nanog mailing list archives

Re: Smokeping targets


From: Royce Williams <royce () techsolvency com>
Date: Thu, 7 Jan 2016 09:30:29 -0900

My Alaska-focused public SmokePing instance:

    http://akmon.techsolvency.com/smokeping/

... has links to other public SmokePings. Many of them have a general
"is the Internet healthy" target group.

I looked through those groups and selected a cross-section for my own group:

    http://akmon.techsolvency.com/smokeping/smokeping.cgi?target=Other

Some of them are subject to CDN or anycast; other are not.

If anyone has a public SmokePing instance, send me a link and I will add.

Royce


On Thu, Jan 7, 2016 at 7:45 AM, Keith Stokes <keiths () neilltech com> wrote:
I have a couple of different SmokePing implementations related to our SaaS platform.

I have monitors inside our network looking at several of our largest customers.

I have monitors in some IaaS providers looking back at us.

I do include a couple of common addresses previously mentioned since I need some sort of confirmation to show the 
sites can actually get out.


On Jan 7, 2016, at 10:24 AM, Jon Lewis <jlewis () lewis org<mailto:jlewis () lewis org>> wrote:

On Thu, 7 Jan 2016, Brian R. Swan wrote:

Hi all,

Iÿÿm setting up smokeping to try and gather some latency statistics on my ISP to different parts of the world.  Does 
there exist a list or any generic recommendations of different targets to config within smokeping? Google and 
searching the NANOG mailing list have failed me, and I donÿÿt want to just spam random IP addresses with ICMP 
requests if thereÿÿs a more official/accepted method for doing this.

8.8.8.8 is pretty popular.  There's lots of them. (Anycast)

But, it's not nice to send remote networks unwanted traffic (it's a DNS server, not a light house), and I know GOOG 
receives enough ICMP at some of those anycast nodes to be "problematic".

I'd say keep your smokeping targets to devices you or your connectivity provider(s) own/are paying for rather than 
abusing random 3rd parties just to satisfy your curiosity.

----------------------------------------------------------------------
Jon Lewis, MCP :)           |  I route
                            |  therefore you are
_________ http://www.lewis.org/~jlewis/pgp for PGP public key_________


---

Keith Stokes






Current thread: