Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

HAProxyConf 2019 - HAProxy Load Balancing at Vimeo by Andrew Rodland

Vimeo uses HAProxy throughout the business, where it’s an integral part of delivering over a petabyte of video per day to millions of viewers. In this presentation, you will learn how we use and monitor HAProxy; You’ll learn about the Bounded-Load Consistent Hashing algorithm that Vimeo contributed to HAProxy 1.7 and other improvements in HAProxy 1.8, 1.9, and 2.0 that have improved our performance and simplified administration.

HAProxyConf 2019 - How HAProxy Helped Me Get "Near Perfect" Uptime by Eric Martinson

PlaceWise Digital is the leading provider of digital services to the shopping center industry, delivering over 200 million digital engagements annually to over 800 shopping center clients throughout North America. In the US alone, the company possesses a nearly 50% market share, yet our infrastructure team is just one: me. In this talk, I’m going to share my experiences using HAProxy to meet the demands of serving millions of visitors on Black Friday, dealing with applications that can’t be clustered, and other technical challenges that we faced and overcame to build a robust and scalable platform.

Integrating Palo Alto with Logz.io's Cloud SIEM

First things first, why would you want to collect logs from Palo Alto and send them to a Cloud SIEM? There are many reasons. At its core, having a centralized location with a consistent user experience for managing alerts, notifications, and information coming from the technologies securing your environment can provide value in a lot of ways. In this blog, we’ll discuss how to collect, parse, and analyze Palo Alto logs in Logz.io Cloud SIEM, and how it can help secure your cloud workloads.

Why would Modern Businesses need Event Correlation?

Network management is undoubtedly crucial as there is a constant need to pin-point as well as fix the issues quickly whether it’s on premise or on cloud. The more complex and distributed a network becomes, the more alarms or alerts the system generates. Just knowing that something has gone wrong in your network is not enough, you should know the details like why it happened, when it happened, where it started, and what triggered it.

How to Stop the Use of Anonymizer Websites on Your Network With SolarWinds Security Event Manager

Your organization has internet use policies in place for multiple reasons: protecting your network against security breaches, keeping organizational costs down, and protecting your employees, end users, or customers. Anonymizer websites provide a workaround to these policies that can put your organization at risk. In this video we'll show you how to identify and stop the use of anonymizer websites on your network with SolarWinds Security Event Manager.

HAProxyConf 2019 - Building a Global PoP Network Using HAProxy by Luke Seelenbinder

This presentation will describe the challenges, benefits and overwhelming success of deploying a PoP network using HAProxy. You will learn how Stadia Maps uses HAProxy to increase and track performance, ensure reliability and uptime, and enforce authentication and authorization for our mapping services. Specific topics covered will be replacing active authentication with ACLs, using HAProxy’s syslog output to track usage and enforce quotas, using SRV records to route (and reroute) traffic, and the challenges encountered running an IP failover-based setup at scale.

Istio vs. Linkerd vs. Envoy: A Comparison of Service Meshes

In a previous article, we examined service meshes in detail. Briefly, a service mesh takes care of network functionality for the applications running on your platform. As Kubernetes has matured as a technology, service meshes have become a hot topic, with various products being developed to solve the challenges associated with areas like traffic management, security, and observability. This article will compare three service meshes.

How to Quickly Identify Suspicious Network Behavior With Intuitive Dashboards in SolarWinds SEM

Log and event data are a boundless and valuable resource for identifying suspicious network activity and stopping potential breaches. However, analyzing lines and lines of text-based data can make this resource more trouble than it's worth. In this video, we'll explore the different ways you can customize log data in an easy-to-understand and visual dashboard in Security Event Manager to help turn it into something you can act on.

7 Important Service Desk Metrics to Measure

Service desk or IT teams are critical to organisations for ensuring business continuity and service delivery. Hence, it becomes important for IT organizations to use a slew of metrics to measure how efficient their service desk is. With the recent advancement in IT Service Management (ITSM), the reporting capabilities offer multiple KPI metrics that can be measured and monitored. So, with the increase in service desk metrics, it becomes even more difficult to zero down on which metrics to measure.

Application Compatibility Issues Make OS Migration a Headache for 75% of IT Professionals

New findings released by SolarWinds, following a survey of just under 200 IT pros via its THWACK community platform, reveal that most IT professionals migrating OS due to Windows 7 EOL expect it to cause a myriad of problems.