The latest News and Information on IT Networks and related technologies.
We’ve released version 1.5 of the HAProxy Kubernetes Ingress Controller. This version unlocks access to the raw HAProxy configuration language for power users to gain more control. You can also enable mutual TLS authentication between the ingress controller and services, enforce Basic authentication, and return custom error pages to users.
The modern enterprise network is akin to the transcontinental railroad system in the United States in the early 20th century: it was far-reaching and commerce depended upon the reliability of the rail service connecting crucial goods with Americans in every town and city. Likewise, networks today are intrinsic to commerce (and daily life) yet they are entangled and multi-layered.
As a customer-focused company, which pays a lot of attention to its client’s needs and requests, while keeping pace with the market dynamics, VirtualMetric has always followed the approach of continuous product development. Our ongoing improvement process allows us to develop, test and release new features and product capabilities of your all-in-one monitoring software at short time intervals.
One thing that 2020 has clearly shown us is that communications services is a basic and fundamental driver of our global economy. During the COVID-19 pandemic, we realized that many tasks can be done at home, if access to communications services is sufficient. Many of us can work from home or other locations outside of the traditional office; students do not have to be physically present at school to participate in lectures; and we don’t need to go to movie theaters watch a new film release.
We are glad to introduce IPHost mobile app (currently available for Android 4.4 or newer). To start using Push notifications on your Android device(s), please upgrade your IPHost installation to v5.3 or later version. You would also need an Android mobile device running free IPHost mobile app. We have added a quick start reference for IPHost mobile app; it typically takes less than 5 minutes to install the app, connect it to the IPHost desktop installation and commence receiving Push notifications.
This article is a full tutorial on HAProxy monitoring and the best tools to get it done right. We will be looking into how to collect HAProxy metrics using a collectd daemon, push them into Graphite and visualize them in Grafana. To follow the steps in this blog, sign up for the MetricFire free trial, where you can use Graphite and Grafana directly in our platform.
Network security has changed a lot over the years, it had to. From wide open infrastructures to tightly controlled environments, the standard practices of network security have grown more and more sophisticated. This post will take us back in time to look at the journey that a typical network has been on over the past 15+ years. From a wide open, “chewy” network, all the way to zero trust networking. Let’s get started.