Archive

Category Archives for "Networking"

Community Spotlight series: Calico Open Source user insights from cloud solutions architect, Geoff Burke

In the first installment of our Community Spotlight series, I asked Geoff Burke from Tsunati to share his experience with Kubernetes and Calico Open Source. Geoff talks about how he got started with Kubernetes, the challenges that led him to search for a Container Network Interface (CNI), and why he has chosen Calico Open Source as his preferred CNI.

If you are just getting started with Kubernetes and curious about where other people start their journey, this blog post provides valuable insight and information.

Q: Please tell us a little bit about yourself, including where you currently work and what you do there.

I’m currently a senior cloud solutions architect at Tsunati. We are a data protection company and we focus on backup and recovery, mainly trying to help service providers enhance their services. We have a lot of virtualization expertise. In fact, I am a Veeam legend and a Veeam Vanguard. I also work quite intensely with Kasten by Veeam, which is a Kubernetes-native backup and recovery migration application.

Q: There are many people who are just getting started with Kubernetes and might have a lot of questions. Could you please talk a little bit about your own journey?

Continue reading

Practical Python For Networking: 3.1 – Detection With Nornir – Installation And Inventory – Video

This episode in the Python series covers installing Nornir in your Python virtual environment. Course files are in a GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder of Network Automation Nerds and has written the books Mastering […]

The post Practical Python For Networking: 3.1 – Detection With Nornir – Installation And Inventory – Video appeared first on Packet Pushers.

Practical Python For Networking: 3.3 Detection With Nornir – Detect Route Change – Video

Episode 3.3 walks through detecting a route change. You can find code samples for this example in the GitHub repository: https://github.com/ericchou1/pp_practical_lessons_1_route_alerts Eric Chou is a network engineer with 20 years of experience, including managing networks at Amazon AWS and Microsoft Azure. He’s the founder of Network Automation Nerds and has written the books Mastering Python […]

The post Practical Python For Networking: 3.3 Detection With Nornir – Detect Route Change – Video appeared first on Packet Pushers.

Cloud Engineering For The Network Pro: Part 7 – DNS And Load Balancers – Video

The final video in this series on cloud engineering for network pros goes over DNS and load balancers and how to set them up in AWS and Azure. You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. It’s a diverse a mix of content from Ethan and Greg, […]

The post Cloud Engineering For The Network Pro: Part 7 – DNS And Load Balancers – Video appeared first on Packet Pushers.

US security agencies warn of threats to industrial, utility control networks

Key US government security organizations are warning that industrial control system (ICS)/supervisory control and data acquisition (SCADA)-based networks are being threatened by bad actors armed with custom software tools.The Department of Energy (DOE), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a joint warning that certain advanced persistent threat (APT) actors have shown the ability to gain full system access to compromised ICS/SCADA systems.The alert did not identify which groups were making the threats, but it did recognize Dragos, Mandiant, Microsoft, Palo Alto Networks and Schneider Electric for helping put together the warning. Dragos has posted a paper about part of the threat.To read this article in full, please click here

US security agencies warn of threats to industrial, utility control networks

Key US government security organizations are warning that industrial control system (ICS)/supervisory control and data acquisition (SCADA)-based networks are being threatened by bad actors armed with custom software tools.The Department of Energy (DOE), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a joint warning that certain advanced persistent threat (APT) actors have shown the ability to gain full system access to compromised ICS/SCADA systems.The alert did not identify which groups were making the threats, but it did recognize Dragos, Mandiant, Microsoft, Palo Alto Networks and Schneider Electric for helping put together the warning. Dragos has posted a paper about part of the threat.To read this article in full, please click here

MikroTik – RouterOS v7 – BGP performance testing for full tables

MikroTik has come a long way since the first release of RouterOS v7 beta.

One of the long-awaited features is improved BGP performance and the ability to leverage multiple CPU cores.

Testing BGP performance is a long process of lab and prod evaluation, so we decided to run some quick and basic tests to get a baseline.

When the CCR2216-1G-12XS-2XQ was released and MikroTik entered the world of 100G, we ordered some right away to test and just got them in the lab a few days ago – the results are below.

Hope this is helpful and look for more BGP perf tests in the coming months!

The BGP testing lab

TLDR; 2.1 million routes learned and forwarding in 46 seconds and withdrawn in 44 seconds. This was tested under a 25 Gbps load on both routers with a cpu load of 12%.

Lab overview: The lab consists of (2) CCR2216 routers running ROSv7.2 stable connected to a ProxMox hypervisor that runs (4) Linux route generators and MikroTik CHRs (also on 7.2) acting as border routers. The specific connectivity is in the overview drawing below.

IPv6: We are currently developing a route generator that will inject IPv4 Continue reading

What is DRaaS and how it can save your business from disaster

Disaster Recovery as a Service (DRaaS) provides data replication, hosting, and recovery services from the cloud in the event of a disaster, power outage, ransomware attack, or other business interruption.DRaaS backs up data, applications, and IT infrastructure to the cloud, with providers typically having geographically dispersed data center footprints. In the event of a disaster, the business will failover to the DRaaS provider’s data center in a different region. As opposed to traditional disaster recovery methods, which require businesses to operate an off-site DR facility, DRaaS shifts that burden to service providers, and, thus, expands the market beyond the large enterprises that could afford such capital-intensive setups.To read this article in full, please click here

What is DRaaS and how it can save your business from disaster

Disaster Recovery as a Service (DRaaS) provides data replication, hosting, and recovery services from the cloud in the event of a disaster, power outage, ransomware attack, or other business interruption.DRaaS backs up data, applications, and IT infrastructure to the cloud, with providers typically having geographically dispersed data center footprints. In the event of a disaster, the business will failover to the DRaaS provider’s data center in a different region. As opposed to traditional disaster recovery methods, which require businesses to operate an off-site DR facility, DRaaS shifts that burden to service providers, and, thus, expands the market beyond the large enterprises that could afford such capital-intensive setups.To read this article in full, please click here

Telephone System Is a Bad Example of Hierarchical Addresses

Networking engineers proposing strict hierarchical addressing scheme as a solution to global BGP table explosion often cite the international telephone system numbering plan (E.164) as a perfect example of an addressing plan that uses hierarchy to minimize routing table sizes. Even more, widespread mobile roaming and local number portability indicate that we could solve IP mobility and multihoming if only insert-your-favorite-opinion-here.

Telephone System Is a Bad Example of Hierarchical Addresses

Networking engineers proposing strict hierarchical addressing scheme as a solution to global BGP table explosion often cite the international telephone system numbering plan (E.164) as a perfect example of an addressing plan that uses hierarchy to minimize routing table sizes. Even more, widespread mobile roaming and local number portability indicate that we could solve IP mobility and multihoming if only insert-your-favorite-opinion-here.

US security agencies warn of threats to indusctial, utility control networks

Key US government security organizations are warning industrial control system (ICS)/supervisory control and data acquisition (SCADA)-basednetworks are being threatened by bad actors armed with custom software tools.The Department of Energy (DOE), Cybersecurity and Infrastructure Security Agency (CISA), National Security Agency (NSA) and Federal Bureau of Investigation (FBI) issued a joint warning that certain advanced persistent threat (APT) actors have shown the ability to gain full system access to compromised ICS/SCADA systems. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

New Fujitsu cloud service is based Arm chips used in the world’s fastest supercomputer

Fujitsu announced it will launch a cloud service based on the same hardware used in the world's fastest supercomputer, Fugaku.The first step in what it calls Fujitsu Computing-as-a-Service (CaaS) will be Fujitsu Cloud Service HPC, which offers the high-performance computing power of the Fujitsu Supercomputer PRIMEHPC FX1000, which is based on the A64FX 64-bit Arm processor Fujitsu developed specifically for Fugaku. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here