nanog mailing list archives
Re: new BGP hijack & visibility tool “BGPalerter”
From: "Kushal R. via NANOG" <nanog () nanog org>
Date: Wed, 14 Aug 2019 22:21:53 +0530
This is great. Will be testing this later in the day. We like a lot of others were using BGPMon. — Kushal R. Executive Management | Host4Geeks Email: kushal.r () h4g co Skype: kush.raha Phone (Text/WhatsApp): +1-310-405-0010 [tel:+1-310-405-0010] (Global) / +91-8830547876 [tel:+91-8830547876] (India) On Wed, Aug 14, 2019 at 10:19pm, Eric Lindsjö < eric () emj se [eric () emj se] > wrote: On 8/14/19 4:54 PM, Job Snijders wrote:
Dear NANOG, Recently NTT investigated how to best monitor the visibility of our own and our subsidiaries’ IP resources in the BGP Default-Free Zone. We were specifically looking how to get near real-time alerts funneled into an actionable pipeline for our NOC & Operations department when BGP hijacks happen. Previously we relied on a commercial “BGP Monitoring as a Service” offering, but with the advent of RIPE NCC’s “RIS Live” streaming API [1] we saw greater potential for a self-hosted approach designed specifically for custom integrations with various business processes. We decided to write our own tool “BGPalerter” and share the source code with the Internet community. BGPalerter allows operators to specify in great detail how to distribute meaningful information from the firehose from various BGP data sources (we call them “connectors”), through data processors (called “monitors”), finally outputted through “reports” into whatever mechanism is appropriate (Slack, IRC, email, or a call to your ticketing system’s API). The source code is available on Github, under a liberal open source license to foster community collaboration: https://github.com/nttgin/BGPalerter If you wish to contribute to the project, please use Github’s “issues” or “pull request” features. Any help is welcome! We’d love suggestions for new features, updates to the documentation, help with setting up a CI regression testing pipeline, or packaging for common platforms. Kind regards, Job & Massimo NTT Ltd [1]: https://ris-live.ripe.net/
Excellent, now I don't have to write it myself. Looking forward to testing. Thanks for sharing the fruits of your labor with the community. Kind regards, Eric
Current thread:
- new BGP hijack & visibility tool “BGPalerter” Job Snijders (Aug 14)
- Re: new BGP hijack & visibility tool “BGPalerter” Eric Lindsjö (Aug 14)
- Re: new BGP hijack & visibility tool “BGPalerter” Kushal R. via NANOG (Aug 14)
- Re: new BGP hijack & visibility tool “BGPalerter” Ryan Hamel (Aug 14)
- Re: new BGP hijack & visibility tool “BGPalerter” Alarig Le Lay (Aug 14)
- Re: new BGP hijack & visibility tool “BGPalerter” Job Snijders (Aug 15)
- Re: new BGP hijack & visibility tool “BGPalerter” Christopher Morrow (Aug 15)
- Re: new BGP hijack & visibility tool “BGPalerter” Robert Kisteleki (Aug 16)
- Re: new BGP hijack & visibility tool “BGPalerter” Valdis Klētnieks (Aug 16)
- Re: new BGP hijack & visibility tool “BGPalerter” Robert Kisteleki (Aug 16)
- Re: new BGP hijack & visibility tool “BGPalerter” Christopher Morrow (Aug 16)
- Re: new BGP hijack & visibility tool “BGPalerter” Alarig Le Lay (Aug 14)
- Re: new BGP hijack & visibility tool “BGPalerter” Eric Lindsjö (Aug 14)