Earlier this month at Cisco Live in Las Vegas, I attended a presentation by Steven Carter and Jason King titled Model-Driven DevOps: The Enterprise Automation Framework You've Been Looking For! They discussed the importance of robustly modeling your network data — a quality very dear to me, as you might expect — and having a clear strategy for automating changes, and shared an example automation architecture for reference. It was a refreshing take on introducing network engineers to DevOps methodologies, and the first time I've seen anyone clearly map software development practices to network automation.
Interested to dive deeper into the material than a 45-minute session would allow, I was pleased to learn that their talk derived from a book of the same name that they co-authored. Coupled with the lingering geeky high from Cisco Live, it made for an excellent read on the flight back home.

The book's content is broken into seven easily digestible chapters, each dedicated to a particular step along a path toward network automation:
Today's IPv6 Buzz podcast gets into IPv6 architecture and subnetting including how geography fits into IPv6 subnetting, minimum allocation sizes from the RIR to end-users, whether current RIR policies will provide sufficient address space for a future-proof IPv6 architecture, and more. Our guest is Daryll Swer.
The post IPv6 Buzz 129: IPv6 Architecture And Subnetting With Daryll Swer appeared first on Packet Pushers.
Managers often ask employees to write a first draft of their performance review. If you’re expected to draft a performance summary, here are a few ideas to mitigate the stress of self evaluation and to help your manager help you.
The post Writing Your Own Performance Evaluation: Tips To Make It Not Suck appeared first on Packet Pushers.
Going from a tech role to manager is more than just a new gig---it's a full-blown career change. On today's Day Two Cloud we talk with management coach Steve Dwire about a manager's primary responsibilities, what new managers usually get wrong, management education vs. experience, and how to get better at the job. This episode goes places we didn't expect, so come along for the ride.
The post Day Two Cloud 200: Coaching For Accidental (And On-Purpose) Managers appeared first on Packet Pushers.
In my previous blog post, I discussed how transitioning from legacy monolithic applications to microservices based applications running on Kubernetes brings a range of benefits, but that it also increases the application’s attack surface. I zoomed in on creating security policies to harden the distributed microservice application, but another key challenge this transition brings is observing and monitoring the workload communication and known and unknown security gaps.
In a more traditional application architecture, traffic will flow between tiers of an application and will usually traverse a firewall, and at that point, can be observed and actioned. In Kubernetes, the network architecture is much flatter, and thus creates a challenge for the more traditional means of observing flows in the cluster.
However since Calico is able to secure workloads on this flat network, it also means it can observe these traffic flows, too. In fact, Calico can report far more data about these flows over what a traditional 5-tuple firewall would, allowing DevOps and Security teams to make more informed decisions to effectively secure their applications.
Traditional firewalls will report on five data types, or tuples, of a flow. Namely: