Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

Navigating Security in a Global Organization

Playing 4D Chess: The Modern IT Story Knight to E-4. Security professionals consistently make moves to fend off attackers. Unlike chess, it takes a team effort to keep up against modern cybersecurity threats and implement changes company-wide. Two pros take you through a day in the life of the security team. Hear practical use cases to help you and your organization improve your security stance. Check and mate.

Announcing HAProxy Kubernetes Ingress Controller 3.0

HAProxy Kubernetes Ingress Controller 3.0 is now available. For our enterprise customers, HAProxy Enterprise Kubernetes Ingress Controller 3.0 will arrive later this year and incorporate these same features. In this release, we've added TCP custom resource definitions (CRDs) to improve mapping, structuring, and validation for TCP services within HAProxy Kubernetes Ingress Controller. Say goodbye to messy service list management and "hello" to greater flexibility with HAProxy options for your K8s services.

Automate Your Network Deployments With The New Megaport Terraform Provider

For cloud architects and network engineers, Terraform needs no introduction. Long acclaimed as a leader in the Infrastructure as Code (IaC) space, this tool is often used over vendors’ own automation tools, which tend to be an afterthought for most cloud services. For those with IaC skills, the rewards of using Terraform are plentiful. Users can provision and manage their cloud infrastructure with full customisation and rapid automation.

Kubernetes network policies: 4 pain points and how to address them

Kubernetes is used everywhere, from test environments to the most critical production foundations that we use daily, making it undoubtedly a de facto in cloud computing. While this is great news for everyone who works with, administers, and expands Kubernetes, the downside is that it makes Kubernetes a favorable target for malicious actors. Malicious actors typically exploit flaws in the system to gain access to a portion of the environment.

IP Addresses: Explained

From your home computer to the sprawling servers of the Internet, every device relies on an IP address for communication. Understanding IP addresses isn’t just for tech enthusiasts – it’s essential knowledge in our ever-growing, interconnected world. Join us as we explain what an IP address is, how it works, the different types available, and why it’s a crucial component of life on the Internet.

Internet Measurement and Connectivity with Doug Madory

Hosted by Phil Gervasi, this LinkedIn Live session explores the importance of understanding global Internet connectivity, the tools and methodologies used for measurement, and the real-world implications of these insights. In this in-depth discussion with Doug Madory, Director of Internet Analysis at Kentik, we explore the fascinating world of Internet measurement.

AI Meets Network Monitoring: Now What?

Join Dave Rubinstein, Editor-in-Chief of ITOps Times, as he hosts an enlightening discussion with Kentik's Leon Adato and Charlcye Mitchell on the convergence of AI and network monitoring. This webinar explores both the potential and limitations of AI in networking, providing a deep dive into how AI can add value and where it might be overhyped.

Ensure Full Stack Observability of Symantec SiteMinder with DX Application Performance Management

When an application breaks and we hear things like, “My login is not working,” or “The web app is slow,'' more often than not SiteMinderTM seems to be in the line of fire. However, in my experience, it has usually been a third-party or other configured item like firewall rules that have turned out to be the culprit. Now I am not saying that it is never SiteMinder. Potentially the issue could be anywhere, but I guess the bigger question here is how do we prove it one way or the other?