Networks

iphost

Using alternate PING utilities to test your network

Low latency networks are the ideal media; in typical intranet all the hosts can be reached in a few milliseconds. Monitoring tools, starting from typical default ping utility (the one that sends ICMP Echo packets and waits for response), are consistent in their results if typical response is above 10-15 milliseconds. When response time drops significantly and is circa 1ms or even less, the results may begin to vary considerably.

sumologic

Comparing CDN Providers: Fastly vs. Cloudflare vs. Akamai

Content Delivery Networks, or CDNs, provide ultra-fast global connectivity, traffic protection, and a better user experience. They help connect subscribers who may be geographically far from one another to content in a timely manner. In order to stay competitive, most organizations use CDNs to deliver content to their customers.

auvik

Special IP Address Ranges and When to Use Them

By even casual observation, you’ll likely have noticed that there are several IP address ranges that are special, including: Anybody can use these “private” ranges for anything they like. But there are actually several other special ranges that have other special purposes. In this article, I’ll explain what they are and the purpose they serve. This is the “loopback” range. These are addresses that are assumed to be on the same device that’s sending the packet.

Monitoring virtualization platforms and networks

Small and large businesses alike, opt for virtualization to optimize resource management. While you have a whole list options such as VMware, Hyper-V and Nutanix, monitoring them for their availability is just as important. Watch this webinar and learn how monitoring virtualization platforms and the underlying network infrastructure works to your benefit.
motadata

6 Network Monitoring Best Practices that Every IT Team Should Focus On

The network monitoring teams can now tap into Internet-of-Things, software-level network, and cloud-based services to ensure maximum uptime and optimal network performance. However, adapting to these technologies would mean defining new practices for legacy architecture integration, reengineering the monitoring workflow, and evaluating the toolkit for enhancing comprehensive and layered network management.

splunk

Splunking Azure: NSG Flow Logs

Azure Network Security Groups (NSG) are used to filter network traffic to and from resources in an Azure Virtual Network. If you’re coming from AWS-land, NSG’s combine Security Groups and NACL’s. Splunking NSG flow log data will give you access to detailed telemetry and analytics around network activity to & from your NSG's. If that doesn’t sound appealing to you yet, here are some of the many things you could Splunk with your network traffic logs from Azure.

alcide

Insecure by Default - Kubernetes Networking

Traditional network security includes protection against layer2 and layer3 spoofing attacks. Many security teams don’t realize it, but these threats are still relevant when running applications on a Kubernetes cluster in the cloud. You might be using a complex container network, but that doesn’t mean that simple spoofing attacks between pods aren’t possible. This matters because it dramatically increases the blast radius of compromised pods.