Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

KubeCon NA 2023: Celebrating Innovation and the K8s Community

The sun has officially set on KubeCon North America 2023, but the CNCF's flagship event has left a lasting impression on us. Roughly 9,000 Kubernetes enthusiasts descended on Chicago's McCormick Place West to see the K8s community's latest innovations. DevOps professionals, engineers, and architects alike were eager to share and boost their K8s knowledge. Overall, HAProxy joined over 250 other sponsor organizations to celebrate open-source, cloud-native technologies over four activity-packed days.

A Guide to Effective Network Load Testing & Load Balancing

When it comes to network management, there are two challenges that are ever-present; ensuring optimal network performance and maintaining uninterrupted network connectivity. Network admins are the unsung heroes, diligently managing the digital highways that connect the modern world. To maintain the delicate balance between seamless user experience and network reliability, two crucial practices come to the forefront: Network Load Testing and Load Balancing.

Digging into the Optus Outage

Last week a major internet outage took out one of Australia’s biggest telecoms. In a statement out yesterday, Optus blames the hours-long outage, which left millions of Aussies without telephone and internet, on a route leak from a sibling company. In this post, we discuss the outage and how it compares to the historic outage suffered by Canadian telecom Rogers in July 2022.

Netplan brings consistent network configuration across Desktop, Server, Cloud and IoT

We released Ubuntu 23.10 ‘Mantic Minotaur’ on 12 October 2023, shipping its proven and trusted network stack based on Netplan. Netplan is the default tool to configure Linux networking on Ubuntu since 2016. In the past, it was primarily used to control the Server and Cloud variants of Ubuntu, while on Desktop systems it would hand over control to NetworkManager.

Making the most of bandwidth on-demand: What is flex bandwidth?

One of Console Connect's most powerful features is the ability to quickly configure and immediately provision Layer 2 interconnections between Console Connect endpoints at the bandwidth capacity you need. But what if your bandwidth needs evolve or you need to respond to a temporary surge in demand? You might encounter scenarios where you need more flexibility, such as.

Why Implementing App Security Can Lead To Spiraling Costs

Robust app security is non-negotiable, but the spiraling costs that can come with it are. In the context of application delivery, security plays a pivotal role in maintaining business continuity, protecting sensitive data, and upholding a solid reputation. However, the journey to build a formidable defense at the load balancing and reverse proxy layer can quickly become costly with a few wrong turns. Security is important, but buyers don’t have to break the bank to implement it.

Router Monitoring with Grafana

Routers are essential for connecting devices. Routers decide where the internet goes and how fast it should be. Because they play such a crucial role, it's vital to keep an eye on them and make sure they're doing their job well. This act of keeping an eye on routers is what we call "router monitoring." Monitoring routers isn't just about checking how the routers are doing; it's about making sure the whole network works well.

Resolving VPN Issues Without Manual Intervention: Qualcomm Incorporated and Nexthink Flow

VPN issues are easily some of the most common digital workplace problems to plague end user computing (EUC) teams. When the VPN crashes or falls out of compliance, it can have a disproportionate impact on employee experience. Monitoring and managing VPN performance is a top priority for many of our customers – including Qualcomm Incorporated. Qualcomm had a known VPN issue taking place in their environment impacting 90% of their workforce.

ITIM and the Public Sector: How Network Monitoring Rises to the Challenge

Government agencies and public sector organizations are a tantalizing hacker target. Cybercriminals go after public sector organizations because they hold confidential, often classified, information – the exact data state-sponsored and other criminal groups salivate over. The Cybersecurity and Infrastructure Security Agency, or CISA, along with the United States Computer Emergency Readiness Team, or CERT, have warned public sector IT of key threats.