Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Make sure your Web servers support modern security protocols

To make sure no site content is modified or intercepted en route, HTTPS protocol is used (this is currently a must; using HTTP, insecure version, is strongly discouraged). Different versions of so called “transport security layer” protocol, known as TLS, can be used to provide the mentioned secure data exchange.

Amazon VPC Traffic Mirroring

The first means to collect security-relevant information at Cloud SIEM Enterprise (CSE) was our Network Sensor. It was built to analyze network traffic and provide visibility beyond traditional SIEM's down to the network-level. Beyond organizing packets into flows, the sensor supports more advanced features such as decoding of common protocols, file carving, SSL certificate validation, OS fingerprinting, clustered deployment and more.

What is network scanning? How to do it?

The work of an admin or network administrator may seem ordinary, that type of work that just follows a guide, but right now, you could not be further from truth. Here I bring you network scanning, a task that could take a lot of your time… or little, if you have Pandora FMS by your side and with the help of one of those free software applications included in GNU / Linux. Let’s take a look!

How Well Do You Know the Orion Platform? Tips, Tricks, and How-Tos - SolarWinds Lab Episode #85

How much do you really know about the Orion® Platform? Regardless of your level of expertise, even the most seasoned user will learn a thing or two in this episode. We'll go through dashboards, customizations, features, functions, you name it. Learn from SolarWinds® Orion Platform experts, ask them questions, and share your own pro tips during live chat and Q&A.

HAProxyConf 2019 - From 1.5 into the Future by Christian Platzer

At Willhaben, we run Austria’s largest classified advertising marketplace. We started using HAProxy due to our need to move to an all-HTTPS environment. Since then, we’ve leveraged HAProxy for geo-redundancy, HTTP/2, integration with Kubernetes, and blocking suspicious activity. In this talk, I will explain how we gradually shifted from basic HAProxy functionality to our current deployment, and will also describe where we encountered trouble in our production environment and how we overcame it. We are currently serving 5-6 gigabits per second of peak traffic via HAProxy, with about 20k requests per second.

HAProxyConf 2019 - Fully-Automated Deployment of Anycasted Load Balancers with HAProxy and Python

Keeping your service configuration aligned over hundreds of hosts is never a simple task. This talk will illustrate how the University of Paderborn automated the integration of HAProxy into our infrastructure. As our current generation of load balancer appliances approached the end of life and we thought about improving how we managed our services, our goal was clear: we needed a scalable, consistent, active-active setup of load balancers that could be easily automated with open-source tools. We achieve scalability with Anycast but needed to make sure the configurations could keep up with application changes.

Network Telemetry - An IT Executive's Guide

Telemetry is the collection of measurements or other data at remote or inaccessible points and their automatic transmission to receiving equipment for monitoring. In network telemetry, network devices such as routers, firewalls and switches push real-time data continuously to one or more centralized locations for storage, processing and analysis.

How Auvik Can Help Keep Networks Steady During the COVID-19 Pandemic

Your phone is ringing off the hook. Another client is calling, trying to figure out how to ensure their team can continue to be productive in the wake of the COVID-19 pandemic. Even though these are extraordinary times, your role as the IT professional hasn’t really changed. Your job is to make sure your clients are productive and they can still access the resources, tools, and applications they need to do their jobs.