Archive

Category Archives for "Networking"

Building A Turnkey DPU Solution – Packet Pushers Livestream With Dell Technologies – Video

Dell Technologies and VMware have partnered on a turnkey HCI-based VxRail solution that integrates VMware’s vSphere Distributed Services Engine and DPU hardware from NVIDIA and AMD Pensando. In this video, Ethan Banks from the Packet Pushers and Joseph White, Fellow at Dell Technologies, discuss how the software and hardware come together to take advantage of […]

The post Building A Turnkey DPU Solution – Packet Pushers Livestream With Dell Technologies – Video appeared first on Packet Pushers.

Heavy Networking 667: Broadcom’s NetOps Delivers End-User Visibility Into SD-WAN (Sponsored)

In today’s Heavy Networking show with sponsor Broadcom we go deep into network management and Digital Experience Monitoring (DEM). At its heart, DEM is about understanding the user experience of the network. Network monitoring and management products that incorporate user experience, such as Broadcom's DX NetOps, can provide visibility into network and application performance to help inform troubleshooting efforts and speed resolution.

The post Heavy Networking 667: Broadcom’s NetOps Delivers End-User Visibility Into SD-WAN (Sponsored) appeared first on Packet Pushers.

Heavy Networking 667: Broadcom’s NetOps Delivers End-User Visibility Into SD-WAN (Sponsored)

In today’s Heavy Networking show with sponsor Broadcom we go deep into network management and Digital Experience Monitoring (DEM). At its heart, DEM is about understanding the user experience of the network. Network monitoring and management products that incorporate user experience, such as Broadcom's DX NetOps, can provide visibility into network and application performance to help inform troubleshooting efforts and speed resolution.

Deleting Stuff from Netbox with Pynetbox

As a warning to everyone, I am not a developer. I am a network engineer who is trying to do some automation stuff. Some of what I’m doing sounds logical to me, but I would not trust my own opinions for production work. I’m sure you can find a Slack channel or Mastodon instance with people who can tell you how to do things properly.

We’ve added stuff and updated stuff, so let’s delete some stuff. “Hey, man…you already did that,” you say? You’re right! When we started creating API tokens based on user/pass, we made sure to delete the token at the end. That means we should all be professional pynetbox deleters, then, right? 🙂

When using pynetbox, we mostly deal with object. When updating, we get the object, make changes, then save it back to Netbox. We don’t say “update object 38718 with a new widget”; you actually manipulate an object. When we delete something, we do the same thing…get the object and delete it. Here’s a snippet of the token cleanup script to show that.

<SNIP>
all_tokens = nb_conn.users.tokens.all()

for token in all_tokens:
    <SNIP>
    token.delete()

<SNIP>

Don’t think on the logic of this Continue reading

Bullet-Proofing Your 5G Security Plan

With latency improvements and higher data speeds, 5G represents exponential growth opportunities with the potential to transform entire industries — from fueling connected autonomous vehicles, smart cities, mixed reality technologies, robotics and more. As enterprises rethink connectivity, 5G will be a major investment area. However, according to Palo Alto Networks’

Join VMware Networking and Security at Mobile World Congress

VMware NSX Powers Service Acceleration and Energy Efficiency for VMware Telco Cloud Platform

Mobile World Congress 2023 is upon us and that means new features and cool innovations to help telcos manage their increasingly complicated 5G networks. This year, we are focused on building smarter networks and increasing telco efficiency. These networks are expanding the concept of network functions virtualization (NFV), introduced over 10 years ago, to build a virtualized software-defined architecture with virtual network functions (VNF) and cloud-native network functions (CNF).

Modern telco networks depend on flexibility, scalability and security. The network demands constantly change requiring an integrated orchestration and automation strategy across different services and technologies. All of this needs to be done with an eye on efficiency, optimizing the human resources along with the energy and infrastructure requirements. VMware NSX platform is a key technology to enable these benefits.

The VMware Telco Cloud Platform is designed to address these challenges that Communications Service Providers (CSPs) face. The Telco Cloud Platform is a solution that integrates key VMware components (vSphere, vSAN, and NSX) to create a cloud and virtualization architecture for 5G core networks and their VNF/CNF environment. VMware NSX powers the Telco Cloud Platform to provide telco-grade Continue reading

ROFL with a LOL: rewriting an NGINX module in Rust

ROFL with a LOL: rewriting an NGINX module in Rust
ROFL with a LOL: rewriting an NGINX module in Rust

At Cloudflare, engineers spend a great deal of time refactoring or rewriting existing functionality. When your company doubles the amount of traffic it handles every year, what was once an elegant solution to a problem can quickly become outdated as the engineering constraints change. Not only that, but when you're averaging 40 million requests a second, issues that might affect 0.001% of requests flowing through our network are big incidents which may impact millions of users, and one-in-a-trillion events happen several times a day.

Recently, we've been working on a replacement to one of our oldest and least-well-known components called cf-html, which lives inside the core reverse web proxy of Cloudflare known as FL (Front Line). Cf-html is the framework in charge of parsing and rewriting HTML as it streams back through from the website origin to the website visitor. Since the early days of Cloudflare, we’ve offered features which will rewrite the response body of web requests for you on the fly. The first ever feature we wrote in this way was to replace email addresses with chunks of JavaScript, which would then load the email address when viewed in a web browser. Since bots are often unable Continue reading

Secret Sauce – vSphere Distributed Services Engine – Packet Pushers Livestream w/ Dell Technologies – Video

The vSphere Distributed Services Engine, part of vSphere 8.0, aims to help accelerate infrastructure network functions on the DPU. It enables modern distributed workloads to run with lower network latency and improved data throughput and provides more CPU resources to workloads and reduces operational overhead of DPU lifecycle management with integrated vSPhere workflows. In this […]

The post Secret Sauce – vSphere Distributed Services Engine – Packet Pushers Livestream w/ Dell Technologies – Video appeared first on Packet Pushers.

Digital platform conductors help manage hybrid networks

One of the biggest technology challenges organizations face is managing an increasingly complex environment that might include multiple cloud services and providers, on-site data centers, edge systems and other components.An emerging solution is an orchestration tool that taps into cloud management data, edge systems and on-premises infrastructure to provide a full picture of the environment and come up with recommendations to improve the flow of business workloads, cut costs, and streamline processes.To read this article in full, please click here

Digital Platform Conductor (DPC) tools help manage hybrid infrastructure

One of the biggest technology challenges organizations face is managing an increasingly complex environment that might include multiple cloud services and providers, on-site data centers, edge systems and other components.An emerging solution is an orchestration tool that taps into cloud management data, edge systems and on-premises infrastructure to provide a full picture of the environment and come up with recommendations to improve the flow of business workloads, cut costs and streamline processes.To read this article in full, please click here

Video: Packet Buffers in Data Center ASICs

A few years ago, we were fortunate enough to have Pete Lumbis talking about ASICs for Networking Engineers as part of the Data Center Fabric Architectures webinar.

One of the topics he couldn’t possible skip was the question of how many packet buffers one needs in a data center switch.

Case Study: VPP at Coloclue, part 2

Yoloclue

  • Author: Pim van Pelt, Rogier Krieger
  • Reviewers: Coloclue Network Committee
  • Status: Draft - Review - Published

Almost precisely two years ago, in February of 2021, I created a loadtesting environment at [Coloclue] to prove that a provider of L2 connectivity between two datacenters in Amsterdam was not incurring jitter or loss on its services – I wrote up my findings in [an article], which demonstrated that the service provider indeed provides a perfect service. One month later, in March 2021, I briefly ran [VPP] on one of the routers at Coloclue, but due to lack of time and a few technical hurdles along the way, I had to roll back [ref].

The Problem

Over the years, Coloclue AS8283 continues to suffer from packet loss in its network. Taking a look at a simple traceroute, in this case from IPng AS8298, shows very high variance and packetlo when entering the network (at hop 5 in a router called eunetworks-2.router.nl.coloclue.net):

                                       My traceroute  [v0.94]                
squanchy.ipng.ch (194.1.193.90) -> 185.52.227.1                           2023-02-24T09:03:36+0100
Keys:  Help   Display mode   Restart statistics   Order of fields   quit
                                                          Packets               Pings
  Continue reading

HP Enterprise buys Athonet for its 5G portfolio

Looking to make a long-term splash in private-enterprise 5G, HPE has grabbed up Italian private cellular technology maker Athonet  for an undisclosed amount.Founded in 2005, Athonet says its goal is to speed and simplify private 5G deployments. Among other packages, it offers CBRS and 5G starter kits that include Athonet mobile packet core, SIM cards, a choice of radio and other components needed to set up private cellular networks quickly. In 2022 the company formed the 5G Consortium to bring vendors together to develop a 5G ecosystem. The group includes Google Cloud, AWS, Airspan, Bearcom, and Digi.Athonet technology will expand HPE’s 5G portfolio, which includes private 5G equipment integrated with its Aruba Wi-Fi gear to provide the option of using the technology that best meets enterprise requirements. HPE also has integrated 5G core technology it offers to service providers.To read this article in full, please click here

OARC 40

OARC held a 2-day meeting in February, with a set of presentations on various DNS topics. Here’s some observations that I picked up from the presentations in that meeting.

Navigating the security challenges of multi-tenancy in a cloud environment

Multi-tenancy can maximize the number of resources that are utilized in a cluster by sharing these resources between different groups, teams, or customers. However, boundaries must be placed to avoid problems associated with resource-sharing. On top of that, in a multi-tenant cluster, the number of security policies might gradually grow to the point where a slight misconfiguration could cause major security problems, performance issues, and service disruptions.

In this blog post, we will focus on multi-tenancy issues such as bandwidth shortage, security policy scaling, privacy impacts, and suggest a few solutions that you can deploy to solve them in your environment. We will also look at how an eBPF-based security design can offer better performance and help you navigate the complex multi-tenant environment with ease.

What is multi-tenancy?

Technologies such as virtualization, containerization, or any other technologies that allow a range of different workloads to share the underlying hardware resources, all have a common goal—allocate resources as efficiently as possible and make the most of the available hardware. However, it is common for workloads that are running in such an environment to not fully utilize all the potential power that the hardware can offer, and in many cases, leave a Continue reading

Bringing It All Together – VMware Project Monterey – Packet Pushers Livestream w/ Dell Technologies – Video

VMware’s Project Monterey creates a virtual environment to run applications and services on Data Processing Units (DPUs). VMware is partnering with multiple server OEMs and DPU vendors to bring Project Monterey to distributed infrastructure. In this video, Drew Conry-Murray from the Packet Pushers is joined by VMware’s Paul Turner, Vice President Product Management vSphere. We […]

The post Bringing It All Together – VMware Project Monterey – Packet Pushers Livestream w/ Dell Technologies – Video appeared first on Packet Pushers.

One year of war in Ukraine: Internet trends, attacks, and resilience

One year of war in Ukraine: Internet trends, attacks, and resilience
One year of war in Ukraine: Internet trends, attacks, and resilience

The Internet has become a significant factor in geopolitical conflicts, such as the ongoing war in Ukraine. Tomorrow marks one year since the Russian invasion of that country. This post reports on Internet insights and discusses how Ukraine's Internet remained resilient in spite of dozens of disruptions in three different stages of the conflict.

Key takeaways:

  • Internet traffic shifts in Ukraine are clearly visible from east to west as Ukrainians fled the war, with country-wide traffic dropping as much as 33% after February 24, 2022.
  • Air strikes on energy infrastructure starting in October led to widespread Internet disruptions that continue in 2023.
  • Application-layer cyber attacks in Ukraine rose 1,300% in early March 2022 compared to pre-war levels.
  • Government administration, financial services, and the media saw the most attacks targeting Ukraine.
  • Traffic from a number of networks in Kherson was re-routed through Russia between June and October, subjecting traffic to Russia’s restrictions and limitations, including content filtering. Even after traffic ceased to reroute through Russia, those Ukrainian networks saw major outages through at least the end of the year, while two networks remain offline.
  • Through efforts on the ground to repair damaged fiber optics and restore electrical power, Ukraine’s networks have Continue reading