If you want to issue something quick on a lot of devices, you don’t need to write a whole Ansible playbook to do that. In fact you don’t really need the Junos module installed.
Ansible expects there to be Python on the managed device. As you can read in this PacketPushers blog, it pushes the module out to the device and tries to execute it there. Junos is going to get on-box Python at some point, but right now that’s roadmap (or SOPD if you must).
Suppose you want to find out what version of software you have on a your lab device, here’s a quick way to do that.
$ ansible 192.168.30.20 -m raw -a "show version" -u username -k SSH password: 192.168.30.20 | SUCCESS | rc=0 >> fpc0: -------------------------------------------------------------------- Model: ex2200-24t-4g JUNOS Base OS boot [12.3R12.4] JUNOS Base OS Software Suite [12.3R12.4] JUNOS Kernel Software Suite [12.3R12.4] JUNOS Crypto Software Suite [12.3R12.4] JUNOS Online Documentation [12.3R12.4] JUNOS Enterprise Software Suite [12.3R12.4] JUNOS Packet Forwarding Engine Enterprise Software Suite [12.3R12.4] JUNOS Routing Software Suite [12.3R12.4] JUNOS Web Management Continue reading
A debate is starting to roil the networking community, centered around the amount of sprawl network virtualization might spawn across the enterprise.
The last few weeks have seen several high-profile outages in legacy DNS and DDoS-mitigation services due to large scale attacks. Cloudflare's customers have, understandably, asked how we are positioned to handle similar attacks.
While there are limits to any service, including Cloudflare, we are well architected to withstand these recent attacks and continue to scale to stop the larger attacks that will inevitably come. We are, multiple times per day, mitigating the very botnets that have been in the news. Based on the attack data that has been released publicly, and what has been shared with us privately, we have been successfully mitigating attacks of a similar scale and type without customer outages.
I thought it was a good time to talk about how Cloudflare's architecture is different than most legacy DNS and DDoS-mitigation services and how that's helped us keep our customers online in the face of these extremely high volume attacks.
Before delving into our architecture, it's worth taking a second to think about another analogous technology problem that is better understood: scaling databases. From the mid-1980s, when relational databases started taking off, through the early 2000s the way companies thought of scaling Continue reading
Noction is pleased to announce the release of IRP 3.6. The major feature available in the new product version is the capability
The post Noction announces the release of IRP 3.6 appeared first on Noction.
EMA finds that the rise of internet connectivity for next-gen WAN does not spell the death of MPLS.