The latest News and Information on IT Networks and related technologies.
In our previous blog post, Using HAProxy as an API Gateway, Part 2 [Authentication], you learned that when you operate HAProxy as an API gateway, you can restrict access to your APIs to only clients that present a valid OAuth 2 access token. In this post, we take it a step further. You will learn how to leverage tokens to grant some users more access than others and then charge for the service.
With many of us now relying on video calls as a main form of communication, many different applications are growing in popularity, including Amazon Chime. To ensure you always have the best video and call quality during meetings, we’re teaching you how to monitor Amazon Chime network performance.
Do you know who interacts with whom, when, and for how long and how frequently in your network? Network administrators must have clear visibility of bandwidth utilization using a robust bandwidth monitoring tool, to find out slow loading yet crucial connections, to plan out the capacity of network properly or to control the Quality of Service.
The hybrid workforce is here to stay. With that in mind, you should start putting more robust cybersecurity controls in place to mitigate risk. Virtual private networks (VPNs) help secure data, but they are also challenging to bring into your log monitoring and management strategy. VPN and firewall log management gives real-time visibility into security risks. Many VPN and firewall log monitoring problems are similar to log management in general.