Archive

Category Archives for "Networking"

Full Stack Journey 065: Developer Tools And Practices Other IT Disciplines Can Adopt

Today's Full Stack Journey asks: Are there tools, techniques, or practices common to software development that other IT disciplines should consider adopting? Can these tools and practices help other IT disciplines improve automation, operations, and daily tasks? Guests Adeel Ahmad and Kurt Seifried join host Scott Lowe to discuss.

The post Full Stack Journey 065: Developer Tools And Practices Other IT Disciplines Can Adopt appeared first on Packet Pushers.

Practical Python For Networking: 6.1 Python Packages – Introduction To Packages – Video

This lesson introduces packages, which let you bundle together different Python modules to re-use and share. Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Additional Resources: Packages Tutorial: https://docs.python.org/3/tutorial/modules.html#packages Python Modules And Packages: An Introduction: https://realpython.com/python-modules-packages/ Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft […]

The post Practical Python For Networking: 6.1 Python Packages – Introduction To Packages – Video appeared first on Packet Pushers.

Building many private virtual networks through Cloudflare Zero Trust

Building many private virtual networks through Cloudflare Zero Trust

We built Cloudflare’s Zero Trust platform to help companies rely on our network to connect their private networks securely, while improving performance and reducing operational burden. With it, you could build a single virtual private network, where all your connected private networks had to be uniquely identifiable.

Starting today, we are thrilled to announce that you can start building many segregated virtual private networks over Cloudflare Zero Trust, beginning with virtualized connectivity for the connectors Cloudflare WARP and Cloudflare Tunnel.

Connecting your private networks through Cloudflare

Consider your team, with various services hosted across distinct private networks, and employees accessing those resources. More than ever, those employees may be roaming, remote, or actually in a company office. Regardless, you need to ensure only they can access your private services. Even then, you want to have granular control over what each user can access within your network.

This is where Cloudflare can help you. We make our global, performant network available to you, acting as a virtual bridge between your employees and private services. With your employees’ devices running Cloudflare WARP, their traffic egresses through Cloudflare’s network. On the other side, your private services are behind Cloudflare Tunnel, accessible Continue reading

Marcelo Affonso and Rebecca Weekly: Why we joined Cloudflare

Marcelo Affonso and Rebecca Weekly: Why we joined Cloudflare
Marcelo Affonso and Rebecca Weekly: Why we joined Cloudflare

Marcelo Affonso (VP of Infrastructure Operations) and Rebecca Weekly (VP of Hardware Systems) recently joined our team. Here they share their journey to Cloudflare, what motivated them to join us, and what they are most excited about.

Marcelo Affonso - VP of Infrastructure Operations

I am thrilled to join Cloudflare and lead our global infrastructure operations. My focus will be building, expanding, optimizing, and accelerating Cloudflare’s fast-growing infrastructure presence around the world.

Recently, I have found myself reflecting on how central the Internet has become to the lives of people all over the world. We use the Internet to work, to connect with families and friends, and to get essential services. Communities, governments, businesses, and cultural institutions now use the Internet as a primary communication and collaboration layer.

But on its own, the Internet wasn’t architected to support that level of use. It needs better security protections, faster and more reliable connectivity, and more support for various privacy preferences. What’s more, those benefits can’t just be available to large businesses. They need to be accessible to a full range of communities, governments, and individuals who now rely on the Internet. And they need to be accessible in various ways to Continue reading

Netlify CEO on Why Netlify Edge Functions Was Built on Deno

The web development platform Matt Biilmann. In an interview with The New Stack, he described how looking to the future inspired the vision for the company’s latest product. “As we’re building out our edge network and as we start seeing this category mature, with people building more complex projects in a variety of industries, I believed we’d see a new layer emerge where developers could easily write code that would run on the edge. In the beginning, we weren’t sure what that layer would look like or what it would do. We spent a lot of time investigating WebAssembly as the runtime mechanism but ultimately decided against it. In 2020, we moved our efforts from WASM to our own JavaScript-based edge runtime.” “The standard JS runtimes like Node.js aren’t really built to be run in a totally multitenant environment or unique process isolation, so we had to start building our own.” Matt Biilmann, Netlify CEO A year ago, Netlify’s first version of Edge Functions (named Edge Handlers at the Continue reading

Google Cloud launches Media CDN based on YouTube’s network

Google Cloud has launched a new media and content delivery network (CDN) platform called Media CDN that allows large media and streaming customers to tap into Google’s global YouTube network.The new platform blends the same infrastructure as the Google-owned video streaming service, with Google Cloud’s existing Cloud CDN portfolio. Customers will have access to a range of APIs and automation tools, while pre-aggregated metrics and playback tracing will allow users to monitor performance across the entire infrastructure stack. The platform also offers integrations with Google Cloud’s operations suite and other observability tools such as Grafana and ElasticSearch.To read this article in full, please click here

Detecting Byzantine Link Failures with SNMP

One of my readers has to deal with a crappy Network Termination Equipment (NTE)1 that does not drop local link carrier2 when the remote link fails. Here’s the original ASCII art describing the topology:

PE---------------NTE--FW---NMS 
  <--------IP-------->

He’d like to use interface SNMP counters on the firewall to detect the PE-NTE link failure. He’s using static default route toward PE on FW, and tried to detect the link failure with ifOutDiscards counter.

Tools 10. Developing Our Own Cross-platform (AMD64/ARM32) Traceroute Prometheus Exporter for Network Monitoring using Python

Hello my friend,

This is the third and the last (at least for the time being ) blogpost about monitoring of the infrastructure with Prometheus, one of the most powerful and popular open source time series database and metrics collection framework. In today’s talk we’ll cover the build of our own Prometheus exporter, which performs trace route checks.


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

Why to Automate Monitoring?

Many tools nowadays give you possibility not only to collect metrics, but also to act perform a simple )(or complex) analysis and act based on the result of such an analysis. So can Prometheus. With a help of the Alertmanager, it is possible to send a REST API request upon certain condition, which would trigger an automation activity or a workflow to act upon the business logic needed for the condition, such as remediation and/or configuration. This is why you need to know how the network automation works at a good level.

And we Continue reading

How to cheat on Wordle using Linux

Wordle—the online game that gives you six tries to guess a five-letter word—has gone viral recently, and while it’s fun, it can also be pretty hard. So, as a bash-scripting enthusiast, I figured I'd see if I could come up with a script that would help me cheat.The game itself is fairly simple. After you enter a five-letter guess, the game indicates which of its letters are not in the mystery word by setting them off on a gray background, which ones are in the word but in the wrong location (orange background), and which ones are in the word and located in the right place (green background). Each guess must be a known English word, no capitals, no punctuation.To read this article in full, please click here

How to cheat on Wordle using Linux

Wordle—the online game that gives you six tries to guess a five-letter word—has gone viral recently, and while it’s fun, it can also be pretty hard. So, as a bash-scripting enthusiast, I figured I'd see if I could come up with a script that would help me cheat.The game itself is fairly simple. After you enter a five-letter guess, the game indicates which of its letters are not in the mystery word by setting them off on a gray background, which ones are in the word but in the wrong location (orange background), and which ones are in the word and located in the right place (green background). Each guess must be a known English word, no capitals, no punctuation.To read this article in full, please click here

BrandPost: Digital Revolutionaries: How Visionary Leaders are Modernizing Network Architecture

By: Sylvia Hooks, CMO at Aruba, a Hewlett Packard Enterprise company.Big ideas come from inspired people who believe they have a better way. Over the course of the past year, Aruba, a Hewlett Packard Enterprise company, scoured the globe to meet those inspired people. We call them “digital revolutionaries,” those who have incorporated Aruba’s technological capabilities to reimagine a world of new possibilities, whether to improve personal experiences or to achieve specific business priorities.Aruba now brings those stories to you with the Digital Revolutionaries ebook.To read this article in full, please click here

BrandPost: Digital Revolutionaries: How Visionary Leaders are Modernizing Network Architecture

By: Sylvia Hooks, CMO at Aruba, a Hewlett Packard Enterprise company.Big ideas come from inspired people who believe they have a better way. Over the course of the past year, Aruba, a Hewlett Packard Enterprise company, scoured the globe to meet those inspired people. We call them “digital revolutionaries,” those who have incorporated Aruba’s technological capabilities to reimagine a world of new possibilities, whether to improve personal experiences or to achieve specific business priorities.Aruba now brings those stories to you with the Digital Revolutionaries ebook.To read this article in full, please click here

Tech Bytes: Why The Network Is Essential For Securing Hybrid IT (Sponsored)

Today’s Tech Bytes podcast gets into networking and security. More specifically, despite what you might hear about cloud taking over, the network still matters, and is essential to an organization’s security strategy, especially as cloud adoption and remote work drive the need for hybrid IT. We’re going to address this topic with sponsor Fortinet.

The post Tech Bytes: Why The Network Is Essential For Securing Hybrid IT (Sponsored) appeared first on Packet Pushers.

MPLS, SDN, even SD-WAN can give you the network observability you need

What do router networks and a preschool have in common? A lot more than you think. Read on for the answer.To the average enterprise, “network” means “router network”. It’s not that there aren’t other things in the network, but that the whole of enterprise networking is about building IP connectivity. We’ve invented a bunch of terms to describe the elements of our IP networks, and it seems like we’re adding new ones every day.  As we do, a growing number of enterprises are finding that they don’t know as much about their networks’ operation as they need to; they don’t have “observability”. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

BGP Policies (Part 5)

At the most basic level, there are only three BGP policies: pushing traffic through a specific exit point; pulling traffic through a specific entry point; preventing a remote AS (more than one AS hop away) from transiting your AS to reach a specific destination. In this series I’m going to discuss different reasons for these kinds of policies, and different ways to implement them in interdomain BGP.

In this post I’m going to cover AS Path Prepending from the perspective of AS65001 in the following network—

Since the length of the AS Path plays a role in choosing which path to use when forwarding traffic towards a given reachable destination, many (if not most) operators prepend the AS Path when advertising routes to a peer. Thus an AS Path of [65001], when advertised towards AS65003, can become [65001,65001] by adding one prepend, [65001,65001,65001] by adding two prepends, etc. Most BGP implementations allow an operator to prepend as many times as they would like, so it is possible to see twenty, thirty, or even higher numbers of prepends.
Note: The usefulness of prepending is generally restricted to around two or three, as the average length of an AS Path in the Continue reading