Everyone’s favorite time of the year is almost here! Is it because it’s the holiday season? Perhaps it’s the magic that happens at the end of the year? Or maybe, it’s because there’s an even better reason to get excited!
Change Freeze Season!
That’s right. Some of you reading this started jumping up and down like Buddy the Elf at the thought of having a change freeze. There’s something truly magical about laying down the law about not touching anything in the system until after the end-of-year reports are run and certified. For some, this means a total freeze of non-critical changes from the first of December all the way through the New Year until maybe even February. That’s a long time to have a frozen network? But why?
Change freezes are an easy thing to explain to the new admins. You simply don’t touch anything in the network during the freeze unless it’s broken. No tweaking. No experimenting. No improvements. Just critical break/fix changes only. There had better be a ticket. There should be someone yelling that something’s not right. Otherwise you’re in for it.
There are a ton of reasons for this. The first is Continue reading
Today’s reality is multi-vendor, hybrid environments that are hard to manage and secure. Those who can overcome these challenges can deliver greater performance and enhanced functionality for end users.
One of the fundamentals I always emphasize in introductory parts of my network automation workshops and online courses is the fact that we’re about to develop software that will control the most-mission-critical part of IT infrastructure, and should therefore use software development methodologies like version control, testing…
However, there’s a “small” glitch. While it’s perfectly possible to test most software in some virtual environment you can spin up on-the-fly using Vagrant, Docker, Jenkins, Travis, or some other CI/CD tool, testing a network automation solution requires access to network devices.
Read more ... “Nobody gets to keep a lock on cloud computing,” Wasabi CEO David Friend said. “As much as Amazon would like to, it’s going to be a multi-cloud world.”
Enterprise network architectures are being reshaped using tenets popularized by the major cloud properties. This podcast explores this evolution and looks at the ways that real-time streaming telemetry, machine learning, and artificial intelligence affect how networks are designed and operated.
In working with the ONF, Comcast is breaking with a long cable tradition of not sharing technology and innovation ideas with competitors.
The Linux Foundation project OpenChain is developing an overarching standard for creating a quality compliance program that companies can apply across the supply chain.
The company has a similar product for Microsoft Azure that is slated to enter beta next year. Google Cloud is on the roadmap for future support.
Complex cloud applications need decent visualizations to help infrastructure engineers understand what's going on. For cloud visibility, Kentik absorbs AWS & GCP flow logs, with Azure support coming. Kubernetes & Istio are also data providers to Kentik. Using the Kubernetes API, Kentik correlates pod IPs to pod names and cluster namespaces. With that information, Kentik can visualize pod to pod and service to service traffic flows within a Kubernetes cluster.
The post BiB 066: Why Cloud Visibility Matters appeared first on Packet Pushers.
Earlier this week Jason Donenfeld received the Radiant Award from the Internet Security Research Group. Jason is an accomplished engineer and a creative thinker, which makes his work clean, simple, and takes it a step beyond – most notably in WireGuard, an open-source secure VPN tunnel.
We are proud to have enabled this award. Let me explain why.
At the Internet Society we care a great deal about the technologies that help to establish trust between people around the globe, while those people may have never interacted before.
One of the groups we proudly partner with is the Internet Security Research Group, the non-profit behind the Let’s Encrypt initiative. In the 4 years since Let’s Encrypt was launched, it has changed the landscape of web traffic encryption. Whereas in 2014 around 30% of pages loaded by Firefox where loaded over a secure channel, that number has increased to over 75% by now. I believe that rise in secure web traffic is in large part the result of the work by Let’s Encrypt.
Before 2014 it was somewhat costly to get a web certificate, a critical piece of authentication material that is the basis of establishing global trust. Both Continue reading