Last–but not least–in the technology triumvirate presenting a joint session at Networking Field Day 17 was Cumulus Networks. This post looks at the benefits of Cumulus Linux as a NOS on the Mellanox Spectrum Ethernet switch platform.
I’ve not yet managed to deploy Cumulus Linux in anger, but it’s on a fairly short list of Network Operating Systems (NOS) which I would like to evaluate in earnest, because every time I hear about it, I conclude that it’s a great solution. In fact, I’m having difficulty typing this post because I have to stop frequently to wipe the drool from my face.
Cumulus Linux supports around 70 switches from 8 manufacturers at this time, and perhaps obviously, that includes the Mellanox Spectrum switches that were presented during this session. This is the beauty of disaggregation of course; it’s possible to make a hardware selection, then select the software to run on it. Mellanox made a fairly strong case for why the Spectrum-based hardware is better than others, so now Cumulus has to argue for why they would be the best NOS to run on the Mellanox hardware.
Cumulus Linux, as the name suggests, is based on Debian linux. Continue reading
Will speakers at the upcoming Cloud Foundry Summit provide real insight into how to solve container deployment challenges?
The startup maintains a free and open source monitoring framework as well as a commercial platform.
Hi,
What started to be a exploration project is now turning out to be pretty useful for me in day to day analysis. Back in days when I worked in support, there was nothing to predict or really worry about historical events for any future work, just grep for logs and you are done with the last flap and analysis.
Customers / Networks now look for more data, while there are systems which do the telemetry and prediction, from an analysis point of view, as an engineer I want to know if the device or a circuit over an interface is stable over a period of time or even if it flaps what is the likely time and day it flaps in a week for a smoother migration.
Requirement : Plot a simple graph analyzing the interface flaps over a period of one week for a specific interface and decide the actions next from the log messages.[in this case i used a junos device]
Well grepping the logs is not something new for a seasoned engineer but having visual data will prove to be useful for a cutover or migration.
There are systems which can do this work on Continue reading
The company is building a software platform that can be deployed on virtually any edge device in support of IoT. This involves a lightweight software stack that can adapt to different deployment models.
With the growing presence and sophistication of online threats like viruses, ransomware, and phishing scams, it’s increasingly important to have the right protection and tools to help protect your devices, personal information, and files from being compromised. Microsoft already provides robust security for Office services, including link checking and attachment scanning for known viruses and phishing threats, encryption in transit and at rest, as well as powerful antivirus protection with Windows Defender. Today, we’re announcing new advanced protection capabilities coming to Office 365 Home and Office 365 Personal subscribers to Continue reading
Operators want to be able to use different radio heads from different vendors and have them interoperate with existing baseband units. This spec will make that possible.
As engineers at Cloudflare quickly adapt our software stack to run on ARM, a few parts of our software stack have not been performing as well on ARM processors as they currently do on our Xeon® Silver 4116 CPUs. For the most part this is a matter of Intel specific optimizations some of which utilize SIMD or other special instructions.
One such example is the venerable jpegtran, one of the workhorses behind our Polish image optimization service.
A while ago I optimized our version of jpegtran for Intel processors. So when I ran a comparison on my test image, I was expecting that the Xeon would outperform ARM:
vlad@xeon:~$ time ./jpegtran -outfile /dev/null -progressive -optimise -copy none test.jpg
real 0m2.305s
user 0m2.059s
sys 0m0.252s
vlad@arm:~$ time ./jpegtran -outfile /dev/null -progressive -optimise -copy none test.jpg
real 0m8.654s
user 0m8.433s
sys 0m0.225s
Ideally we want to have the ARM performing at or above 50% of the Xeon performance per core. This would make sure we have no performance regressions, and net performance gain, since the ARM CPUs have double the core count as our current 2 socket setup.
In this case, however, I Continue reading
It’s possible that ARM may be one of the potential investors. Qualcomm and ARM have worked together for years, creating chips for mobile devices.
Intel debuts cloud-ready mainframes; Telefónica completes 5G automated car demo; Sprint and T-Mobile renew merger talks.
I used to work with a guy that would configure servers for us and always include an extra SCSI card in the order. When I asked him about it one day, he told me, “I left it out once and it delayed the project. So now I just put them on every order.” Even after I explained that we didn’t need it over and over again, he assured me one day we might.
Later, when I started configuring networking gear I would always set a telnet password for every VTY line going into the switch. One day, a junior network admin asked me why I configured all 15 instead of just the first 5 like they learn in the Cisco guides. I shrugged my shoulders and just said, “That’s how I’ve always done it.”
There’s no more dangerous phrase than “That’s the way it’s always been.”
Time and time again we find ourselves falling back on the old rule of thumb or an old working configuration that we’ve made work for us. It’s comfortable for the human mind to work from a point of reference toward new things. We find ourselves doing it all Continue reading
In this zero-trust world, no data is safe. In order to tighten security in cloud-based environments, enterprises must embrace the truth about security.
If you d heard of Cisco Tetration when it was first announced, you might have a vague memory of it being this huge rack of hardware at an eye-watering price that did some sort of analytics for massive data centers.
Tetration has evolved into a platform that meets needs for organizations of many sizes. Tetration also has a bunch of genuinely interesting use cases, as Cisco has become increasingly clever about what they can do with all of that data Tetration gathers.
For example, you can auto-implement a whitelist policy for application workloads. You can detect when your apps are deviating from their normal traffic patterns. You can detect software vulnerabilities. And depending on where you run Tetration, you can still get deep network performance insights, what I think of as the original Tetration value proposition.
Today on this sponsored episode, we delve into what Tetration does, explore use cases, and dive into how it fits into compute environments. Our guests from Cisco are Jason Gmitter, Principal Systems Engineer; and Yogesh Kaushik, Senior Director of Product Management for Tetration.
Cisco Tetration – Cisco Systems
Cisco Tetration Workload Protection Extended with new Options: SaaS and Virtual Appliance – Cisco Continue reading
On, April 10, 2018 I joined over fifty like-minded individuals signing a letter emphasizing the importance of security research. The letter renounces a number of recent lawsuits, such as Keeper v. Goodlin and River City Media v. Kromtech, against security researchers and journalists and highlights the importance of the work they are doing to defend against a rapidly increasing number of security threats.
Security research, sometimes called white-hat hacking, is a practice by ethical hackers whereby they legally find flaws in information systems and report them to the creators of those systems. The ability to find and report these vulnerabilities before other bad actors can manipulate them has become increasingly important, especially in the context of the Internet of Things (IoT).
As we discussed at Enhancing IoT Security in Ottawa, Canada this week, Internet-connected devices offer great promise, but they can also create a host of security issues. It is crucial that we continue to encourage individuals to seek out and correct flaws in these devices as their application and use grows.
As Olaf Kolkman, Chief Internet Technology Officer at the Internet Society, wrote recently, security researchers are helping to make the Internet more secure. Collaboration between those Continue reading
In this Network Collective Short Take, Russ White explores how disaggregation can be expanded to everyone’s favorite security appliance, the firewall.
The post Short Take – Disaggregation and Firewalls appeared first on Network Collective.