At times when I look at the tools available for server admins today I long for the times when I didn’t work in networking. Sure we can use tools like Puppet and Ansible for networking too. However the tools are made for servers. Of course there are tie-ins into network automation, but the functionality is rudimentary at best. The current problem as I see it is the lack of decent APIs, granted some vendors are better than others. And I haven’t had the pleasure of working with those who understand XML. Sometime in a not too distant future when we have flying skateboards, SDN and nano bots these problems will disappear, but we’re not there yet. Before I take a deep dive to see what’s actually possible to do with onePK, OpenDaylight and all that good stuff I wanted to see how much is possible to do today. So this post is about Ansible which is really simple to learn and SNMP, where one of the words in the acronym is “simple”. It should be a perfect match, right?
Continue reading
A quick post today, about how the A10 load balancer handles the recovery of a server based on health checks. Kind of a warning actually. A10 Health Monitor Configuration In order to determine when a service should be considered “up” … Continue reading
If you liked this post, please do click through to the source at A10 Service Failure Recovery and give me a share/like. Thank you!
I spent last week at the Strata + Hadoop World Conference in New York City with 5000 other “big data” customers, vendors, and enthusiasts. In the last 6 months we’ve seen demand for a “big data” based network infrastructure really start to take off, and I’ve spent a lot of time recently trying to better understand the evolving market and technology landscape and use cases. I’m particularly interested in how network infrastructure can drive a better experience for users of big data applications, or networking/infrastructure teams that need to support these applications, but ultimately I want to know what do businesses get out of these investments in data, analytics, and infrastructure.
[On a related note, as part of our efforts to provide the best “Big Data Fabric” we recently brought on @networkn3rd (Ed Henry) to Plexxi to fully define our reference architecture. Ed will be demo’ing the first fruits of his labor this Friday on SDN’s Central’s Demo Friday - Register Here].
Hadoop World was a really great experience. As a relative newbie to Big Data, I have a lot to learn and this was a great place to soak up actual customer use cases. While there was certainly Continue reading
Every time I’m running a classroom version of my Designing the Cloud Infrastructure workshop, I start with a simple question: “Who has more than 2000 VMs or bare-metal servers in the data center?”
I might see three hands on a good day; 90-95% of the audience have smaller data centers… and some of them get disappointed when I tell them they don’t need more than two ToR switches in their data center.
Read more ...Earlier today, I was listening to Risky Business show #341. In this show Matt Solnik discussed vulnerabilities that he attempted to share at BlackHat. I say attempted, because it sounds like they may have had some issues with audio/video during critical times of the presentation. Nonetheless, it seems like there are many vulnerable implementations of the open mobile administration device management (OMA-DM). I took a minute to dig up some of the videos published by Accuvant that makes this stuff real.
Disclaimer: This article includes the independent thoughts, opinions, commentary or technical detail of Paul Stewart. This may or may not reflect the position of past, present or future employers.
The post Vulnerable OMA-DM Implementations and Over the Air Hacks appeared first on PacketU.
Today I spent several hours reading up on PIM Bidirectional for an customer implementation on an ECMP networking. I realise that somewhere inside my head there is a lot of IP Multicast knowledge that hasn’t been lost but it is definitely hiding. I had to re-learn a number of concepts before I started feel confident. […]
The post Response: HowTo Configure IP Multicast PIM on ECMP| Mellanox Interconnect Community appeared first on EtherealMind.
Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
I was looking for a portable laptop stand as I have been starting to get neck pain hunched over my laptop all day. Working at home, in the office and on client sites I needed a laptop stand and it had to be portable. I searched the internet for portable laptop stands and apart from... [Read More]
Post taken from CCIE Blog
Original post The Ultimate Portable Laptop Stand – Rooststand !!
Last week, Twitter confirmed that they will start injecting tweets from users you don’t follow into your timeline. The collective cry from their user base ranged from outrage to a solid “meh”. It seems that Twitter has stumbled onto the magic formula that Facebook has perfected: create a feature the users don’t care about and force it onto them. Why?
Twitter Doesn’t Care About Power Users
Twitter has an interesting mix of users. They reported earlier this year that 44% of their user base has never tweeted. That’s a lot of accounts that were created for the purpose of reserving a name or following people in read-only mode. That must concern Twitter. Because people that don’t tweet can’t be measure for things like advertising. They won’t push the message of a sponsored tweet. They won’t add their voice to the din. But what about those users that tweet regularly?
Power users are those that tweet frequently without a large follower base. Essentially, everyone that isn’t a celebrity with a million followers or a non-tweeting account. You know, the real users on Twitter. The people that make typos in their tweets and actually check to see who follows them. The ones Continue reading
Getting advice is hard so it’s not every day you get to talk with two of the world’s foremost thinkers in the data center world. With Tom Burns (Vice President and General Manager, Dell Networking and Enterprise Infrastructure) and JR Rivers (Co-founder/CEO of Cumulus Networks) joining me, I will get that special privilege on November 20 when I host a webinar to discuss open networking in the software-defined data center (SDDC).
Yeah, I know what you’re thinking. Another webinar with a bunch of marketing buzzwords. Well, if you know these guys you know that won’t be the case. I’ll moderate the discussion by teeing up a few questions and getting out of their way.
We’re planning to discuss a number of topics that will be sure to provoke some strategic thinking on your part. We’ll discuss:
Whether you use A10, f5 or some other load balancer, you’re probably used to the idea of health monitors, or “health checks”. The load balancer periodically performs some kind of connectivity test to the servers that are used to service … Continue reading
If you liked this post, please do click through to the source at Secrets Behind A10 Health Monitors and give me a share/like. Thank you!
In psychology, there is a phenomenon called Outcome Bias, which basically means that we tend to judge the efficacy of a decision based primarily on how things turn out. After a decision is made, we rarely examine the conditions that existed at the time of the decision, choosing instead to evaluate performance based solely (or mostly) on whether the end result was positive or not.
But what happens as luck plays a role in outcomes? Did we actually make the best decision? Or was the result really a product of conditions outside of our control?
A relatively strong example of Outcome Bias can be found in the gambling world. Take poker, for instance. Many players will overplay the cards they are dealt. Imagine that you have four cards to a straight. There are two remaining cards to play. You might make bets that are statistically weak, but if the card you were looking for shows up, you will evaluate your own performance as strong for the hand. After all, you did win, right?
The challenge with Outcome Bias is that the fortuitous turn of events leads you play other hands in a similar way. Despite the fact Continue reading
During his Network Programmability 101 webinar Matt Oswalt described three phases of network programmability. The first level in the pyramid of programmable awesomeness (his words, not mine) is described in today’s video.
First Impressions of the OpenDaylight Helium Release
OpenDaylight introduced Helium last month, which is a major upgrade to its open source SDN controller. Here’s my take on its features, shortcomings and strengths from an engineering perspective.
Helium is the second software release from the OpenDaylight project and includes the following notable enhancements and new features:
With Helium there are no base, virtualization or service provider editions. Instead, bundles are supported through karaf features. Unlike the first (Hydrogen) release, Helium is targeted towards production environments.
Out of the Box Experience
After downloading the pre-built zip file, it is straightforward to run the karaf container with the ‘bin/karaf’ script. The ‘help’ command in the console provides a list of karaf commands Continue reading
I’ve been researching four different and distinct types of networking in the last few weeks. I’m finding that the cognition required to jump between technologies is making my head hurt. Here is a summary of four technology areas that interest me this week. Optical Networking As part of research project I have been getting deep […]
The post Confusing Times in Networking and Cognition Jumps appeared first on EtherealMind.
Finally this week I got myself in gear and decided it was time to have a play with Ansible. I found an installation guide on the Ansible documentation site and tried to follow it. Here follows the fun I had; … Continue reading
If you liked this post, please do click through to the source at Getting Started With Ansible and give me a share/like. Thank you!
In April 2013, Plexxi teamed up with SDNCentral to take a look at how the SDN market might emerge. The original post along with supporting info graphic and written analysis can be found here. At a high level, the major takeaway was that we predicted that between 30 and 40 percent of the networking market would be influenced by SDN by 2018. At the time, this was BY FAR the most aggressive take on SDN. IDC had been projecting a little more than $3B by 2018, which would put their estimates somewhere around 5% of the overall networking spend.
So 18 months later, how do I feel about the analysis?
In the original analysis, I made the point that SDN spend is not likely to be net-new dollars coming into the networking industry but rather a shift in dollars from traditional networking equipment to SDN-enabled equipment.
How’d I do? I’d say that this was spot on. Of course, this was the easiest of the predictions at the time. It is rare that dollars are created; they are usually shifted from somewhere else. Here, all I was really predicting was that the somewhere else was other Continue reading
The discussion in the comments to my LAG versus ECMP post took a totally unexpected turn when someone mentioned BFD failure detection over port channels (link aggregation groups – LAGs).
What’s the big deal?
Read more ...