Blog
Network Insight.
- Premium Consultancy, Ebooks, Videos and Elearning
Cisco ACI | ACI Infrastructure
Cisco ACI and ACI Network The goal of today’s data center topologies is policy-based automation of network management and operations functions that can live in both the virtual and physical worlds. With data center designs, we are moving to designs that distribute redundancy and performance via protocols to …
SASE Definition
SASE Definition The following post highlights the rise of SASE and provides a good SASE definition. Firstly, the SASE meaning is down to the environment that we are in. In a cloud-centric world, users and devices require access to services everywhere. The focal point has changed. Now it …
SD WAN Overlay
SD WAN Overlay The following post goes into the details of the SDWAN overlay. Firstly, digital transformation is changing businesses in every industry. Both network performance and agility are critical to the success of a digital transformation initiative. However, the WAN ( Wide Area Network ) has not …
SD WAN | SD WAN Tutorial
SD WAN Tutorial Firstly, in this SD WAN tutorial, we will address how SD-WAN incorporates a level of abstraction into WAN monitoring in virtual WANs: WAN virtualization. Now imagine these virtual WANs individually holding a single application running over the WAN but consider them end-to-end instead of being …
Zero Trust Network Design
Zero Trust Network Design The drive for a Zero Trust Networking and Software Defined Perimeter is again gaining momentum. The bad actors are getting increasingly sophisticated, resulting in a pervasive sense of unease in traditional networking and security methods. So why are our network infrastructure and applications open …
Ansible Variables | Ansible Automation
Ansible Variables For your automation journey, you want to be as flexible as possible. For this reason, within the Ansible architecture, we have a process known as decoupling. Here we are separating site-specific code from static code. Anything specific to a server or managed device, such as an …
Ansible Architecture | Ansible Automation
Ansible Architecture The following post discusses the Ansible architecture and Ansible deployment architecture and provides an Ansible architecture diagram. As a best practice, you don’t want your Ansible architecture that consists of playbooks and Inventory to be too specific. But on the other hand, you need to have …
OpenShift SDN
OpenShift SDN When considering OpenShift and how OpenShift networking SDN works, you need to fully understand how application exposure works and how to expose yourself to the external world for external clients to access your internal application. For most use cases, the applications running in Kubernetes ( see …
Chaos Engineering Kubernetes
Chaos Engineering Kubernetes When considering Chaos Engineering kubernetes, we must start from the beginning. Not too long ago, applications ran in single private data centers, potentially two data centers for high availability. These data centers were on-premises, and all components were housed internally. Life was easy, and troubleshooting …
Docker Container Security: Building a Sandbox
Docker Container Security The building blocks for Docker security options, to implement Docker security best practices such as the Kernel primitives, have been around for a long time, so they are not all new when considering their security. However, the container itself is not a kernel construct; it …
Prometheus Metric Types
Prometheus Metric Types For Prometheus metric types, we want as many metrics as possible. These need to be stored to follow trends, understand what has been happening from a historical view, and better predict any issues. So, there are several parts to a Prometheus monitoring solution in microservices …
Prometheus Monitoring: The Pull Approach
Prometheus Monitoring In this post, I would like to discuss Prometheus monitoring and its pull-based approach ( Prometheus Pull ) to the metric collection and the Prometheus metric types. First, let us roll back in time before we had Prometheus network monitoring, say ten years, and look at …