Archive

Category Archives for "Networking"

To DNSSEC or Not?

OARC held a 2-day meeting in February, with a set of presentations on various DNS topics. Here’s some observations that I picked up from the presentations in that meeting.

Aryaka to build new points of presence as enterprises shift to SaaS

Secure access service edge (SASE) and SD-WAN provider Aryaka is set to open 27 new points of presence in 21 countries and 15 major metropolitan areas, with the goal of delivering low-latency services to a broader potential client base.Aryaka's AppAssure routing and application performance solution will be present in all new and current POPs, providing SaaS-based application delivery across its network, according to a company announcement. Aryaka said it will also support wireless last-mile connectivity worldwide.To read this article in full, please click here

So long, and thanks for all the deployments: deprecating Wrangler v1

So long, and thanks for all the deployments:  deprecating Wrangler v1
So long, and thanks for all the deployments:  deprecating Wrangler v1

Cloudflare Workers allow developers to deploy code instantly across the globe. Wrangler is the CLI tool we build (and use!) to create, modify, and upload Workers. We recently announced a new version of Wrangler with a bunch of new features – including offline development, zero-config startup, and developer tools support. Since then, we’ve been working hard to make the developer experience with version 2 as smooth and enjoyable as possible. We’re confident in what we’ve built and are now planning to officially deprecate version 1.

What’s happening?

Version 1 of Wrangler (@cloudflare/wrangler on npm) is now deprecated, which means no new features or bug fixes will be published unless they’re critical. Beginning August 2023, no further updates will be provided and the Wrangler v1 GitHub repo will be archived. We strongly recommend you upgrade to version 2 (wrangler on npm) to receive continued support. We have a migration guide to make this process easy!

Why?

Our goal is to make development on the Cloudflare platform as smooth and enjoyable as possible. Whether that means simplifying common workflows, incorporating powerful tools into the Wrangler codebase, or opening up Wrangler for use as a library Continue reading

Oracle outages serve as warning for companies relying on cloud technology

Multiple Oracle Cloud Infrastructure (OCI) outages have hit users around the world this week, and coming after interruptions in Microsoft's cloud services last month, are a reminder of the importance of site engineering for systems administrators whose businesses rely on cloud-based mission critical applications.The biggest OCI outage this week began on 17:30 GMT Monday and stretched till Wednesday 22:30 GMT, impacting customers across North and South America, Australia, Asia Pacific, Middle East, Europe and Africa.“Oracle engineers identified a performance issue within the back-end infrastructure supporting the OCI Public DNS API, which prevented some incoming service requests from being processed as expected during the impact window,” the company said on its cloud infrastructure  website.To read this article in full, please click here

Kubernetes Unpacked 019: Understanding Service Meshes And Linkerd

In today's Kubernetes Unpacked podcast, we explore the concept of a service mesh and why you might want to run one in a Kubernetes cluster. While there are many service meshes to choose from we focus on Linkerd. Linkerd is available under an Apache 2.0 license and hosted by the Cloud Native Computing Foundation (CNCF).

The post Kubernetes Unpacked 019: Understanding Service Meshes And Linkerd appeared first on Packet Pushers.

Day Two Cloud 182: Assembling The Multicloud Networking Puzzle To Operate At Cloud Speed (Sponsored)

Today's Day Two Cloud assembles a panel to discuss the challenges of multicloud networking. We're sponsored by Prosimo, and the recording took place live at AWS re:Invent 2022. We discuss how and why an org goes multicloud, cloud networking issues, integrating ZTNA, and more.

The post Day Two Cloud 182: Assembling The Multicloud Networking Puzzle To Operate At Cloud Speed (Sponsored) appeared first on Packet Pushers.

Process monitoring: How you can detect malicious behavior in your containers

The default pod provisioning mechanism in Kubernetes has a substantial attack surface, making it susceptible to malevolent exploits and container breakouts. To achieve effective runtime security, your containerized workloads in Kubernetes require multi-layer process monitoring within the container.

In this article, I will introduce you to process monitoring and guide you through a Kubernetes-native approach that will help you enforce runtime security controls and detect unauthorized access of host resources.

What is process monitoring?

When you run a containerized workload in Kubernetes, several layers should be taken into account when you begin monitoring the process within a container. This includes container process logs and artifacts, Kubernetes and cloud infrastructure artifacts, filesystem access, network connections, system calls required, and kernel permissions (specialized workloads). Your security posture depends on how effectively your solutions can correlate disparate log sources and metadata from these various layers. Without effective workload runtime security in place, your Kubernetes workloads, which have a large attack surface, can easily be exploited by adversaries and face container breakouts.

Traditional monitoring systems

Before I dive into the details on how to monitor your processes and detect malicious activities within your container platform, let us first take a look at some of Continue reading

Cisco chips away at product backlog but challenges remain

Cisco is getting more products out the door, thanks to significant product redesigns and relentless efforts by its supply-chain team to address component shortages, but the situation is still challenging.“While components for a few product areas remain highly constrained, we did see an overall improvement in the supply chain,” said Cisco CEO Chuck Robbins during a call with financial analysts to discuss the vendor's second-quarter results. Cisco reduced its backlog 6% sequentially in the second quarter, however total backlog grew year over year, Robbins said, though he didn't cite an exact dollar figure. The company still expects to have a backlog that’s roughly double what it would normally be at the end of the year. (In February of last year, Cisco said its product backlog was valued at nearly $14 billion.)To read this article in full, please click here

Cisco chips away at product backlog but challenges remain

Cisco is getting more products out the door, thanks to significant product redesigns and relentless efforts by its supply-chain team to address component shortages, but the situation is still challenging.“While components for a few product areas remain highly constrained, we did see an overall improvement in the supply chain,” said Cisco CEO Chuck Robbins during a call with financial analysts to discuss the vendor's second-quarter results. Cisco reduced its backlog 6% sequentially in the second quarter, however total backlog grew year over year, Robbins said, though he didn't cite an exact dollar figure. The company still expects to have a backlog that’s roughly double what it would normally be at the end of the year. (In February of last year, Cisco said its product backlog was valued at nearly $14 billion.)To read this article in full, please click here

Cisco streamlines SD-WAN hardware and software at the edge

Cisco is adding compute power and streamlining edge hardware and software offerings to make SD-WAN easier to deploy and manage.Taken together enhancements are aimed at helping to better handle growing distributed enterprises but also to help simplify environments—the hardware by allowing users to collapse multiple devices into one, and the software to ease configuration and management of SD-WANs.On the hardware side, Cisco is adding the 3U, Catalyst 8500-20X6C edge platform to its Catalyst 8000 Edge Platforms Family. It is an edge aggregation device built on the Cisco’s quantum-flow processor (QFP) ASIC and promises more than three times the performance over the existing high-end Catalyst 8500 Series Edge Platform, according to Archana Khetan, head of products in Cisco’s Enterprise Routing group. “With the increased power, customers can support more users and collapse the number of boxes they need to support edge applications as needed,” Khetan said.To read this article in full, please click here

Feedback: Designing Active/Active and Disaster Recovery Data Centers

In the Designing Active-Active and Disaster Recovery Data Centers I tried to give networking engineers a high-level overview of challenges one might face when designing a highly-available application stack, and used that information to show why the common “solutions” like stretched VLANs make little sense if one cares about application availability (as opposed to auditor report). Some (customer) engineers like that approach; here’s the feedback I received not long ago:

As ever, Ivan cuts to the quick and provides not just the logical basis for a given design, but a wealth of advice, pointers, gotchas stemming from his extensive real-world experience. What is most valuable to me are those “gotchas” and what NOT to do, again, logically explained. You won’t find better material IMHO.

Please note that I’m talking about generic multi-site scenarios. From the high-level connectivity and application architecture perspective there’s not much difference between a multi-site on-premises (or collocation) deployment, a hybrid cloud, or a multicloud deployment.

AMD gains share in server market while overall x86 sales take a hit

AMD continues to gain ground in the data center, grabbing CPU market share from leader Intel despite a significant decline in server processor shipments.Overall, the processor market took a hit in the fourth quarter of 2022, as well as for the full year 2022, due to lower demand, ongoing inventory corrections, and a slowing economy, according to analyst firm Mercury Research.For 2022, total unit shipments (client and server, excluding ARM) were 374 million and revenues came in at $65 billion, down 21% and 19%, respectively, compared to 2021.Specific to server processors, sales for the year came in at 36.1 million units, down 4.2% from 37.7 million in 2021. Revenues were $24 billion in 2022, down 7.7% from $26 billion in 2021. Mercury’s principal analyst Dean McCarron attributes the sharper drop in revenue versus units because the average selling price (ASP) declined.To read this article in full, please click here

AMD gains share in server market while overall x86 sales take a hit

AMD continues to gain ground in the data center, grabbing CPU market share from leader Intel despite a significant decline in server processor shipments.Overall, the processor market took a hit in the fourth quarter of 2022, as well as for the full year 2022, due to lower demand, ongoing inventory corrections, and a slowing economy, according to analyst firm Mercury Research.For 2022, total unit shipments (client and server, excluding ARM) were 374 million and revenues came in at $65 billion, down 21% and 19%, respectively, compared to 2021.Specific to server processors, sales for the year came in at 36.1 million units, down 4.2% from 37.7 million in 2021. Revenues were $24 billion in 2022, down 7.7% from $26 billion in 2021. Mercury’s principal analyst Dean McCarron attributes the sharper drop in revenue versus units because the average selling price (ASP) declined.To read this article in full, please click here

Many ways to use the echo command on Linux

The echo command (a bash built-in) is one of the very basic commands on Linux. As with ls and pwd, you can't sit on the command line very long without using it. At the same time, echo has quite a few uses that many of us never take advantage of. So, this post looks into the many ways you can use this command.What is the echo command on Linux? Basically, echo is a command that will display any text that you ask it to display. However, when you type “echo hello”, the echo command isn't only spitting out those five letters, it's actually sending out six characters – the last one being a linefeed. Let's look at a couple of commands that make this obvious.To read this article in full, please click here