Archive

Category Archives for "Networking – The New Stack"

Gremlin’s Scenarios Simulate Common Outages for Chaos Engineering

There are two things that seem to motivate developers — a speedy, self-explanatory onboarding experience and a bit of friendly competition. Certainly, Gremlin chaos as a service’s new Scenarios features seems to check both boxes. The Scenarios feature, which launched Thursday at the company’s Lorne Kligerman. The idea for Scenarios pulled from their former chaotic lives as well as from customer success and developer advocates. “We know things will fail today. We Continue reading

Containous Builds a Service Mesh on Its Traefik Proxy

Traefik and Maesh, a new open source service mesh, one designed to be easy to use by developers. Maesh is built using Traefik to provide proxy functionality, which Containous CEO Service Mesh Interface (SMI) compliance. “This is really important because this standard means that everybody knows already how we work. And it’s provider agnostic, so if you want to change your service mesh, it can be done easily,” said Vauge. “This means that we are able to provide some observability features, some traffic management features like canary deployments, and some safety features like access control, which is super important. All of this is done thanks to the compliance to the SMI standard.” Feature image by Pixabay. The post Containous Builds a Service Mesh on Its Traefik Proxy appeared first on The New Stack.

Netflix Discovers Severe Kubernetes HTTP/2 Vulnerabilities

Taking a look at how the internet’s HTTP/2 protocol works, Netflix engineers discovered CVE-2019-9512 Ping Flood. This enables an attacker to send continual ping requests to an HTTP/2 peer, causing the peer to create an internal queue of responses. When this happens a server’s CPU and memory can be consumed, which can lead to a denial of service. already issued patches that are found in the following builds: Continue reading

Red Hat Creates Service Mesh for OpenShift

Red Hat is unveiling its own service mesh for Jaeger project for tracing, and service mesh typically runs as a sidecar as a communication layer between services for microservices-based application architectures. It handles traffic management, policy enforcement and service identity and security. “We have taken the upstream Istio and written an Operator that handles the deployment and management of Istio itself. With the upstream version, you have to run all the sidecar containers with an escalated level of privilege — the Kubernetes equivalent of running things as a root user,” explained OpenShift Service Mesh, through having the Operator there and a CNI (container networking interface) plugin we wrote, you can run Istio and bring up those sidecar components without providing additional privileges to the application components of Istio itself,” he added. Its features include: Tracing and measurement: using Jaeger, developers can track a request between services from start to finish. Visualization and observability: Kiali Continue reading

Dell Joins AT&T to Further Develop Airship, Metal3-io, Ironic

Dell Technologies has joined with AT&T to collaborate on a number of open source technologies that the companies say will contribute to edge computing and 5G deployments, namely the Metal3-io (for Kubernetes) and Ryan Van Wyk, AT&T assistant vice president of network cloud software engineering at AT&T, in an interview with The New Stack. “The net effect is we’re helping to accelerate the deployment of open infrastructure that supports [software defined network] workloads. We see it as a flywheel effect in terms of making it easier for folks to deploy infrastructure and that makes it easier for them to grow their SDN ecosystem,” said Van Wyk. “Dell’s going to bring some focus to an area that’s core to their competency. When it comes to working on how to manage the RAID, the discs, the servers, the BIOS configurations, and validation of the hardware itself, and then integrate some of that stuff natively back into the Kubernetes Cluster API, those are things that are Continue reading

Kentik Turns AIOps Spotlight on Network Data, Workflows

San Francisco-based startup Avi Freedman, Kentik CEO. “They may say there’s a problem over in the network, but what is it? …We’re embracing [the network], but taking a more AI approach to surfacing insights and automation approach to what you do with that.” The AI-enabled capabilities include: Network operations insight into infrastructure and traffic across cloud, data center, WAN and campus environments, including traffic growth and capacity run-out dates. Edge network utilization and costs, including predicting cost overages and alerting on traffic spikes so teams can shift traffic to avoid network congestion. Network protection by setting smart baselines and thresholds to automatically recognize traffic anomalies, more easily investigate incidents such as DDoS attacks, and automatically prevent threats from causing performance and availability issues. The majority of Kentik’s early customers are service providers. AIOps can help them understand how their customers and subscribers use their services to more quickly Continue reading

SD-WAN Must Tackle the Multidomain Problem

Chris Wade Chris Wade serves as the co-founder and CTO of Itential, a network automation software company focused on simplifying and accelerating the adoption of network automation and transforming network operations practices. SD-WAN (software-defined networking in a wide area network) was originally touted as a way to leverage both private (MPLS) and public (internet) networks to route traffic to the most appropriate network. Over time, SD-WAN has evolved and enabled the acceleration for more innovative services. In an effort to extend SD-WAN into a multicloud reality, SD-WAN 2.0 enhances security and analytics while connecting innovation at the edge with application and cloud concepts. While we have seen tremendous innovation in the cloud ecosystems, network and application domains are adopting similar concepts to build software-centric, programmable networks. Given these applications and networks now span clouds, data centers, WANs, LANs, and edge, the automation of networks should be viewed as a Multidomain problem. Each domain has unique challenges which should be automated locally while providing an end-to-end capability to align with the target network reality. Applications and services are becoming more distributed and require connectivity and policy enforcement across a variety of domains. Whether it is zero-trust security, intelligent network automation, Continue reading

1 13 14 15