The latest News and Information on IT Networks and related technologies.
In his HAProxyConf 2019 presentation, William Lallemand (Senior HAProxy Developer) shows how process management in HAProxy has evolved since the beginning of the project; With the advent of systemd, new techniques had to be developed so that users could reload HAProxy safely. The Master-Worker mode simplifies the management of HAProxy processes and introduces interesting features.
Ever since the work from home (WFH) and study from home (SFH) initiatives became widespread due to the outbreak of COVID-19, there has been a huge effort among organizations to either set up new broadband connections or upgrade existing connections with higher bandwidth speeds. No matter the number of command centers an internet service provider (ISP) might have, keeping up with users’ demands—whether it’s about network speed or volume—can be a colossal undertaking.
With a majority of the workforce now adopting a work-from-home routine, maintaining the normal functioning of your network and ensuring compliance with industry standards is not an easy job. When employees are working remotely, it is especially crucial to ensure network compliance with industry standards and internal policies to secure your network from cybersecurity breaches.
Version 2.0 of the HAProxy Data Plane API brings some exciting enhancements that unlock the power of HAProxy’s flexible configuration and its runtime capabilities. The HAProxy Data Plane API, which lets you manage your HAProxy configuration dynamically using HTTP RESTful commands, has marked a major milestone with the release of version 2.0. This release emphasizes the runtime aspects of HAProxy, giving you the ability to manage map files, stick tables, peers, DNS resolvers and more.
Is it possible for network engineers to gain complete visibility over all the components in an enterprise network? With new devices constantly connecting and disconnecting, creating a mental image of the entire network is impossible. This is where network mapping comes in. Using Simple Network Management Protocol (SNMP), you can see a visual representation of your network and every connected device for an easy-to-understand look at your dynamic network.
In the new normal, if your business has chosen remote operations, this might attract malicious actors. Hackers prey on the remote workforce whose vulnerability has increased in multifold ways. While infrastructural concerns, such as working outside the corporate IT network and using home Wi-Fi are inevitable, other issues, including using personal devices and retaining privileges to access more than required business resources add to the magnitude of this vulnerability.