[186867] in North American Network Operators' Group
Re: Smokeping targets
daemon@ATHENA.MIT.EDU (Royce Williams)
Thu Jan 7 13:31:02 2016
X-Original-To: nanog@nanog.org
In-Reply-To: <D60965DC-C8DB-4737-B0EB-CAE2D5E0D590@neilltech.com>
From: Royce Williams <royce@techsolvency.com>
Date: Thu, 7 Jan 2016 09:30:29 -0900
To: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org
My Alaska-focused public SmokePing instance:
http://akmon.techsolvency.com/smokeping/
... has links to other public SmokePings. Many of them have a general
"is the Internet healthy" target group.
I looked through those groups and selected a cross-section for my own group=
:
http://akmon.techsolvency.com/smokeping/smokeping.cgi?target=3DOther
Some of them are subject to CDN or anycast; other are not.
If anyone has a public SmokePing instance, send me a link and I will add.
Royce
On Thu, Jan 7, 2016 at 7:45 AM, Keith Stokes <keiths@neilltech.com> wrote:
> I have a couple of different SmokePing implementations related to our Saa=
S platform.
>
> I have monitors inside our network looking at several of our largest cust=
omers.
>
> I have monitors in some IaaS providers looking back at us.
>
> I do include a couple of common addresses previously mentioned since I ne=
ed some sort of confirmation to show the sites can actually get out.
>
>
> On Jan 7, 2016, at 10:24 AM, Jon Lewis <jlewis@lewis.org<mailto:jlewis@le=
wis.org>> wrote:
>
> On Thu, 7 Jan 2016, Brian R. Swan wrote:
>
> Hi all,
>
> I=C3=BF=C3=BFm setting up smokeping to try and gather some latency statis=
tics on my ISP to different parts of the world. Does there exist a list or=
any generic recommendations of different targets to config within smokepin=
g? Google and searching the NANOG mailing list have failed me, and I don=C3=
=BF=C3=BFt want to just spam random IP addresses with ICMP requests if ther=
e=C3=BF=C3=BFs a more official/accepted method for doing this.
>
> 8.8.8.8 is pretty popular. There's lots of them. (Anycast)
>
> But, it's not nice to send remote networks unwanted traffic (it's a DNS s=
erver, not a light house), and I know GOOG receives enough ICMP at some of =
those anycast nodes to be "problematic".
>
> I'd say keep your smokeping targets to devices you or your connectivity p=
rovider(s) own/are paying for rather than abusing random 3rd parties just t=
o satisfy your curiosity.
>
> ----------------------------------------------------------------------
> Jon Lewis, MCP :) | I route
> | therefore you are
> _________ http://www.lewis.org/~jlewis/pgp for PGP public key_________
>
>
> ---
>
> Keith Stokes
>
>
>
>