You see, and after a 3rd coffee, here I stare at my desk and think about how much PJ Networks has achieved — and how much the open source tools that power our custom NOC solution get leveraged. Beginning my career as a network admin in 1993, I recall having to fight with PSTN muxes, and I even caught the Slammer worm all up in my face. Those early days informed my worldview: pragmatic, flexible, and hopefully a bit skeptical of shiny buzzwords. Fast forward to today. Our NOC uses no fluff, armchair-tools to monitor, alert and secure our clients’ very crucial infrastructure – including some recent zero-trust upgrades and implementations in older, character-building banks (yes, they really do want rock-solid visibility). Let me show you how we design this beast, why these tools kick proprietary solution’s butts, and some of the tricks I have learned in 30 years in the trenches to style them.
The security industry is always eager to slap AI-powered on every product, but I’m skeptical. Automation and intelligent detection Aren’t these what we call automation and intelligent detection? Sure. Neural networks making decisions for your firewall? No thanks. Open-source offers us transparency, flexibility, and control, the foundation of strong cyber security. When you are managing your own NOC, flexibility triumphs over shiny, closed-box one-size-fits-all solutions every time.
Indeed, our open-source stack allows us to:
Here is a simplified diagram that shows how a normal deployment from us may look like.
Diagram callout: Mid-center, Zabbix acts as our central monitoring engine, able to receive metrics sent by network devices, servers and security appliances. Grafana provides a clean interface for these metrics, while we use ELK (Elasticsearch, Logstash, Kibana) stack to provide deep log analytics and incident forensics. Alerts get routed to integrated communication channels —Slack, email, SMS – to notify the NOC team.
Zabbix also like Zabbix if need real time monitoring for diversified networks. In the old days, network admins used clunky SNMP tools that gave them very limited abilities to see what was going on with the traffic. Zabbix leveled the field by introducing custom scripts and flexible triggers.
Grafana provides the visualization layer for us. Nothing like building a platform for dashboards that even your easygoing, non-tech bank manager can look at one day and get it. I’ve seen the days where network monitoring dashboards were broken Excel sheets (yuck).
Zabbix is for “health,” but logs are for “why something is wrong”. Our forensic powerhouse is ELK (Elasticsearch, Logstash, Kibana). I recall toiling over the early SIEMs, which acted like black boxes — dull and also slothlike.
Here is a pro tip: You can do that with Logstash filters to normalize logs across devices. It hurts, but could save you hours in incident response.
We have a workflow pipeline: Our workflow looks like this.
Diagram callout The data flow that ensures there are no blind spots Accept metrics as they give you health, accept logs as they give you context.
I’ve learned a few things over the years that might spare you headaches:
Short on time? Here’s what you need to know about PJ Networks open source NOC:
When it comes to cybersecurity, seeing is believing. No volume of AI buzzwords, or vendor hype in general, can replace real insight into your network and systems. A well-constructed open-source NOC allows you to spot suspicious activity early, dig deep into it, and react quickly.
Remember the old PSTN days? You had to understand every patch panel and cable color — no magic software did everything. Same principle applies. Your NOC is your eyes and ears, and in some cases, your front line.
But — and this is somewhat contraversial — I think a lot of companies underinvest in their monitoring. They invest heavily in firewalls and endpoint protection, but are blind to the NOC’s capability to ferret out nuanced network irregularities. It’s as if you bought a muscle car but didn’t even bother to look at the oil. You can’t race without it.
After decades in networking and security, I am just as excited as I ever was that open-source tools allow us to build NOCs that fill actual operational needs—not things that only exist on marketing slides. At PJ Networks, this approach has enabled us to provide scalable, resilient monitoring solutions to complex clients — like banks implementing zero-trust upgrades.
Open source does not mean less money; it means inserting the human back into the security loop, where intuition and context intersect with automation. Zabbix, Grafana, and ELK stack centric workflows are still the bread and butter of our NOC, and the secret formula that I’m happy to discuss.
So, if you’re running a NOC, or if you’re thinking about building one, my advice is: Don’t buy the AI hype. Get your hands dirty. Get to know these tools’ strengths — and oddities. Customize relentlessly. And don’t ever lose that third cup of coffee. You’ll need it.
Cheers,
Sanjay Seth
Cybersecurity Consultant
PJ Networks Pvt Ltd