article thumbnail

How Netflix uses eBPF flow logs at scale for network insight

Netflix Tech

By Alok Tiagi , Hariharan Ananthakrishnan , Ivan Porto Carrero and Keerti Lakshminarayan Netflix has developed a network observability sidecar called Flow Exporter that uses eBPF tracepoints to capture TCP flows at near real time. Without having network visibility, it’s difficult to improve our reliability, security and capacity posture.

Network 130
article thumbnail

Using Rust for Kentik’s New Synthetic Network Monitoring Agent

Kentik

We recently launched Kentik Synthetic Monitoring , a major new product feature that combines synthetic network testing with real-time traffic monitoring to provide thorough insight into network performance and reliability. It’s security and cross-compilation where Rust really shines for this specific application.

Network 125
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

To cope with stricter data regulation, enterprises should look to fully open APIs

TechCrunch

Jean-Paul Smets is the CEO of Rapid.Space , a hyper open cloud provider offering virtual private servers (VPS), content delivery networks (CDN) and global IPv6 (SDN). you’ll have to comply with different regulations that could ultimately prevent you from deploying your applications successfully. Jean-Paul Smets. Contributor.

article thumbnail

Transparent Security Outperforms Traditional DDoS Solution in Lab Trial

CableLabs

P4”-based) and uses in-band network telemetry (INT) technology for device identification and mitigation, blocking attack traffic where it originates on the operator’s network. These factors contribute to a trend of malicious traffic increasingly using upstream bandwidth on the access network.

IPv6 104
article thumbnail

Thinking About Glue

O'Reilly Media - Ideas

Object Relational Management (ORM) frameworks are a kind of glue between application software and databases. In networking, we have standards for what data means and how to send it. The fields in the header have been defined precisely, and new protocols have been built successfully at every layer of the network stack.

IPv6 145
article thumbnail

How Tenable Helps Federal Agencies Meet CISA’s Binding Operational Directive 23-01

Tenable

Accurate and up-to-date accounting of assets residing on federal networks is also critical for CISA to effectively manage cybersecurity for the Federal Civilian Executive Branch (FCEB) enterprise.". This directive applies to all IP-addressable networked assets that can be reached over IPv4 and IPv6 protocols. New requirements.

IPv6 53
article thumbnail

Can VPC Lattice replace AWS Transit Gateway?

Xebia

Transit VPCs are a specific hub-and-spoke network topology that attempts to make VPC peering more scalable. However, this requires a self-managed network router in the Transit VPC and you need to take great care to avoid overlapping CIDR ranges across VPCs. At the highest level, VPC Lattice distinguishes Services and Service Networks.

AWS 130