Networks

datadog

Monitor Carbon Black Defense logs with Datadog

Creating security policies for the devices connected to your network is critical to ensuring that company data is safe. This is especially true as companies adopt a bring-your-own-device model and allow more personal phones, tablets, and laptops to connect to internal services. These devices, or endpoints, introduce unique vulnerabilities that can expose sensitive data if they are not monitored.

sumologic

Service Mesh Comparison: Istio vs. Linkerd

As service architectures have transitioned from the monolith to microservices, one of the tougher problems that organizations have had to solve is service discovery and load balancing. The advent of service mesh technologies seeks to solve these and other problems exacerbated by the number of hosts that has grown exponentially. In this article, we’re going to explore what a service mesh is.

site24x7

Complement your network monitoring with SNMP traps

Network device monitoring with Simple Network Management Protocol (SNMP) gives you complete visibility into the health and availability of your network devices. Monitoring tools conduct periodic checks to gather device status and performance metrics. The device's status is updated only when a check is initiated by the monitoring system in the defined time interval. Any fault that happens in between polls is only captured when the next check is initiated.

upguard

What is an SMB Port + Ports 445 and 139 Explained

The Server Message Block Protocol (SMB Protocol) is a client-server communication protocol used for sharing access to files, printers, serial ports, and data on a network. It can also carry transaction protocols for authenticated inter-process communication. In short, the SMB protocol is a way for computers to talk to each other. SMB works through a client-server approach, where a client makes specific requests and the server responds accordingly. This is known as a response-request protocol.

auvik

How to Configure Syslog on a Cisco Device

In my previous article, I explained what syslog is and why it’s used. In this article, I’m digging into how to configure syslog on network devices. The explanations and examples will be a bit Cisco specific, mainly because that’s the gear I’m most familiar with. Essentially every modern network device has at least some syslog capabilities, though.

stackrox

What's New in Istio 1.6? New Features and Capabilities

The Istio service mesh continues its quarterly release cadence with version 1.6. After major changes in release 1.5 to the control plane architecture, notably moving from a set of microservices to a monolithic Istiod service, and the introduction of a new, unified model for extending Istio and its Envoy proxies using WebAssembly, Istio 1.6 may seem tame in comparison, but it still offers a large number of smaller enhancements with a focus on operability. We will look at several of the highlights.

KMC - Running a Multi-Cluster Service Mesh in Rancher

If you are or your organization is running Kubernetes, then it's likely that you are running more than one cluster. This model works well for most, but starts to break down when microservices and service mesh enter the discussion. However, with some additional configuration and tooling , a multicluster mesh can take advantage of distributed Kubernetes environments and the services therein. In this Master Class, recorded on June 20, 2020, Rancher Field Engineer Jason Skrzypek discusses and demos a multi-cluster service mesh running Istio.
appdynamics

Our Plans with ThousandEyes: Expanding Monitoring Across the Public Internet for All Applications at the Heart of Today's Digital Businesses

Last week, Cisco announced its intent to acquire ThousandEyes, Inc., marking a major milestone as we build toward our vision to provide a Central Nervous System (CNS) for IT. Learn more about what that means for your business.

tigera

Everything You Need to Know about Kubernetes Services Networking in Your Rancher Cluster

As a leading, open-source multi-cluster orchestration platform, Rancher lets operations teams deploy, manage and secure enterprise Kubernetes. Rancher also gives users a set of CNI options to choose from, including open-source Project Calico.