This post originally appeared on the Packet Pushers’ now-defunct Ignition site on September 17, 2019. I have a lot of respect for people who focus on network automation and the people at Network To Code are top notch at helping and giving to open source. However, I do mostly disagree with this take on […]
The post Is Automation A Full-Time Career? appeared first on Packet Pushers.
In the last post on this topic, I concluded that IP addresses are protected information—operators should handle users’ IP addresses according to privacy best practices. But I also concluded that because IP addresses used for forwarding— Are collected (or carried through the network) only for forwarding The user cannot reasonably expect the network to forward […]
The post Privacy And Networking Part 4: Logging appeared first on Packet Pushers.
This video offers a brief introduction to essential Kubernetes networking constructs: ingress and service mesh, including product examples. Ingress is a proxy that manages access to services within a Kubernetes cluster. A service mesh connects applications or services within the cluster. Host Michael Levan brings his background in system administration, software development, and DevOps to […]
The post Kubernetes For Network Engineers – Lesson 5: Ingress And Service Mesh – Video appeared first on Packet Pushers.

When I was a lad in high school I worked for Walmart. I learned quite a bit about retail at my early age but one of the fascinating things I used in the late 1990s was a wireless inventory unit, colloquially known as a Telxon. I was amazed by the ability to get inventory numbers on a device without a cable. Since this was prior to the adoption of IEEE 802.11 it was a proprietary device that only worked with that system.
Flash forward to the 2020s. I went to Walmart the other day to look for an item and I couldn’t find it. I asked one of the associates if it was in stock. They said they could check and pulled out their phone. To my surprise they were able to launch an app and see that it was in stock in the back. As I waited for them to return with the item I thought about how 25 years of progress had changed that hardware solution into something software focused.
All problems start as hardware problems. If there’s a solution to an issue you’re going to build something first. Need to get somewhere fast? Trains Continue reading
In today’s sponsored Heavy Networking podcast we dive into Juniper Cloud Metro, which includes new appliances, software, and integrations with other Juniper services to address the entire business of ownership and operations. Our guests are Kanika Atri, Sr. Director, Product Management; and Tim Pennell, Sr. Director, Product Management.
The post Heavy Networking 639: Juniper Cloud Metro Boosts Metro Performance, Efficiency And Sustainability (Sponsored) appeared first on Packet Pushers.
In this lesson, instructor Josh Vanderaa explores how to work with templates to build configuration stanzas. You’ll also see various methods for working with Jinja2 templates, including: Template from a file to a file Template from a file to an IOS device You can subscribe to the Packet Pushers’ YouTube channel for more videos as […]
The post Ansible For Network Automation Lesson 7: Templating With Ansible – Video appeared first on Packet Pushers.
Since the inception of Kubernetes, the goal has been to make our lives as engineers easier. But with great power comes great responsibility---which in this case is the need to manage a bunch of control planes and worker nodes! Host Michael Levan catches up with Jason Haley, Microsoft MVP and independent consultant to talk about serverless Kubernetes with Azure Container Apps.
The post Kubernetes Unpacked 005: Serverless Kubernetes In Azure appeared first on Packet Pushers.

There is a rising concern about the security of open source projects—particularly in terms of open source software supply chain. Alistair Woodman, who works closely with multiple open source software projects, joins Tom and Russ to discuss the reality of securing open source projects. The final answer? Essentially, buyer—or in the case of open source software, user—beware.