Archive

Category Archives for "Networking"

A Journey To The AWS Advanced Networking Certification

There’s a trend to cloudify every aspect of IT. You might think that there’s no need to understand classical networking because “the cloud” solves problems related to routers and switches. The truth is that clouds have massive networks under the hood. Someone needs to connect cloud services and bring users to these clouds in a […]

The post A Journey To The AWS Advanced Networking Certification appeared first on Packet Pushers.

Response: Complexities of Network Automation

David Gee couldn’t resist making a few choice comments after I asked for his opinion of an early draft of the Network Automation Expert Beginners blog post, and allowed me to share them with you. Enjoy 😉


Network automation offers promises of reliability and efficiency, but it came without a warning label and health warnings. We seem to be perpetually stuck in a window display with sexily dressed mannequins.

Response: Complexities of Network Automation

David Gee couldn’t resist making a few choice comments after I asked for his opinion of an early draft of the Network Automation Expert Beginners blog post, and allowed me to share them with you. Enjoy 😉


Network automation offers promises of reliability and efficiency, but it came without a warning label and health warnings. We seem to be perpetually stuck in a window display with sexily dressed mannequins.

Free training from 8 top vendors to advance your IT career

Skill development has always been a must for anyone in an IT career, but this is especially true as cloud services mature and the components of cloud infrastructure trickle down into the rapidly evolving corporate data center.Whether you are looking to refresh existing skills on the latest technologies or branch out into a new specialty there are a host of invaluable resources available at no cost to you from some of the biggest vendors in the computing industry.The result for IT pros is that vendors’ marketing budget could very easily be your ticket to advancement should the skills they teach become needed where you work now or at a different organization.To read this article in full, please click here

Startup ECL promises off-the-grid green data centers

Startup ECL has emerged from stealth mode with some mighty big plans: to reinvent the data-center industry with hydrogen-powered modular data centers that use no local power and water.Rather than drawing power from the electrical grid the company will generate electricity for its data centers using hydrogen fuel cells. The only byproduct is water either as a liquid or vapor that is used for cooling with the leftovers being returned to the local environment. “So we can give back to the community some of the water that we’re producing,” said ECL founder and CEO Yuval Bachar, who previously helped design data centers for Facebook and LinkedIn.To read this article in full, please click here

Startup ECL promises off-the-grid green data centers

Startup ECL has emerged from stealth mode with some mighty big plans: to reinvent the data-center industry with hydrogen-powered modular data centers that use no local power and water.Rather than drawing power from the electrical grid the company will generate electricity for its data centers using hydrogen fuel cells. The only byproduct is water either as a liquid or vapor that is used for cooling with the leftovers being returned to the local environment. “So we can give back to the community some of the water that we’re producing,” said ECL founder and CEO Yuval Bachar, who previously helped design data centers for Facebook and LinkedIn.To read this article in full, please click here

Kubernetes network monitoring: What is it, and why do you need it?

In this article, we will dive into Kubernetes network monitoring and metrics, examining these concepts in detail and exploring how metrics in an application can be transformed into tangible, human-readable reports. The article will also include a step-by-step tutorial on how to enable Calico’s integration with Prometheus, a free and open-source CNCF project created for monitoring the cloud. By the end of the article, you will be able to create customized reports and graphical dashboards from the metrics that Calico publishes to get better insight into the inner workings of your cluster and its various components. In addition, you will have the fundamental knowledge of how these pieces can fit together to establish Kubernetes network monitoring for any environment.

Background

The benefits offered by cloud computing and infrastructure as code, including scalability, easy distribution, and quick and flexible deployment, have caused cloud service adoption to skyrocket. But this rapid adoption requires checks and balances to ensure that cloud services are secure and running in their desired state. Furthermore, any security events and problems should be logged and reported for future examination.

Read our guide on Kubernetes logging: Approaches and best practices

In the past, traditional monitoring solutions such as Nagios Continue reading

CVE-2022-47929: traffic control noqueue no problem?

CVE-2022-47929: traffic control noqueue no problem?
CVE-2022-47929: traffic control noqueue no problem?

USER namespaces power the functionality of our favorite tools such as docker, podman, and kubernetes. We wrote about Linux namespaces back in June and explained them like this:

Most of the namespaces are uncontroversial, like the UTS namespace which allows the host system to hide its hostname and time. Others are complex but straightforward - NET and NS (mount) namespaces are known to be hard to wrap your head around. Finally, there is this very special, very curious USER namespace. USER namespace is special since it allows the - typically unprivileged owner to operate as "root" inside it. It's a foundation to having tools like Docker to not operate as true root, and things like rootless containers.

Due to its nature, allowing unprivileged users access to USER namespace always carried a great security risk. With its help the unprivileged user can in fact run code that typically requires root. This code is often under-tested and buggy. Today we will look into one such case where USER namespaces are leveraged to exploit a kernel bug that can result in an unprivileged denial of service attack.

Enter Linux Traffic Control queue disciplines

In 2019, we were exploring leveraging Linux Traffic Control's queue Continue reading

Red Hat Enterprise Linux arrives in Oracle’s cloud

Red Hat and Oracle announced jointly Tuesday that they have partnered to bring Red Hat Enterprise Linux (RHEL) to Oracle Cloud Infrastructure, broadening Oracle’s available public cloud options and creating a measure of détente between two long-standing competitors.The announcement couched the news as step one in a broader partnership between Red Hat and Oracle, but provided details mostly of the OCI integration. RHEL will be available on Oracle’s VMs, ranging in size from 1 to 80 CPU cores and from 1GB of memory up to 1024GB. Initial support will be limited to the newer OCI virtual machine shapes, which use AMD, Intel and Arm processors.To read this article in full, please click here