Processing...
All posts tagged with: "Peering"

Best Practices to Combat Route Leaks and Hijacks

Posted by on January 26th, 2017
January 26th, 2017

In past blogs, we’ve explored how you can alert for and diagnose BGP route leaks and hijacks. Route leaks and hijacks—routing events where illegitimate prefixes are wrongly propagated through the Internet—are notoriously difficult to troubleshoot and have the potential to bring down entire swaths of the Internet.… Read More »

Comprehensive Alerting for Route Leaks and Hijackings

Posted by on September 20th, 2016
September 20th, 2016

In past blogs, we’ve explored a specific BGP issue that can have far-reaching, large-scale impacts on networks across the Internet: route leaks and hijackings. In this post, we’ll discuss alerting for leaks and hijacks, which is the first step in the process of detecting, diagnosing and ultimately mitigating these notoriously difficult-to-troubleshoot events.… Read More »

Finding and Diagnosing BGP Route Leaks

Posted by on April 1st, 2015
November 10th, 2017

There have been a number of high profile routing leaks in the past few weeks. So today we’re going to review several of these leaks in detail to understand how the work, how you can detect them and how you can determine their severity. Our examples cover the Google / Hathway route leak and the Enzu route leak, both in March 2015.… Read More »

Proactive BGP Alerting

Posted by on November 4th, 2014
March 18th, 2015

In several previous blogs (4 Real BGP Troubleshooting Scenarios and Solving BGP AS Path Prepending Errors) we’ve highlighted the ThousandEyes platform’s ability to visualize and analyze BGP issues and their impact. In this blog post we’d like to discuss how BGP alerts within the platform can proactively inform you of these critical issues and significantly reduce MTTR.… Read More »

Measuring the Impact of BGP Changes

Posted by on September 10th, 2014
March 18th, 2015

Many people think of BGP as something that only your most senior network engineers need to worry about, but the truth is BGP changes can have a direct impact on your customers’ user experience and even their ability to access your site.… Read More »

Finding the Root Cause of Loss and Latency in Internet Facing Applications

Posted by on September 3rd, 2014
November 10th, 2017

During my career I’ve seen all kinds of network performance problems: packet loss, latency, TCP issues, you name it. There are a lot of tools that can be used to track down these problems when they impact traditional enterprise applications. However, it’s always been very difficult to find the root cause of issues like loss and latency in Internet facing applications. I’ve often felt like I was trying to find a needle in the world’s biggest haystack.… Read More »

4 Real BGP Troubleshooting Scenarios

BGP Troubleshooting Scenarios
Posted by on April 30th, 2014
November 10th, 2017

Border Gateway Protocol (BGP) is a key component of Internet routing and is responsible for exchanging information on how Autonomous Systems (ASes) can reach one another. When BGP issues occur, inter-network traffic can be affected, from packet loss and latency to complete loss of connectivity. This makes BGP an important protocol for network operators to be able to troubleshoot. … Read More »

Visualizing the Performance of InteropNet

Posted by on April 11th, 2014
March 18th, 2015

The ThousandEyes team spent several days last week at Interop monitoring the health of InteropNet, the volunteer-built network that powers the conference. We set out to instrument InteropNet in order to monitor the health of services used by conference attendees and vendors… Read More »

Using ThousandEyes to Analyze a DDoS Attack on Github

ThousandEyes monitoring Github during DDoS attack
Posted by on December 18th, 2013
March 18th, 2015

On August 15th 2013 a DDoS attack targeted Github.com. ThousandEyes was monitoring GitHub through public agents before and during the attack and we captured the coordinated effort by GitHub, Rackspace and their ISPs to fend off the attack. While multiple ISPs were involved in the effort, for the sake of simplicity we will focus primarily Level 3 Communications, and AboveNet. They used different techniques to counter the attack and ThousandEyes Deep Path Analysis helped us understand how the attack and defense evolved over time.… Read More »