Archive

Category Archives for "Networking"

Netops with Emacs and Org mode

Org mode is a package for Emacs to “keep notes, maintain todo lists, planning projects and authoring documents”. It can execute embedded snippets of code and capture the output (through Babel). It’s an invaluable tool for documenting your infrastructure and your operations.

Here are three (relatively) short videos exhibiting Org mode use in the context of network operations. In all of them, I am using my own junos-mode which features the following perks:

  • syntax highlighting for configuration files,
  • commit of configuration snippets to remote devices, and
  • execution of remote commands.

Since some Junos devices can be quite slow, commits and remote executions are done asynchronously1 with the help of a Python helper.

In the first video, I take some notes about configuring BGP add-path feature (RFC 7911). It demonstrates all the available features of junos-mode.

In the second video, I execute a planned operation to enable this feature in production. The document is a modus operandi and contains the configuration to apply and the commands to check if it works as expected. At the end, the document becomes a detailed report of the operation.

In the third video, a cookbook has been prepared to execute Continue reading

NSX-V 6.3: Control Plane Resiliency with CDO Mode

NSX-V 6.3, released last month, introduced many new features. In my last blog post, NSX-V 6.3: Cross-VC NSX Security Enhancements, I discussed several new Cross-VC NSX security features. In this post I’ll discuss another new feature called Controller Disconnected Operation (CDO) mode which provides additional resiliency for the NSX control plane.

The NSX Controllers already offer inherint resiliency for the control plane by design in several ways:

  • complete separation of control plane and data plane (even if entire controller cluster is down, data plane keeps forwarding)
  • controller cluster of three nodes allows for loss of controller with no disruption to NSX control plane
  • vSphere HA provides additional resiliency by recovering the respective NSX controller on another node if host it’s running on fails

For the reasons mentioned above, it’s a rare event and unlikely that communication would be lost with the entire NSX Controller Cluster. In NSX-V 6.3, this control plane resiliency is enhanced even further via CDO mode.

CDO mode targets specific scenarios where control plane connectivity is lost, for example, a host losing control plane connectivity, losing control plane connectivity to the controller cluster, or NSX controllers are down. CDO mode enhances control plane Continue reading

IDC projects Windows Phone share to be big fat goose egg by 2021

Market watcher IDC anticipates the worldwide smartphone market will bounce back over the next few years from a sluggish 2016, but Microsoft is not expected to take part in that celebration.In fact, while Android smartphone shipments are projected to edge up from 85% this year to 85.3% in 2021 and Apple iPhones are expected to slip a tad from 14.7% to 14.6%, Windows Phone's meager 0.1% share in 2017 will drop to 0% if IDC is on the mark.While Windows Phone's predecessor, Windows Mobile, led the U.S. market as recently as 10 years ago, iOS and BlackBerry blew by it before long in the United States, and Symbian ruled worldwide until its own decline beginning in 2011.To read this article in full or to leave a comment, please click here

Uber and the Terrible, Horrible, No Good, Very Bad Month

On February 19th, this year, Susan J. Fowler, a software engineer who left Uber (I don’t have to explain what Uber is, do I?) to work for Stripe (okay, I’ll outline what they are: Stripe has been described as “the PayPal of the mobile era”) blogged about her experience of working at Uber. She outlined a nightmarish corporate culture of poor management, backstabbing, dirty politics, and negligent human resources, along with apparently endemic and rampant sexual discrimination and harassment. To read this article in full or to leave a comment, please click here

Enough with “the Cyber”!

Email is great; it’s transformed business, enabled geographically dispersed families and friends to stay in touch, redefined news distribution, transformed sales pipelines … the list of good stuff about email is endless. But, as many people have discovered to their cost, keeping control of your email account requires effort, effort like not using dumb, easy-to-guess passwords, and making sure your email hosting service is reliable and not, for example, Yahoo or AOL. And these issues aren’t anything like new, recent discoveries; we’ve all known for over a decade where the risks lie … well, all of us except, apparently, for the government.I don’t know about you, but  during the 2016 election I was fairly surprised when the Democratic National Committee email system was hacked after which the email account of John Podesta, the DNC chairperson, was hacked. You’d have thought that the folks who manage IT for these people would have known the risks and done more to minimize exposure but when simple phishing and malware intrusions that should never of happened and which went undetected were successful, then you have to wonder where the disconnect lies.To read this article in full or to leave a comment, Continue reading

Enough with “the Cyber”!

Email is great; it’s transformed business, enabled geographically dispersed families and friends to stay in touch, redefined news distribution, transformed sales pipelines … the list of good stuff about email is endless. But, as many people have discovered to their cost, keeping control of your email account requires effort, effort like not using dumb, easy-to-guess passwords, and making sure your email hosting service is reliable and not, for example, Yahoo or AOL. And these issues aren’t anything like new, recent discoveries; we’ve all known for over a decade where the risks lie … well, all of us except, apparently, for the government.I don’t know about you, but  during the 2016 election I was fairly surprised when the Democratic National Committee email system was hacked after which the email account of John Podesta, the DNC chairperson, was hacked. You’d have thought that the folks who manage IT for these people would have known the risks and done more to minimize exposure but when simple phishing and malware intrusions that should never of happened and which went undetected were successful, then you have to wonder where the disconnect lies.To read this article in full or to leave a comment, Continue reading

20% off When you Pre-Order Tom Clancy’s Ghost Recon Wildlands – (XBOX ONE, PS4) – Deal Alert

Now available for pre-order, if you're an Amazon Prime Member (or have a free trial -- get one here) you'll see the price drop an extra 20% on Tom Clancy’s Ghost Recon Wildlands (PlayStation 4 or Xbox One). Price drop activates when you add it to your cart, and sinks the price from $59.99 to $39.99.To read this article in full or to leave a comment, please click here

Container networking: What is it and how can it help your data center?

There has been a lot of buzz in the industry about containers and how they are streamlining organizational processes. In short, containers are a modern application sandboxing mechanism that are gaining popularity in all aspects of computing from the home desktop to web-scale enterprises. In this post we’ll cover the basics: what is container networking and how can it help your data center? In the future, we’ll cover how you can optimize a web-scale network using Cumulus Linux and containers.

What is a container?

A container is an isolated execution environment on a Linux host that behaves much like a full-featured Linux installation with its own users, file system, processes and network stack. Running an application inside of a container isolates it from the host and other containers, meaning that even when the applications inside of them are running as root, they can not access or modify the files, processes, users, or other resources of the host or other containers.

Containers have become popular due to the way they simplify the process of installing and running an application on a Linux server. Applications can have a complicated web of dependencies. The newest version of an application may require a newer Continue reading

Trump broke his H-1B promise. Now what?

On the campaign trail, candidate Donald Trump was so determined to present himself as the solution to H-1B visa abuse – the kind that has American IT workers training their foreign replacements -- that he promised to launch an investigation of the program on day one of his administration. Not in due time, on day one. Today is day 43. No investigation has been launched. No changes have been made to the H-1B program. And it’s not clear when or if any will be forthcoming. That no one should be surprised does not mean no one has taken notice. From a Computerworld story:To read this article in full or to leave a comment, please click here

BrandPost: In the cloud or moving to it?

Managing a growing hybrid cloud infrastructure, no matter the size of your team, can introduce a lot of complexity. You want to be able to take inventory, diagnose and respond to misconfigurations, and monitor deployments across your environment. You want to be able to scale, and do it securely.We’ve put together a resource kit to show you how cloud management can be done. It includes:To read this article in full or to leave a comment, please click here

IoT and 5G are driving computing to the edge

By 2020, an average internet user will use 1.5GB of traffic a day, and daily video traffic will reach 1PB, Intel predicts. A huge amount of data will be generated by autonomous vehicles, mobile devices, and internet-of-things devices.Every day, more information is being collected and sent to faster servers in mega data centers, which analyze and make sense of it. That analysis has helped improved image and speech recognition and is making autonomous cars a reality.Emerging superfast data networks like 5G -- a melting pot of wireless technologies -- will dispatch even more gathered information, which could stress data centers. Servers are already being redesigned to handle more data, and throughput technologies like Gen-Z and fiber optics will reduce latency.To read this article in full or to leave a comment, please click here

HackerOne offers bug bounty service for free to open-source projects

HackerOne, the company behind one of the most popular vulnerability coordination and bug bounty platforms, has decided to make its professional service available to open-source projects for free."Here at HackerOne, open source runs through our veins," the company's representatives said in a blog post. "Our company, product, and approach is built on, inspired by, and driven by open source and a culture of collaborative software development. As such, we want to give something back."HackerOne is a platform that makes it easier for companies to interact with security researchers, triage their reports, and reward them. Very few companies have the necessary resources to build and maintain bug bounty programs on their own with all the logistics that such efforts involve, much less so open-source projects that are mostly funded through donations.To read this article in full or to leave a comment, please click here

HackerOne offers bug bounty service for free to open-source projects

HackerOne, the company behind one of the most popular vulnerability coordination and bug bounty platforms, has decided to make its professional service available to open-source projects for free."Here at HackerOne, open source runs through our veins," the company's representatives said in a blog post. "Our company, product, and approach is built on, inspired by, and driven by open source and a culture of collaborative software development. As such, we want to give something back."HackerOne is a platform that makes it easier for companies to interact with security researchers, triage their reports, and reward them. Very few companies have the necessary resources to build and maintain bug bounty programs on their own with all the logistics that such efforts involve, much less so open-source projects that are mostly funded through donations.To read this article in full or to leave a comment, please click here

Sen. Durbin accuses Trump of breaking his H-1B promise

In November, President Donald Trump said on his first day in office he would order an investigation of H-1B abuses.That never happened, though critics held their tongues. After all, Trump had repeatedly campaigned for H-1B reforms, even inviting laid-off Disney IT workers to speak at his campaign rallies. Even so, patience is ending.[ Discuss this story. Join our H-1B/Outsourcing group on Facebook. ] Sen. Dick Durbin (D-Ill), a long-time critic of the H-1B visa program and co-sponsor of a reform bill with Sen. Chuck Grassley (R-Iowa), accused Trump today of failing "to put American workers first by cracking down on H-1B visa abuse.To read this article in full or to leave a comment, please click here

Windows 10 Creators Update allows indefinite postponing of reboots

When it launched, Windows 10 had a really bad habit of spontaneously rebooting to install updates. Updates were coming fast and furious in its early months, which was to be expected during an OS launch. A restart without warning was not expected or appreciated, and this earned Redmond some anger.Eventually they tamed that beast, giving people options when to reboot and warning them that one was needed. Now Microsoft is promising even more control over when you reboot, including the option to indefinitely postpone it, as documented in a new blog post. To read this article in full or to leave a comment, please click here

Security alert overload threatens to bury security teams

When it comes to incident detection and response, enterprise organizations are collecting, processing and analyzing more security data through an assortment of new analytics tools—endpoint detection and response (EDR) tools, network analytics tools, threat intelligence platforms (TIPs), etc.When each of threat management or security analytics tools sees something suspicious, it generates a security alert, and therein lies the problem: Enterprise organizations are getting buried by an avalanche of security alerts. According to ESG research: When asked to identify their top incident response challenges, 36 percent of the cybersecurity professionals surveyed said, “keeping up with the volume of security alerts.” Forty-two percent of cybersecurity professionals say their organization ignores a significant number of security alerts because they can’t keep up with the volume.  When asked to estimate the percentage of security alerts ignored at their organization, 34 percent say between 26 percent and 50 percent, 20 percent of cybersecurity professionals say their organization ignores between 50 percent and 75 percent of security alerts, and 11 percent say their organization ignores more than 75 percent of security alerts. Mama Mia, that’s a lot of security alerts left on the cutting room floor.  All told, the ESG data indicates Continue reading