02:27:28 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Alerting/Best-practice-for-monitoring-network-switch-interfaces-without/m-p/299616#M6330</guid>
      <dc:creator>p_devulapalli</dc:creator>
      <dc:date>2026-05-19T02:27:28Z</dc:date>
    </item>
  </channel>
</rss>

