Every network vendor has an "AI-powered" story right now. Most of them are 10% of the actual solution. I broke down what the other 90% looks like after watching Aviz Networks demo their AI NOC platform at Network Field Day. #NFD #Networking #NetOps #AI

https://packitforwarding.com/index.php/2026/04/30/ai-more-than-a-bolt-on-solution-for-networking/

AI, More Than a Bolt On Solution for Networking -

The post critiques the marketing use of "AI-powered" in network tools, highlighting the gap between flashy demos and real enterprise needs. It emphasizes the importance of multi-source data integration, on-premises hosting, and robust role-based access. Genuine AI solutions must address complexities beyond simple Q&A interfaces to be effective in real environments.

Autonomie scheitert nicht an schlechter AI, sondern an schlechter Architektur.

Skalierende Teams sind nicht smarter – sie sind besser designed. Sie behandeln Telemetry als Produkt, validieren mit Digital Twins und bauen Rollback ein. Auch das Human System muss mitgedacht werden. #AI #Automation #NetOps - Link im 2. Post

Как в Авито построили систему мониторинга BGP

Всем привет! Меня зовут Антон Ильичев, я сетевой инженер в Авито. В этой статье расскажу, зачем мы централизованно собираем и анализируем маршрутную информацию с сетевых устройств, причём тут протокол BMP и как устроена наша система мониторинга. В конце вас будет ждать лаба на docker-compose, которую вы можете запустить у себя и посмотреть на систему в действии. Статья будет полезна в первую очередь сетевым инженерам, командам SRE и мониторинга, которые отвечают за доступность и качество сервиса.

https://habr.com/ru/companies/avito/articles/1012780/

#bmp #bgp #monitoring #netops #troubleshooting #kafka #clickhouse #cisco #grafana #juniper

Как в Авито построили систему мониторинга BGP

Всем привет! Меня зовут Антон Ильичев, я сетевой инженер в Авито. В этой статье расскажу, зачем мы централизованно собираем и анализируем маршрутную информацию с сетевых устройств, причём тут протокол...

Хабр

Is #RANCID still alive in production environments?

We’re considering integration with #NetXMS and trying to estimate real-world usage.

#networking #netops #opensource #NMS

Do you use it?

Yes, we use it
0%
I know teams that use it
6.8%
No
6.8%
What is RANCID?
86.4%
Poll ended at .

Sometimes figuring out whats happening over time in the Mikrotik changelogs isn't as easy as it should be..... I made a tool to display changelog entries and data in different ways, as well as searching all changelogs for keywords. (MLAG for instance is a good search keyword).

This is still in really early public availability, but its been useful for 2 out of 2 people I shared it with and so I expect it will be useful for a wider audience.

https://mikrotik-changelog-tracker.hextet.net/

#mikrotik #changelogs #neteng #netops #networking #networks

Search – MikroTik Changelog Tracker

Just had a discussion on routable #IPv4 address space. This lead me to check #Bogon IP address space. I briefly fetched a public bogon list of a large provider, parsed the CIDR blocks and calculated the number of IPv4 addresses. Dividing this by 0.0.0.0/0 eventually lead to the discovery that 13.89% of the IPv4 address space is non-routable. Way more than I had anticipated.

Your daily dose of #netops knowledge... :)

📰 Noction IRP v4.3 Launches with Automated DDoS Detection and Routing-Native Mitigation

Noction releases IRP v4.3 with Automatic Anomaly Detection! 🛡️ The new feature provides rapid, automated DDoS detection & mitigation using routing-native tools like BGP FlowSpec and RTBH to protect networks at the edge. #DDoS #BGP #NetOps #CyberSec...

🔗 https://cyber.netsecops.io/articles/noction-irp-v4-3-introduces-automated-ddos-detection-and-mitigation/?utm_source=mastodon&utm_…

Noction IRP v4.3 Launches with Automated DDoS Detection and Routing-Native Mitigation

Noction has released IRP v4.3, featuring Automatic Anomaly Detection (AAD) for rapid identification and mitigation of DDoS attacks using BGP FlowSpec and RTBH.

CyberNetSec.io

Looking for a sponsoring LIR for my ASN.
I run a small non‑commercial network with a WireGuard uplink via Route64 and plan a second upstream (HE POP) for redundancy and BGP/IPv6 learning.
I can maintain IRR/RPKI. Any LIR willing to sponsor an ASN is welcome.

#BGP #ASN #IPv6 #Multihoming #HomeLab #NetOps #NetworkEngineering #RIPE #LIR #NOG #PLNOG #DENOG #NLNOG #UKNOF #Routing #Sysadmin #Route64 #HurricaneElectric

Psssst! Don't tell anyone but more and more POPs are coming up for my next free service! It's not only for @[email protected]

#ipv4 #ipv6 #router #routing #network #bgp #AS #BoxyBSD #opensource #net #netops

Pour finir, l’info a fait son chemin
jusqu’à la mailing-list des administrateurs de relais #tor.

Donc c’est bien une des campagnes ...académiques de sensibilisation de masse.

Mais comme souvent, au final ça suscite plus de questions que de réponses,
vu qu’on parle d’une attaque au niveau AS / BGP.

Thread côté Tor
👇
https://lists.torproject.org/mailman3/hyperkitty/list/[email protected]/thread/R5IUD5DJBBJXJ3Q3YXY3HLDLDHA6AO57/

Et bien évidemment, ça déclenche des réactions très humaines 😅

Extrait qui résume assez bien l’ambiance :

“ Is the stated vulnerability an actively exploited problem or is this a DoS attack by scaremongering?

My guess is it is neither. I would be that it's just some over-excited
researchers who want to get the news out about just how awful BGP is.
But, while it is "exploitable", there's not much that can be done with
it. All an attacker could do is cause the connections destined for your
relay to go to their servers instead. But crucially, they do not have
your relay key, so all other relays and clients would refuse to connect
to them..”

Bref,
je vais quand même ouvrir un ticket chez Scaleway,
histoire de voir ce qu’ils en pensent de leur côté.

#BGP #NetOps #bgphijacking

Fwd: Potential vulnerability found in your Tor Relay - tor-relays - lists.torproject.org