Susan Hall

Author Archives: Susan Hall

Isovalent Harnesses eBPF for Cloud Native Security, Visibility

Veteran networking pros at Extended Berkeley Packet Filter (eBPF) technology, which makes the Linux kernel programmable, to address the ephemeral challenges of Kubernetes and microservices. “If you think about the Linux kernel, traditionally, it’s a static set of functionality that some Linux kernel developer over the course of the last 20 or 30 years decided to build and they compiled it into the Linux kernel. And it works the way that kernel developer thought about, but may not be applicable to the use case that we need to do today,” said Isovalent CEO

Kuma, a New CNCF Project, Enhances the Control Plane for Mixed Infrastructure

“I’m pretty sure that you won’t hear anybody saying, ‘Oh, yeah, we implemented a service mesh, and it was easy to do.’ They were just extremely complicated systems,” said Marco Palladino. The first generation of service meshes, released around 2017, “came with lots of moving parts, lots of dependencies, and lots of assumptions that we did not necessarily agree with.” Those meshes were hyperfocused on Kubernetes, he said, while customers, though perhaps running K8s, also were still running virtual machines. They don’t scale and require a new cluster for each mesh.

Stateless Rethinks Modern Networking

There’s a whole new realm that the network is expected to accomplish with the newest architectures, according toBarefoot Tofino P4 Ethernet switch with the Stateless Luxon software to provide programmability deeper into the switch. Intel acquired Barefoot Networks, the creator of the protocol-independent Murad Kablan has said. Stateless aims to change all that. Its customers are looking to provide multitenancy and multitiered multitenancy — hundreds of thousands Continue reading

VMware Acquires Nyansa for AI-Aided Networking Analytics

VMware has been on a buying jag in the past year, and its latest planned acquisition is the Palo Alto, Calif.-based Sanjay Uppal said in the acquisition announcement. CEO and co-founder blog post: First, Nyansa can proactively predict client problems, optimize their network, better enable the behavior of critical IoT devices, and justify infrastructure changes based on actual user, network and application data. Second, you will be able to use the breadth and depth of Nyansa’s data ingestion and analysis, including packet analysis and metrics via API across multivendor wired and wireless LAN environments. Finally, the combination of Nyansa’s AI/ML capabilities with VMware’s existing analytics, visibility and remediation capabilities will make it easier for you to operate and troubleshoot the virtual cloud network and accelerate the realization of a self-healing network. Nyansa was valued at around $65 million after its most recent funding two years ago and had raised about $26.5 million, Carbon Black. The transaction is expected to close within the next few months, subject to customary closing conditions. VMware is a sponsor of The New Stack. Feature image

DENT: An Operating System for Disaggregated Network Switches

The Linux Foundation has launched a project called LF Edge framework early this year, bringing together three existing projects and two new ones in an effort to foster interoperability and collaboration across the development communities for edge computing and the Internet of Things. It added two more projects in September: Arpit Joshipura, general manager of networking at The Linux Foundation. Traditional vendors have sold Continue reading

F5 and NGINX: Going Forward with Kubernetes

As NGINX, it has pledged published in the second half of 2018 found NGINX to be the most widely used ingress provider for Kubernetes. For the Seattle-based application controller delivery software provider, a $670 million acquisition provides an established user base and mature technology that puts it at the center of microservice architectures. Earlier this year, when it purchased NGINX, F5 said it planned to augment the open source web server/load balancer and reverse proxy software with F5’s own security technologies as well as with a set of “cloud native innovations” to enhance load balancing. At François Locoh-Donou, president and CEO of F5 Networks pointed out that the technology acquisitions that have paid off for customers have been those in which the acquired company’s technology was core to the strategy of the acquiring company. “NGINX is core to the strategy of F5 Networks,” he said. “Combined with the reach and breadth of the F5 application security portfolio, we Continue reading

Red Hat Creates Service Mesh for OpenShift

Red Hat is unveiling its own service mesh for Jaeger project for tracing, and service mesh typically runs as a sidecar as a communication layer between services for microservices-based application architectures. It handles traffic management, policy enforcement and service identity and security. “We have taken the upstream Istio and written an Operator that handles the deployment and management of Istio itself. With the upstream version, you have to run all the sidecar containers with an escalated level of privilege — the Kubernetes equivalent of running things as a root user,” explained OpenShift Service Mesh, through having the Operator there and a CNI (container networking interface) plugin we wrote, you can run Istio and bring up those sidecar components without providing additional privileges to the application components of Istio itself,” he added. Its features include: Tracing and measurement: using Jaeger, developers can track a request between services from start to finish. Visualization and observability: Kiali Continue reading

Kentik Turns AIOps Spotlight on Network Data, Workflows

San Francisco-based startup Avi Freedman, Kentik CEO. “They may say there’s a problem over in the network, but what is it? …We’re embracing [the network], but taking a more AI approach to surfacing insights and automation approach to what you do with that.” The AI-enabled capabilities include: Network operations insight into infrastructure and traffic across cloud, data center, WAN and campus environments, including traffic growth and capacity run-out dates. Edge network utilization and costs, including predicting cost overages and alerting on traffic spikes so teams can shift traffic to avoid network congestion. Network protection by setting smart baselines and thresholds to automatically recognize traffic anomalies, more easily investigate incidents such as DDoS attacks, and automatically prevent threats from causing performance and availability issues. The majority of Kentik’s early customers are service providers. AIOps can help them understand how their customers and subscribers use their services to more quickly Continue reading