This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Networkers running enterprise and critical service provider infrastructure need infrastructure-savvy analogs of the same observability principles and practices being deployed by DevOps groups. The critical context that enables teams to ask questions about users, applications, and customers (and not just IP addresses and ports).
This is how Google is able to manage millions of servers running billions of containers each day, and how cloud-native companies have constructed their applications on top of new infrastructure underpinned by Kubernetes. These DevOps tools can typically manage multiple types of infrastructure.
Kentik offers a cloud-friendly NPM solution that includes the mature and proven nProbe NPM agent from ntop that can be installed on application and load balancing servers. Because cloud infrastructure doesn’t have traditional switches with tap ports for you attach traditional probes.
One way we do this is by enriching flow records with data from threat intelligence feeds, identifying threats such as botnet command and control servers, malware distribution points, phishing websites, and spam sources. Well, if you see SSH connections over port 22 still happening, it is worth investigating.
We also looked at this traffic by destination port and saw that in addition to the spikes on port 14999 (aggregation service) we saw a dip on 20012 (ingest) which is a service running on the same node. High number of source IPs talking to a proxy server. High number of source IPs talking to an internal IP.
In those settings, you might drop NPM appliances into major data centers, perhaps directly connected to router or switch span ports, or via a tap or packet broker from the likes of a Gigamon or Ixia. Kentik’s server-side NPM instrumentation goes wherever the servers go, in the data center or in the cloud. routers and switches).
As a 20-year networking professional based in Vancouver, Canada, Andree says he’s always had one foot in what is now called DevOps and another in networking. The two discuss Andree’s career and some of the current projects he’s working on.
This is happening at the same time that SRE and DevOps teams are actually speeding up and enjoying the agility of the cloud. And it’s not like the network teams had to worry about fixing failed line cards or erroring ports. In short, running cloud networks is slowing network teams down. But those days are gone. Adapt or die.
7 Key Facts About the State of Cloud Security (Sponsored) To better understand the vulnerabilities and threats facing modern DevOps organizations, Datadog analyzed security posture data from a sample of thousands of organizations that use AWS, Azure, or Google Cloud. The domain name and port, separated by a period (.)
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content