Archive

Category Archives for "Networking"

Kyndryl has spun off from IBM as a $19B managed service firm

Kyndryl, formerly IBM’s Managed Infrastructure Services unit, is officially an independent company.From the start the spinoff will be big, with more than 90,000 employees, $19 billion in annual revenue, operations in over 60 countries, and a customer base that includes 75% of the Fortune 100. Its goal of modernizing customer infrastructure will remain at the center of its strategy, but it wants to expand.[Get regularly scheduled insights by signing up for Network World newsletters.] Company executives say by spinning out of IBM, Kyndryl will have more freedom to partner with other major tech companies and cloud hyperscalers such as Google, AWS, and Microsoft. Plus it can invest in its workforce as well as focus on developing services for hot markets such as 5G, edge computing, cloud, and security.To read this article in full, please click here

Kyndryl has spun off from IBM as a $19B managed service firm

Kyndryl, formerly IBM’s Managed Infrastructure Services unit, is officially an independent company.From the start the spinoff will be big, with more than 90,000 employees, $19 billion in annual revenue, operations in over 60 countries, and a customer base that includes 75% of the Fortune 100. Its goal of modernizing customer infrastructure will remain at the center of its strategy, but it wants to expand.[Get regularly scheduled insights by signing up for Network World newsletters.] Company executives say by spinning out of IBM, Kyndryl will have more freedom to partner with other major tech companies and cloud hyperscalers such as Google, AWS, and Microsoft. Plus it can invest in its workforce as well as focus on developing services for hot markets such as 5G, edge computing, cloud, and security.To read this article in full, please click here

DDoS Attack Trends for Q3 2021

DDoS Attack Trends for Q3 2021
DDoS Attack Trends for Q3 2021

The third quarter of 2021 was a busy quarter for DDoS attackers. Cloudflare observed and mitigated record-setting HTTP DDoS attacks, terabit-strong network-layer attacks, one of the largest botnets ever deployed (Meris), and more recently, ransom DDoS attacks on voice over IP (VoIP) service providers and their network infrastructure around the world.

Here’s a summary of the trends observed in Q3 ‘21:

Application-layer (L7) DDoS attack trends:

  • For the second consecutive quarter in 2021, US-based companies were the most targeted in the world.
  • For the first time in 2021, attacks on UK-based and Canada-based companies skyrocketed, making them the second and third most targeted countries, respectively.
  • Attacks on Computer Software, Gaming/ Gambling, IT, and Internet companies increased by an average of 573% compared to the previous quarter.
  • Meris, one of the most powerful botnets in history, aided in launching DDoS campaigns across various industries and countries.

Network-layer (L3/4) DDoS attack trends:

  • DDoS attacks increased by 44% worldwide compared to the previous quarter.
  • The Middle East and Africa recorded the largest average attack increase of approximately 80%.
  • Morocco recorded the highest DDoS activity in the third quarter globally — three out of every 100 packets were part of a DDoS Continue reading

Why Does Internet Keep Breaking?

James Miles sent me a long list of really good questions along the lines of “why do we see so many Internet-related outages lately and is it due to BGP and DNS creaking of old age”. He started with:

Over the last few years there are more “high profile” incidents relating to Internet connectivity. I raise the question, why?

The most obvious reason: Internet became mission-critical infrastructure and well-publicized incidents attract eyeballs.

Ignoring the click baits, the underlying root cause is in many cases the race to the bottom. Large service providers brought that onto themselves when they thought they could undersell the early ISPs and compensate their losses with voice calls (only to discover that voice-over-Internet works too well).

Red Hat Enterprise Linux 9 drops in beta version

Red Hat Enterprise Linux version 9 released today as a beta, bringing about a dozen major new features focused on security and compliance, simplified management and automation. But the biggest news might be the lack of changes to the management and administration tools from the previous version, which could make adoption fairly painless.The key new management features include enhanced web-console performance metrics for easier diagnosis of problems, live kernel patching without the need for downtime, and an easier way to create new OS images.[Get regularly scheduled insights by signing up for Network World newsletters.] Many of those features make RHEL 9 better-suited to use in edge environments, according to IDC vice president Dave McCarthy, who noted that automation seemed to be a particularly important focus in the new version.To read this article in full, please click here

Red Hat Enterprise Linux 9 drops in beta version

Red Hat Enterprise Linux version 9 released today as a beta, bringing about a dozen major new features focused on security and compliance, simplified management and automation. But the biggest news might be the lack of changes to the management and administration tools from the previous version, which could make adoption fairly painless.The key new management features include enhanced web-console performance metrics for easier diagnosis of problems, live kernel patching without the need for downtime, and an easier way to create new OS images.[Get regularly scheduled insights by signing up for Network World newsletters.] Many of those features make RHEL 9 better-suited to use in edge environments, according to IDC vice president Dave McCarthy, who noted that automation seemed to be a particularly important focus in the new version.To read this article in full, please click here

Triggering Network Automation From The Web

How best to return from a cliffhanger ending – in a previous post we used Django’s Model class .save() to write network state—that is CLI standard output transformed to JSON using pyATS—into a PostgreSQL database table. Django also helped us convert, or migrate, a Pythonic class-based model into this SQL table in the first place. […]

The post Triggering Network Automation From The Web appeared first on Packet Pushers.

Fast and simple troubleshooting with GUI-based Dynamic Packet Capture

With the Calico 3.10 release, Dynamic Packet Capture is available in Dynamic Service Graph.

This means users who require self-service, live troubleshooting for microservices and Kubernetes workloads can capture and evaluate traffic packets on endpoints without writing a single line of code or using any 3rd-party troubleshooting tools. Users don’t need to learn about or have knowledge of kubectl or YAML to troubleshoot their microservices and Kubernetes cluster. Calico helps enforce organizational security policies by only allowing users to access their assigned namespaces and endpoints for troubleshooting.

About Dynamic Packet Capture

In most situations when you need to do a packet capture, the problem doesn’t last long and usually happens randomly. But once you narrow down the issue to a particular time or activity, you will need to set the right action plan to tackle the problem. Packet capture is now much easier, simpler, and faster than before.

Dynamic Packet Capture facilitates fast troubleshooting and easy debugging of microservice connectivity issues and performance hotspots in Kubernetes clusters. It is a Kubernetes-native custom resource that runs as part of user code against specific workloads in the cluster, without the need to execute any programs inside the cluster. Dynamic Packet Capture Continue reading

Cisco NaaS study: IT pros are interested but wary

As IT pros evaluate the role of network-as-a-service, they weigh the upsides of quicker access to new technologies and faster incident-response times against loss of control over security and potential disruptions caused by transitioning away from traditional networking, according to a new Cisco report.These are among the results from Cisco’s survey of 1,534 IT professionals in 13 countries as well as interviews with 20 IT leaders that are compiled in the company’s “2022 Global Networking Trends Report: The Rise of Network as a Service (NaaS)”To read this article in full, please click here

10 Resources to Get Started on Container Network Security

Ready to get started? The following resources and tutorials will enhance your understanding of container network security and help you get started.

Analyst Research

Get an independent analyst’s view on the state of container security:

Blogs

Many container network security experts are blogging about lessons learned and sharing their knowledge on how to secure mod- ern applications. Follow their conversations:

Courses and Certifications

Developers and platform operators alike need to learn how to secure applications and platforms. Why not take a class to enrich your understanding? There are many free and low-cost options, including the following:

Day Two Cloud 122: Two Customer Journeys To VMware Cloud (Sponsored)

Ethan Banks and Ned Bellavance hosted a panel discussion at VMworld 2021 with two VMware customers using VMware Cloud---the University of Miami and Sterling National Bank. This discussion looks at what works, where the customers ran into issues, and how their cloud journeys are progressing.

The post Day Two Cloud 122: Two Customer Journeys To VMware Cloud (Sponsored) appeared first on Packet Pushers.

The tale of a single register value

The tale of a single register value
“Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth.” — Sherlock Holmes

Intro

The tale of a single register value

It’s not every day that you get to debug what may well be a packet of death. It was certainly the first time for me.

What do I mean by “a packet of death”? A software bug where the network stack crashes in reaction to a single received network packet, taking down the whole operating system with it. Like in the well known case of Windows ping of death.

Challenge accepted.

It starts with an oops

Around a year ago we started seeing kernel crashes in the Linux ipv4 stack. Servers were crashing sporadically, but we learned the hard way to never ignore cases like that — when possible we always trace crashes. We also couldn’t tie it to a particular kernel version, which could indicate a regression which hopefully could be tracked down to a single faulty change in the Linux kernel.

The crashed servers were leaving behind only a crash report, affectionately known as a “kernel oops”. Let’s take a look at it and go over what information we have there.

The tale of a single register value

Parts of the oops, like offsets into Continue reading

The Circular Data Center: Deploy a Cloud Operating Model While Lowering Cost and Climate Impacts

ITRenew has announced that Pluribus Netvisor ONE OS and the Adaptive Cloud Fabric controllerless SDN software are now available as part of Sesame by ITRenew rack-scale cloud solutions. Pluribus is very pleased to take part in this new circular approach to building data centers; one where we can deliver a cloud operating model with on-prem performance, while also helping our customers achieve their sustainability goals.

The timing of this partnership is apropos given the global attention to COP26, the United Nations Climate Change Conference and ongoing efforts worldwide to scale back emissions. While all industries have a responsibility on this front, the data center industry has specific, well-documented sustainability challenges that are only just starting to be properly addressed.

Most efforts to build the “green data center” have largely focused on increasing energy efficiency and using renewable energy sources, even though power used during the operational phase is only part of the problem. The bigger environmental culprit is that the industry continues to manufacture and deploy brand-new IT infrastructure equipment at a rapid pace.

In its report, The Financial & Sustainability Case for Circularity,” ITRenew used a lifecycle model, assuming a typical 3-year operational lifetime for the equipment, Continue reading