Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on IT Networks and related technologies.

HAProxyConf 2019 - From 1.5 into the Future by Christian Platzer

At Willhaben, we run Austria’s largest classified advertising marketplace. We started using HAProxy due to our need to move to an all-HTTPS environment. Since then, we’ve leveraged HAProxy for geo-redundancy, HTTP/2, integration with Kubernetes, and blocking suspicious activity. In this talk, I will explain how we gradually shifted from basic HAProxy functionality to our current deployment, and will also describe where we encountered trouble in our production environment and how we overcame it. We are currently serving 5-6 gigabits per second of peak traffic via HAProxy, with about 20k requests per second.

11 ITIL Service Desk Best Practices to Supercharge your Service Delivery

A service desk is the nerve center for all activities related to IT service delivery. It’s at the forefront of all interactions an organization has with its requesters. Implementing a service desk involves processes, workflows, and domain knowledge. That’s why most people stick to a framework when setting up a service desk. Learn more about the most popular ITSM framework. A service desk comes with numerous challenges that can be overcome if you are aware of the best practices.

HAProxyConf 2019 - Hyperscaling Self-Service Infrastructure with William Dauchy & Pierre Cheynier

At Criteo, we work at the cutting edge of commerce marketing, using Machine Learning and Artificial Intelligence to help our customers grow their businesses through hyper-relevant advertising. We run tens of thousands of servers, host containers that continuously move across data centers, and scale services through our managed APIs, with HAProxy playing a critical role across our fast-paced, event-driven infrastructure. This presentation will describe our journey to achieve load balancing served via a user-centric API in such a large and complex environment. We will share tricks and design considerations that helped us to go from a user intent expressed through an API to a scalable service running globally.

HAProxyConf 2019 - Processing Billions of Web Reqs Per Day by Oren Alexandroni & Wally Barnes III

DoubleVerify authenticates the quality of digital media for the world’s largest brands. We use HAProxy to accomplish our goals of processing billions of requests daily, increasing and decreasing load balancer pools without affecting customers, and avoiding downtime during upgrades and maintenance periods. We will share our criteria we used when we set out to move from hardware to software load balancers, how we arrived at the decision to use HAProxy, and the results we’ve seen before and afterwards.

HAProxyConf 2019 - HAProxy Load Balancing at Vimeo by Andrew Rodland

Vimeo uses HAProxy throughout the business, where it’s an integral part of delivering over a petabyte of video per day to millions of viewers. In this presentation, you will learn how we use and monitor HAProxy; You’ll learn about the Bounded-Load Consistent Hashing algorithm that Vimeo contributed to HAProxy 1.7 and other improvements in HAProxy 1.8, 1.9, and 2.0 that have improved our performance and simplified administration.

HAProxyConf 2019 - How HAProxy Helped Me Get "Near Perfect" Uptime by Eric Martinson

PlaceWise Digital is the leading provider of digital services to the shopping center industry, delivering over 200 million digital engagements annually to over 800 shopping center clients throughout North America. In the US alone, the company possesses a nearly 50% market share, yet our infrastructure team is just one: me. In this talk, I’m going to share my experiences using HAProxy to meet the demands of serving millions of visitors on Black Friday, dealing with applications that can’t be clustered, and other technical challenges that we faced and overcame to build a robust and scalable platform.

Integrating Palo Alto with Logz.io's Cloud SIEM

First things first, why would you want to collect logs from Palo Alto and send them to a Cloud SIEM? There are many reasons. At its core, having a centralized location with a consistent user experience for managing alerts, notifications, and information coming from the technologies securing your environment can provide value in a lot of ways. In this blog, we’ll discuss how to collect, parse, and analyze Palo Alto logs in Logz.io Cloud SIEM, and how it can help secure your cloud workloads.

Why would Modern Businesses need Event Correlation?

Network management is undoubtedly crucial as there is a constant need to pin-point as well as fix the issues quickly whether it’s on premise or on cloud. The more complex and distributed a network becomes, the more alarms or alerts the system generates. Just knowing that something has gone wrong in your network is not enough, you should know the details like why it happened, when it happened, where it started, and what triggered it.

How to Stop the Use of Anonymizer Websites on Your Network With SolarWinds Security Event Manager

Your organization has internet use policies in place for multiple reasons: protecting your network against security breaches, keeping organizational costs down, and protecting your employees, end users, or customers. Anonymizer websites provide a workaround to these policies that can put your organization at risk. In this video we'll show you how to identify and stop the use of anonymizer websites on your network with SolarWinds Security Event Manager.