Archive

Category Archives for "Networking"

Running BGP between Virtual Machines and Data Center Fabric

Got this question from one of my readers:

When adopting the BGP on the VM model (say, a Kubernetes worker node on top of vSphere or KVM or Openstack), how do you deal with VM migration to another host (same data center, of course) for maintenance purposes? Do you keep peering with the old ToR even after the migration, or do you use some BGP trickery to allow the VM to peer with whatever ToR it’s closest to?

Short answer: you don’t.

Kubernetes was designed in a way that made worker nodes expendable. The Kubernetes cluster (and all properly designed applications) should recover automatically after a worker node restart. From the purely academic perspective, there’s no reason to migrate VMs running Kubernetes.

JPMorgan Chase spent $2 billion on brand new data centers last year

JPMorgan Chase & Co. spent $2 billion on new data centers last year, even as the multinational investment banking and financial services company continued to move data and applications to cloud platforms run by AWS, Google, and Microsoft.The $2 billion is part of the firm’s total annual spending on technology, which amounted to more than $12 billion last year, according to details shared in JPMorgan Chase’s fourth-quarter and full-year 2021 earnings presentation. Looking at the current year, the firm expects to increase its tech spending to roughly $15 billion. IT priorities in 2022 will be consistent with prior years and will include increases in cloud capabilities, data centers, digital consumer experience, and data and analytics.To read this article in full, please click here

JPMorgan Chase spent $2 billion on brand new data centers last year

JPMorgan Chase & Co. spent $2 billion on new data centers last year, even as the multinational investment banking and financial services company continued to move data and applications to cloud platforms run by AWS, Google, and Microsoft.The $2 billion is part of the firm’s total annual spending on technology, which amounted to more than $12 billion last year, according to details shared in JPMorgan Chase’s fourth-quarter and full-year 2021 earnings presentation. Looking at the current year, the firm expects to increase its tech spending to roughly $15 billion. IT priorities in 2022 will be consistent with prior years and will include increases in cloud capabilities, data centers, digital consumer experience, and data and analytics.To read this article in full, please click here

Gigamon Introduces Playbooks, Plus A Full Year Of Data Retention, To Its NDR Service

Gigamon has added new features to its SaaS-based Network Detection and Response (NDR) service, including playbooks that provide context for investigations, and a full year of data retention. In addition, Gigamon hopes to compete with more established NDR vendors by bringing more of a human touch to its service.

The post Gigamon Introduces Playbooks, Plus A Full Year Of Data Retention, To Its NDR Service appeared first on Packet Pushers.

Podcast: Why is data center efficiency important? How to address emissions concerns

Data centers are a critical, but often power-hungry, part of the enterprise. But, why exactly do data centers require so much energy? And how can businesses address emissions concerns as well as cut back on the costs associated with cooling data centers? Ashish Nadkarni, group vice president within IDC's Worldwide Infrastructure Practice, joins Juliet to discuss the status of data center efficiency, what it means within the context of green IT and how technology has advanced to make servers more efficient. To read this article in full, please click here

How to address emissions concerns for power-hungry data centers

Data centers are a critical, but often power-hungry, part of the enterprise. But, why exactly do data centers require so much energy? And how can businesses address emissions concerns as well as cut back on the costs associated with cooling data centers? Ashish Nadkarni, group vice president within IDC's Worldwide Infrastructure Practice, joins Juliet to discuss the status of data center efficiency, what it means within the context of green IT and how technology has advanced to make servers more efficient.

F5 integrates security for multi-cloud app protection.

F5 Networks has rolled out an integrated, cloud-based security platform and services aimed at protecting widely distributed enterprise applications.The company used its Agility conference this week to introduce its overarching Distributed Cloud Services platform, which will bring together security technologies from recent acquisitions, including Threat Stack, Volterra, and Shape Security, plus its own web-application firewall and other components to offer an integrated, secure, distributed application-management platform for on-prem or cloud deployment.How to build a hybrid-cloud strategy “Modernizing apps includes transformational actions such as leveraging microservices, using multiple clouds and edge locations instead of a single cloud provider, and utilizing API-based communication to connect workloads and data,” wrote Haiyan Song, executive vice president and general manager of F5’s Security & Distributed Cloud Product Group in a blog about the new services.To read this article in full, please click here

F5 integrates security for multi-cloud app protection.

F5 Networks has rolled out an integrated, cloud-based security platform and services aimed at protecting widely distributed enterprise applications.The company used its Agility conference this week to introduce its overarching Distributed Cloud Services platform, which will bring together security technologies from recent acquisitions, including Threat Stack, Volterra, and Shape Security, plus its own web-application firewall and other components to offer an integrated, secure, distributed application-management platform for on-prem or cloud deployment.How to build a hybrid-cloud strategy “Modernizing apps includes transformational actions such as leveraging microservices, using multiple clouds and edge locations instead of a single cloud provider, and utilizing API-based communication to connect workloads and data,” wrote Haiyan Song, executive vice president and general manager of F5’s Security & Distributed Cloud Product Group in a blog about the new services.To read this article in full, please click here

Full Stack Journey 063: Protecting Your Time And Other Career Advice With Tracy Holmes

Today's Full Stack Journey podcast explores an IT career journey with guest Tracy Holmes. Tracy shares lessons she's learned on an IT voyage that includes engineering, data centers, and developer advocacy. Lessons include how to protect your time, why it's useful to say no sometimes, and the importance of learning how to learn.

The post Full Stack Journey 063: Protecting Your Time And Other Career Advice With Tracy Holmes appeared first on Packet Pushers.

Bgp bestpath as-path multipath-relax

Bgp bestpath as-path multipath-relax, why this BGP feature is used?. Let’s understand the case with the topology and I will tell you the real-life use case of the Bgp bestpath as-path multipath-relax feature.

 

ebgp multipath

 

In EBGP Multipath, we have two rules to satisfy the Multipathing requirements.

The number of AS has to be the same across the two paths and the AS number needs to be the same as well.

In the above topology, for the destination prefix, 192.168.0.0/24, we have two paths.

Both of the paths are 2 AS Path Lenght, AS 100, and AS200.

And both of the paths consist of the same ASes, AS 100 and AS 200.

Thus, on the above topology, if we enable EBGP Multipath feature it just works.

We will change the AS number in one of the paths in the below topology and EBGP Multipath will not work.

 

 Bgp bestpath as-path multipath-relax

 

 

Let’s remember the rules again. 1: Number of AS Paths 2. AS number in the AS Paths has to be the same.

In the above figure, the number of AS in both of the paths is 2.

But AS numbers are different.

One of the paths: Continue reading

BGP Multipath

BGP Multipath – By default installs only a single path in IBGP and EBGP deployment.If prefixes are learned via multiple paths, BGP supports multipath for IBGP, EBGP, or across both IBGP and EBGP via EIBGP Multipath feature. In this blog post, we will explore each of these options: IBGP Multipath, EBGP Multipath, and EIBGP Multipath.

First of all, we should know that BGP Multipath feature should be enabled manually on the network device, unlike IGP protocols.
In IGP Protocols, when there is Multipath, commonly referred to as ECMP (Equal Cost Multipath), Routers install all next-hops for the destination prefixes, to the routing and forwarding table automatically, without manual human operation.
We have on the website, the most detailed , Design and Practial Hands-on BGP Training in the world.
Let’s start with the first EBGP Multipath:
ebgp multipath
Figure – EBGP Multipath
We have two rules for EBGP Multipath.
1. For the destination prefix, if there is more than one path, total number of AS – Autonomous System should be same across different paths
2. For the destination prefix, if there is more than one path, same AS numbers should be in the AS Path.
On the above figure, since from Continue reading

Feedback: Cisco ACI Webinars

Antonio Boj enjoyed the Cisco ACI webinars by Mario Rosi and sent me this feedback:


I just wanted to pass you my feedback about the documentation and content of the above webinars. Excellent content, very well organized.

My expectation is always high about your content because I’ve become used to it with other webinars you published. I always look for non-marketing content to understand the technology.

I don’t want to criticize vendors based on assumptions or personal agendas from interested people but evaluate whether or not it is the right path forward for the problem I want to solve, knowing the pros and cons. So again, both webinars about Cisco ACI have given me excellent visibility of the solution. Thank you very much!

Feedback: Cisco ACI Webinars

Antonio Boj enjoyed the Cisco ACI webinars by Mario Rosi and sent me this feedback:


I just wanted to pass you my feedback about the documentation and content of the above webinars. Excellent content, very well organized.

My expectation is always high about your content because I’ve become used to it with other webinars you published. I always look for non-marketing content to understand the technology.

I don’t want to criticize vendors based on assumptions or personal agendas from interested people but evaluate whether or not it is the right path forward for the problem I want to solve, knowing the pros and cons. So again, both webinars about Cisco ACI have given me excellent visibility of the solution. Thank you very much!

Who won Super Bowl LVI? A look at Internet traffic during the big game

Who won Super Bowl LVI? A look at Internet traffic during the big game
“It's ridiculous for a country to get all worked up about a game—except the Super Bowl, of course. Now that's important.”
- Andy Rooney, American radio and television writer
Who won Super Bowl LVI? A look at Internet traffic during the big game

When the Super Bowl is on, there are more winners than just one of the teams playing, especially when we look at Internet trends. By now, everyone knows that the Los Angeles Rams won, but we also want to look at which Super Bowl advertisers were the biggest winners, and how traffic to food delivery services, social media and messaging apps, and sports and betting websites changed throughout the game.

We covered some of these questions during our Super Bowl live-tweeting on our Cloudflare Radar account. (Hint: follow us if you’re interested in Internet trends).

Cloudflare Radar uses a variety of sources to provide aggregate information about Internet traffic and attack trends. In this blog post, as we did last year, we use DNS name resolution data to estimate traffic to websites. We can’t see who visited the websites mentioned, or what anyone did on the websites, but DNS can give us an estimate of the interest generated by the ads or across a set of sites in Continue reading