If you'd come to me as a networking engineer and say “there's one new thing I want to learn that's outside of my $dayjob” I'd probably say “invest some serious time into learning Git (beyond memorizing the quick recipes) if you haven’t done that already”
Full disclosure: not so long ago I tried to avoid Git as much as possible… and then it suddenly clicked ;)
Read more ...Something different today: Here’s something I learnt about RPM package management, and post-upgrade scripts. It turns out that they don’t work the way I thought they did. Post-uninstall commands are called on both uninstall and upgrade. For my own reference as much as anyone’s here some info about it, and how to deal with it.
RPM is a Linux package management system. It is a way of distributing and managing applications installed on Linux systems. Packages get distributed as .rpm files. These contain the application binaries, configuration files, and application metadata such as dependencies. They can also contain scripts to run pre- and post- installations, upgrades and removal.
Using package management systems is a vast improvement over distributing source code, or requiring users to manually copy files around and run scripts themselves.
There is some effort required to get the spec files used to create packages. But once it has been set up, it is easy to create new versions of packages, and distribute them to users. System administrators can easily check which version they’re running, check what new versions are available, and upgrade.
We use RPMs to distribute StackStorm packages for RHEL/CentOS systems. Similarly, we distribute Continue reading
Something different today: Here’s something I learnt about RPM package management, and post-upgrade scripts. It turns out that they don’t work the way I thought they did. Post-uninstall commands are called on both uninstall and upgrade. For my own reference as much as anyone’s here some info about it, and how to deal with it.
RPM is a Linux package management system. It is a way of distributing and managing applications installed on Linux systems. Packages get distributed as .rpm files. These contain the application binaries, configuration files, and application metadata such as dependencies. They can also contain scripts to run pre- and post- installations, upgrades and removal.
Using package management systems is a vast improvement over distributing source code, or requiring users to manually copy files around and run scripts themselves.
There is some effort required to get the spec files used to create packages. But once it has been set up, it is easy to create new versions of packages, and distribute them to users. System administrators can easily check which version they’re running, check what new versions are available, and upgrade.
We use RPMs to distribute StackStorm packages for RHEL/CentOS systems. Similarly, we distribute Continue reading
Given that within the coming years, another billion people are going come online along with billions more devices thanks to the Internet of things (IoT), we recognize that the community of Internet professionals and organizations cannot legitimately discuss access without addressing sustainability, especially as it relates to energy.
The post Worth Reading: Tracing down flashing dialogs appeared first on rule 11 reader.
One of the current challenges of data center security is the East-West traffic that has become so pervasive as modern applications communicate a great deal between their different components. Conventional perimeter security is poorly placed to secure these lateral flows, to promote a zero-trust model in order to prevent threats moving within each application layer. VMware NSX addresses this, providing virtual firewall at the virtual NIC of each VM with a management framework where micro-segmentation is achievable with a sensible level of overhead. Check Point vSEC can be deployed in conjunction to provide threat and malware protection.
The VMware NSX Distributed Firewall (DFW) protects East-West L2-L4 traffic within the virtual data center. The DFW operates in the vSphere kernel and provides a firewall at the NIC of every VM. This enables micro-segmented, zero-trust networking with dynamic security policy leveraging the vCenter knowledge of VMs and applications to build policy rather than using IP or MAC addresses that may change. Tools for automation and orchestration as well as a rich set of APIs for partner and customer extensibility complete the toolset for security without impossible management overhead. While this is a dramatic improvement in the security Continue reading
The post Worth Reading: Fast changes, illustrated appeared first on rule 11 reader.
Does any sane bystander not see the IPv6 standards process as a terrible road accident ?
The post Response: draft-bourbaki-6man-classless-ipv6-00 – IPv6 is Classless appeared first on EtherealMind.
Nokia cuts 170 jobs; 10 new companies joined ONAP.
5G is expected to take virtualization plans to "another level."