Today's IPv6 Buzz podcast gets into IPv6 architecture and subnetting including how geography fits into IPv6 subnetting, minimum allocation sizes from the RIR to end-users, whether current RIR policies will provide sufficient address space for a future-proof IPv6 architecture, and more. Our guest is Daryll Swer.
The post IPv6 Buzz 129: IPv6 Architecture And Subnetting With Daryll Swer appeared first on Packet Pushers.
Managers often ask employees to write a first draft of their performance review. If you’re expected to draft a performance summary, here are a few ideas to mitigate the stress of self evaluation and to help your manager help you.
The post Writing Your Own Performance Evaluation: Tips To Make It Not Suck appeared first on Packet Pushers.
Going from a tech role to manager is more than just a new gig---it's a full-blown career change. On today's Day Two Cloud we talk with management coach Steve Dwire about a manager's primary responsibilities, what new managers usually get wrong, management education vs. experience, and how to get better at the job. This episode goes places we didn't expect, so come along for the ride.
The post Day Two Cloud 200: Coaching For Accidental (And On-Purpose) Managers appeared first on Packet Pushers.
In my previous blog post, I discussed how transitioning from legacy monolithic applications to microservices based applications running on Kubernetes brings a range of benefits, but that it also increases the application’s attack surface. I zoomed in on creating security policies to harden the distributed microservice application, but another key challenge this transition brings is observing and monitoring the workload communication and known and unknown security gaps.
In a more traditional application architecture, traffic will flow between tiers of an application and will usually traverse a firewall, and at that point, can be observed and actioned. In Kubernetes, the network architecture is much flatter, and thus creates a challenge for the more traditional means of observing flows in the cluster.
However since Calico is able to secure workloads on this flat network, it also means it can observe these traffic flows, too. In fact, Calico can report far more data about these flows over what a traditional 5-tuple firewall would, allowing DevOps and Security teams to make more informed decisions to effectively secure their applications.
Traditional firewalls will report on five data types, or tuples, of a flow. Namely: