Operations | Monitoring | ITSM | DevOps | Cloud

Networks

The latest News and Information on IT Networks and related technologies.

Managing Remote Workers During COVID-19? 5 Key Tactics for IT Infrastructure Management

Google recently joined Facebook, Apple, Amazon, LinkedIn, Twitter and HPE in recommending its North American employees work from home to help slow down the spread of Coronavirus COVID-19. Workers can communicate in real-time on message systems like Slack and videoconferencing like Zoom. However, with >200k tech workers now at home needing robust and secure connection to the internet for these high bandwidth collaboration tools, the virus is not the only thing these workers are slowing down.

11 ITIL Service Desk Best Practices to Supercharge your Service Delivery

A service desk is the nerve center for all activities related to IT service delivery. It’s at the forefront of all interactions an organization has with its requesters. Implementing a service desk involves processes, workflows, and domain knowledge. That’s why most people stick to a framework when setting up a service desk. Learn more about the most popular ITSM framework. A service desk comes with numerous challenges that can be overcome if you are aware of the best practices.

Prevent security issues when monitoring with SNMP family of protocols

Simple Network Management Protocols, SNMP, refers to protocols family used to probe and control various network devices. It includes three protocol versions (v1, v2c, v3), all of those supported by IPHost Network Monitor. SNMP is a popular means of watching network devices of any kind (nowadays literally every device with an IP address can support SNMP); however, there are typical problems users can encounter when using SNMP-enabled devices in local or global network.

HAProxyConf 2019 - Hyperscaling Self-Service Infrastructure with William Dauchy & Pierre Cheynier

At Criteo, we work at the cutting edge of commerce marketing, using Machine Learning and Artificial Intelligence to help our customers grow their businesses through hyper-relevant advertising. We run tens of thousands of servers, host containers that continuously move across data centers, and scale services through our managed APIs, with HAProxy playing a critical role across our fast-paced, event-driven infrastructure. This presentation will describe our journey to achieve load balancing served via a user-centric API in such a large and complex environment. We will share tricks and design considerations that helped us to go from a user intent expressed through an API to a scalable service running globally.

HAProxyConf 2019 - Processing Billions of Web Reqs Per Day by Oren Alexandroni & Wally Barnes III

DoubleVerify authenticates the quality of digital media for the world’s largest brands. We use HAProxy to accomplish our goals of processing billions of requests daily, increasing and decreasing load balancer pools without affecting customers, and avoiding downtime during upgrades and maintenance periods. We will share our criteria we used when we set out to move from hardware to software load balancers, how we arrived at the decision to use HAProxy, and the results we’ve seen before and afterwards.

HAProxyConf 2019 - HAProxy Load Balancing at Vimeo by Andrew Rodland

Vimeo uses HAProxy throughout the business, where it’s an integral part of delivering over a petabyte of video per day to millions of viewers. In this presentation, you will learn how we use and monitor HAProxy; You’ll learn about the Bounded-Load Consistent Hashing algorithm that Vimeo contributed to HAProxy 1.7 and other improvements in HAProxy 1.8, 1.9, and 2.0 that have improved our performance and simplified administration.

HAProxyConf 2019 - How HAProxy Helped Me Get "Near Perfect" Uptime by Eric Martinson

PlaceWise Digital is the leading provider of digital services to the shopping center industry, delivering over 200 million digital engagements annually to over 800 shopping center clients throughout North America. In the US alone, the company possesses a nearly 50% market share, yet our infrastructure team is just one: me. In this talk, I’m going to share my experiences using HAProxy to meet the demands of serving millions of visitors on Black Friday, dealing with applications that can’t be clustered, and other technical challenges that we faced and overcame to build a robust and scalable platform.

Integrating Palo Alto with Logz.io's Cloud SIEM

First things first, why would you want to collect logs from Palo Alto and send them to a Cloud SIEM? There are many reasons. At its core, having a centralized location with a consistent user experience for managing alerts, notifications, and information coming from the technologies securing your environment can provide value in a lot of ways. In this blog, we’ll discuss how to collect, parse, and analyze Palo Alto logs in Logz.io Cloud SIEM, and how it can help secure your cloud workloads.

Intrusion detection techniques: monitor and react to unusual activity

Security monitoring is a constantly changing area; the threats can appear at any moment; when there are so called 0-day threats, there are quite few techniques available to efficiently prevent an unknown yet type of problem. However, there are typical behavior patterns that can be detected using well-known pieces of software and monitor types. Most techniques mentioned below are related to Unix-like systems; however, exactly the same approaches can be used for every operating system.

Why would Modern Businesses need Event Correlation?

Network management is undoubtedly crucial as there is a constant need to pin-point as well as fix the issues quickly whether it’s on premise or on cloud. The more complex and distributed a network becomes, the more alarms or alerts the system generates. Just knowing that something has gone wrong in your network is not enough, you should know the details like why it happened, when it happened, where it started, and what triggered it.