Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Monitor and diagnose network performance issues with SNMP Traps

Monitoring your on-premise or hybrid infrastructure means keeping track of potentially thousands of devices, any one of which could be a point of failure. Additionally, silos between application and network teams can create visibility gaps that complicate troubleshooting. For network engineers investigating bottlenecks, being able to view real-time infrastructure health and performance data alongside application metrics is essential for ensuring their organizations meet key SLOs.

Outage in Egypt impacted AWS, GCP and Azure interregional connectivity

On Tuesday, June 7, internet users in numerous countries from East Africa to the Middle East to South Asia experienced an hours-long degradation in service due to an outage at one of the internet’s most critical chokepoints: Egypt. Beginning at approximately 12:25 UTC, multiple submarine cables connecting Europe and Asia experienced outages lasting over four hours. As I show below, the impacts were visible in various types of internet measurement data to the affected countries.

Custom Resources with HAProxy Kubernetes Ingress Controller

HAProxy Kubernetes Ingress Controller provides custom resources named Backend, Defaults, and Global that let you manage ingress controller settings more efficiently. To start using them right away, check the documentation for steps and examples. In this blog post, you’ll learn why custom resources are such a powerful feature and see tips for getting the most out of them.

Optimizing Images for Web Performance with NGINX

Images are a constant source of pain when developing websites. There are many formats and resolutions a developer must consider in order to maximize web performance. You’ll often end up with a cartesian explosion of the same image in different sizes and formats to support different scenarios. For example, you don’t want to send a high res image meant for high DPI screens to a low DPI screen - you’d be wasting bandwidth and burning time. Using the right file format is equally important.

Optimize Continuous Delivery of Micro-Services Applications with Continuous Performance Testing

I often hear from customers who complain about how “classic” performance testing (i.e., end-to-end testing with high volume of virtual users) of their applications before release slows down the cycle time by several weeks. In addition, the testing significantly consumes both people and infrastructure (hardware and software license) resources.

How to Test for Packet Loss: A Complete Guide

Among all the inconveniences endemic to living in the 21st century, there are few as common as a faulty internet connection. Most everyone with internet access is familiar with the experience but perhaps less so with the reason why. There are several, but chief among them is packet loss. In this article, we’ll explore what packet loss is and show you some of the first steps to conducting a packet loss test. But first, let’s briefly review what a packet is.

Find out how to check my ping and the best way to check ping speed

Many users are familiar with the concept of network ping. Especially those who like online games. If you are having connection problems, the most reliable way to check it is to use the "ping" command. But not everyone can answer what a ping really is. In simple words, it is a measure of the time it takes for a network request to get from user to server and back.

What is SCP Protocol? A Complete Guide

When transferring data between systems, it's extremely important to preserve integrity and confidentiality. There are protocols and procedures to do so. One of them is the Secure Copy Protocol (SCP); which is a method designed to securely pass on digital information. The SCP protocol helps transferring files from a local to a remote host or between two remote hosts.

IP Blacklisting: Your Beginner's Guide

IP Blacklists contain ranges of or individual IP addresses ‌you want to block. A blacklist can be used in combination with firewalls, intrusion prevention systems (IPS), and other traffic filtering tools. With the recent developments in cyber security, organizations are increasingly relying on IP blacklisting to protect their networks.

Anatomy of a Supply Chain Attack Detection and Response

In today's world of global supply chains, a breach never stops at a supplier level but cascades all the way up the chain. So being able to detect and stop a supply chain attack at an early stage before an attacker exfiltrates confidential company data or damages company operations and reputation is critical to your organization's survival. Luckily, hackers always leave a trace, so proper detection can help you stop breaches at an early stage before hackers achieve their goals.