Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

The 5 Best Open Source Load Balancers

Consider for a moment which fundamental pieces of technology enable the modern web. Odds are, you’re thinking about things like Javascript and HTTP—and yes, they are fundamental parts of the modern web. But, the often-overlooked component of this ecosystem that has truly enabled the web to scale to billions of users and transactions is load balancers.

VLAN, WLAN, LAN... and other types of networks you should know

If you thought the fishmonger’s hair net was the only kind of net you’re wrong. From Pandora FMS we will show you some more, so that you do not get lost without them. The term “network” is used in computing to name a set of computers connected to each other in such a way that they can share resources, services, and information. There are several ways to classify these networks, based on their scope, relationship, or connection method.

How to create and monitor redundant means to access network

Remote access to intranets and otherwise restricted areas was always a challenge. On one hand, it’s desirable to re-create convenient and familiar access to the same resources; on the other hand, there are many issues, starting from ensuring security and access reliability The same is related to monitoring. If a network’s devices should be monitored, there always should be access to them; thus, there’s a separate task of monitoring accessibility. Below are several guidelines.

Top 10 Reasons Why NMS is A Must Have

Nothing’s worse than getting a call from the users that the network is down. Too often, IT lacks the visibility they need to get before performance issues arise, meaning you’re in the dark until a user or customer calls to complain. Once an outage happens, the clock is ticking. And the more time you take to understand and resolve the issue, the more it costs you: in terms of customer dissatisfaction, and also staff time & lost productivity.

HAProxyConf 2019 - How OUI.sncf Built Its CDN with HAProxy by Antonin Mellier and Nicolas Besin

Oui.sncf sells tickets and passes for rail travel around Europe. We operate the #1 French e-commerce website with more than 83 million travel products sold and more than 12 million unique visitors per month. We’ve been using HAProxy since 2009. When we decided to build our own CDN solution in 2015, we knew we’d include HAProxy as a main component. In this talk, we will show you how HAProxy is integrated into our CDN infrastructure and how we use it daily to manage, update, configure, and troubleshoot our infrastructure.

HAProxyConf 2019 - Inspect, Control, Report: HAProxy as the SRE's Door Man by Daniel Schneller

CenterDevice offers secure document storage and sharing with OCR, full-text indexing and automatic versioning. Our SREs use HAProxy to gain insights into the usage of our services, diagnose issues, and throttle or reject requests based on HAProxy ACLs. In this talk, you will see how we generate HAProxy configuration files using templates. We will describe our custom log format and demonstrate how we integrate HAProxy data with Kibana.

Virtualizing a Network Operations Center

A Network Operations Center (NOC) is a location from which IT support technicians can supervise, monitor, and maintain client networks and infrastructure. Because they act as a central nervous system for many organizations, NOCs are typically located in a central physical location. The global coronavirus (COVID-19) pandemic is an unprecedented situation that is creating new challenges for everyone—and that includes NOCs.

4 Ways to align your Service Desk to business operations

As an IT leader, it’s important to step back, sometimes, and view what you can do better with your service desk. Because small issues and inefficiencies can easily add up to day-to-day chaos. In organizations where IT services are aligned with business objectives, they are more likely to make investments in new technologies like AI & ML. Periodic reviews will make sure that the alignment stays. Here we are going to look at some areas where putting efforts can yield significant result.

An Introduction to Web Proxies

Web proxies intercept traffic from your systems as they move to other systems, analyze the packets, then send the data along. There are a lot of reasons why you might want to intercept packets. Originally the main use case for a proxy was as a caching server. In this use case, the first time a person in your network goes to a website, the static content (particularly graphic images) gets downloaded and cached. Then, because the content is local, the next person to hit that site will get a fast response.