netlab release 1.6.0 has (probably) the longest release notes so far as it contains so many user-visible new features including:
Some users were complaining how complex it was to use netlab create command to create graphs, inspect data structures, or create custom reports. They might find the new commands easier to use:
netlab release 1.6.0 has (probably) the longest release notes so far as it contains so many user-visible new features including:
Some users were complaining how complex it was to use netlab create command to create graphs, inspect data structures, or create custom reports. They might find the new commands easier to use:
At Kubecon 2023 in Amsterdam, Azure made several exciting announcements and introduced a range of updates and new options to Azure-CNI (Azure Container Networking Interface). These changes will help Azure Kubernetes Services (AKS) users to solve some of the pain points that they used to face in previous iterations of Azure-CNI such as IP exhaustion and big cluster deployments with custom IP address management (IPAM). On top of that, with this announcement Microsoft officially added an additional dataplane to the Azure platform.
Worker nodes in an AKS (Azure Kubernetes Service) cluster are Azure VMs pre-configured with a version of Kubernetes that has been tested and certified by Azure. These clusters communicate with other Azure resources and external sources (including the internet) via the Azure virtual network (VNet).
Now, let’s delve into the role of the dataplane within this context. The dataplane operations take place within each Kubernetes node. It is responsible for handling the communication between your workloads, and cluster resources. By default, an AKS cluster is configured to utilize the Azure dataplane, which Continue reading
Today on the Tech Bytes podcast we explore Secure Web Gateways with sponsor Palo Alto Networks. Secure Web Gateways sit between users and Web traffic to enforce policies around Web and application access and inspect traffic for malware. We talk with Palo Alto Networks about customer challenges with secure Web gateways, innovations in Prisma Access Cloud Secure Web Gateways, and more.
The post Tech Bytes: Modernizing Your Secure Web Gateway For A Distributed Workforce (Sponsored) appeared first on Packet Pushers.
The impulse to move absolute everything to the public cloud is coming to an end. Many companies are re-evaluating their strategies and adopting a hybrid model by bringing or migrating their workloads from the cloud to on-premises, mostly in the IaaS space. The main reasons companies are re-evaluating public cloud are cost, wanting total control […]
The post Options For Connecting Your Private Cloud appeared first on Packet Pushers.
On this week's Network Break we discuss a new Broadcom ASIC, a request from US Senator Ron Wyden to three US agencies to investigate Microsoft for sloppy security practices, an Intel pledge to add AI to all its platforms, Juniper financial results, and more IT news.
The post Network Break 440: Broadcom Releases SONiC-Friendly Trident; Senator Requests Investigations Into Microsoft’s Shoddy Security appeared first on Packet Pushers.
When you assign an Identity and Access Management (IAM) role to an Amazon
Elastic Compute Cloud (EC2) instance, the short-term credentials for the role
are made available via a web service known as the
Instance Metadata Service (IMDS).
The IMDS provides an HTTP endpoint for retrieving instance metadata
such as the instance IP address, AWS Region the instance is running in, the
Amazon Machine Image used to launch the instance, and the access key, secret
access key, and session token associated with the instance's IAM role. The AWS
documentation describes how to
retrieve instance role credentials
from IMDS. If you've seen or used the http://169.254.169.254
or
http://fd00:ec2::254
endpoints, then you've seen/used IMDS.
Retrieval of instance role credentials from IMDS is the mechanism by which the AWS CLI and SDKs learn the credentials belonging to the instance's IAM role without you having to configure anything on the instance. Quoting the IAM documentation:
The AWS SDKs, AWS CLI, and Tools for Windows PowerShell automatically get the credentials from the EC2 Instance Metadata Service (IMDS) and use them.
This is great! It means you can start using the AWS CLI, SDKs, or Tools Continue reading