28 posts categorized "Cloud Computing" Feed

Troubleshooting a Cloud Problem with Wireshark (by Paul Offord)

The slowly growing interest in Cloud Computing that started ten or so years ago is turning into a stampede.  Most of our customers at Advance7 have strategic plans to migrate many systems to a cloud platform, and many have already started the journey.

Cloud application topology

In fact, we too have migrated all of our systems into AWS and Azure, containerising many of them in the process. But here's a concern we shared with our customers:

"Will we have enough visibility to troubleshoot performance and stability problems once we have migrated our systems?"

It's a good question.  We don't want to discover that the whole environment is opaque, just when we need to troubleshoot a serious problem.  We satisfied ourselves that we could get the data we needed to maintain our systems.  We found that we could get a lot of information from the Application Load Balancers, and we configured continuous packet captures to record traffic between the tiers of our systems.  Just as well as a couple of months ago we hit a performance problem with the TribeLab Community website.

I managed to record the actions of our Performance & Stability Engineers as they used AWS CloudWatch and Wireshark to investigate the problem.  I pulled together screenshots, video clips and other information to produce a short video case study …

Continue reading "Troubleshooting a Cloud Problem with Wireshark (by Paul Offord)" »


Cloud Networking – Once More Into The Breach (by Keith Bromley)

Cloud Networking – Once More Into The Breach

Anyone who has been in networking for several years has seen an exorbitant amount of change. Initially, businesses had physical (racks and chassis) network and switching equipment that resided on their physical premises. This was their corporate network consisting of routers, switches, servers, etc. The simple network concept expanded to include wide area networking, international and distributed offices, and then extensive security measures including IPS, IDS, DLP, WAF, etc.

The concept took a quantum leap as we went through a “virtualization” mania a few years ago. Everything needed to be moved to virtualized servers located in the virtual data center. Now we are on the precipice of another quantum leap, the use of cloud networking, where a significant majority of capabilities are being moved to either public or private cloud networks.

Scary

Whether you are a proponent of this move to the cloud or not, there are some things to consider if, and when, you decide to take the plunge. While there has been a lot of hype around the benefits of cloud computing, very little is being said about the inherent drawbacks.

Continue reading "Cloud Networking – Once More Into The Breach (by Keith Bromley)" »


Fixing TCP Performance Issues Impacting SaaS and Cloud Applications (by Will Moonen)

In my day-to-day practice as a TCP relationship therapist for cloud services, applications, and networks, more often than not, the not-so healthy beginnings and endings of TCP relationships have a significant impact on the user experience. When TCP doesn’t work efficiently, SaaS and cloud application performance rapidly degrades  – this class of applications, in particular, are highly dependent on consistent, efficient network performance.

So, how can you tell if these critical relationships are healthy? And if not, where do you start fixing things? To what extent is the integrity of your data impacted?

Especially in today’s end-to-end encrypted, turbo-charged, hybrid environments, it’s many times like looking for a needle in a haystack!

There is hope. After hundreds of troubleshooting sessions with the dozens of enterprises I work with, I’ve found that there is a well defined process that helps you isolate SaaS and Cloud application performance issues using TCP analysis. This means looking into the details of each session, to determine where to start.

The way TCP sessions set up and tear down directly impacts SaaS and Cloud performance, and the user experience, especially if there are reasons to believe that hosts are overloaded and messages are dropped. A persistent increase in the number of TCP zero window (0-Win) events and duplicate acknowledgements (DupAck) are typically good indicators that end-users are suffering from degraded performance.

 

Continue reading "Fixing TCP Performance Issues Impacting SaaS and Cloud Applications (by Will Moonen)" »


IoT: Tesla Model S Remote Control (by Jonathan Whiteside, Darrin Roach and Paul Offord)

With the proliferation and expansion of wireless technologies, it is now becoming commonplace for vehicles to be connected to the Internet for numerous reasons, such as website access, telematics and always connected emergency services.

Tesla Motors is very much at the forefront of the ‘Connected Vehicle’ revolution, producing vehicles with ‘always on’ connectivity through 4G LTE and WiFi.  This gives the driver features such as Google Maps navigation, web access and Spotify.

Tesla_control

It also allows remote operation features such as climate control and charge port opening/closing, as well as providing an instant view of battery charge levels.  All these features can be readily accessed from a mobile phone app or desktop app on a PC.

The objective of this experiment was ...

Continue reading "IoT: Tesla Model S Remote Control (by Jonathan Whiteside, Darrin Roach and Paul Offord)" »


LMTV LIVE | Steve Brown and Warren Caron of Viavi Solutions


Viavi_Color_RGB

This week we will speak with Steve Brown and Warren Caron of Viavi Solutions, who are their Director of Solutions Marketing and Solutions Engineer, respectively.

With network teams increasingly involved in all aspects of security from threat prevention to breach investigation and remediation, understanding how to be proactive is critical. In this week's LMTV LIVE, we’ll discuss how network pros can more effectively work with security teams on threat prevention, investigations, and cleanup efforts.

  • Proactively ID anomalous network behavior
  • Recognize malware, ransomware, and DDoS
  • Assess damage post-attack
  • Reconstruct or playback breaches
  • Ensure successful remediation
  • Overcoming key visibility and intelligence issues
  • Strategies to ensure security events are fully captured