Blog
Network Insight.

Reverse Route Injection

Zero Trust SASE

    Zero Trust SASE Today’s digital transformation and strategy initiatives create a need for speed and agility in I.T. However, there is a lag, and that lag is with security. Security can either hold them back or not align with the fluidity needed for agility. As a result, we …

routing protocols

Microservices Observability

    Microservices Observability Teams increasingly adopt new technologies as companies transform and modernize applications to leverage container- and microservices development. IT infrastructure monitoring has always been difficult to do well but is even more challenging with the changing software architecture and the new technology needed to support it. In …

Cisco ACI

    Cisco ACI and ACI Network The goal of today’s data center topologies is policy-based automation of network management and operations functions that can live in both the virtual and physical worlds. With data center designs, we are moving to designs that distribute redundancy and performance via protocols to …

data center design

SASE Definition

    SASE Definition SASE meaning is down to the environment that we are in. Now, in a cloud-centric world, users and devices require access to services everywhere. The focal point has changed. Now it is the identity of the user and device as opposed to the traditional model that …

wan monitoring

SD WAN Overlay

    SD WAN Overlay Digital transformation is changing businesses in every industry. Both network performance and agility are key to the success of a digital transformation initiative. However, the WAN ( Wide Area Network ) has not enjoyed much innovation over the last decade compared to other parts of …

SD-WAN topology

SD WAN | SD WAN Tutorial

    SD WAN Tutorial Firstly, in this SD WAN tutorial, we will address how SD-WAN incorporates a level of abstraction into WAN monitoring in the form of virtual WANs: WAN virtualization. Now imagine these virtual WANs individually holding a single application running over the WAN but instead of being …

micro segmentation technology

Zero Trust Network Design

    Zero Trust Network Design The drive for a Zero Trust Networking and Software Defined Perimeter is again gaining momentum. The bad actors are getting increasingly sophisticated, resulting in a pervasive sense of unease in traditional networking and security methods. So why are our network infrastructure and applications open …

Ansible Variables

    Ansible Variables For your automation journey, you want to be as flexible as possible. For this reason, within the Ansible architecture, we have a process known as decoupling. Here we are separating site-specific code from static code. Anything specific to a server or any type of managed device, …

Ansible Architecture Diagram

    Ansible Architecture As a best practice, you don’t want your Ansible architecture that consists of playbooks and Inventory to be too specific. But, on the other hand, you need to have a certain level of abstraction and keep out very specific information. Therefore, to develop flexible code, you …

OpenShift Networking Deep Dive

OpenShift SDN

    OpenShift SDN When considering OpenShift and how OpenShift networking SDN works, you need to fully understand how application exposure works and the different ways you can expose yourself to the external world for external clients to access your internal application. For most use cases, the applications running in …

Chaos Engineering

    Chaos Engineering Kubernetes When considering Chaos Engineering kubernetes, we must start from the beginning. It was not too long ago that applications were running in single private data centers, potentially two data centers for high availability. These data centers were on-premises and all components were housed internally. Life …

docker container security

    Docker Container Security The building blocks for Docker Security Options, to implement Docker security best practices such as the Kernel primitives, have been around for a long time, so they are not all new when considering their security. However, the container itself is not a kernel construct; it …