Archive

Category Archives for "Networking"

Private 5G as a service is now a thing

A private 5G platform designed to offer the latest-generation licensed wireless technology to enterprise users as a service was announced today by Japanese telecom giant NTT.The company said its private 5G-as-a-service platform, which it calls P5G, would use CBRS and other licensed spectrum in the U.S. to provide businesses with their own 5G networks. The company said also that its platform is highly flexible, working with a wide variety of software standards and networking partners to ensure availability around the country.To read this article in full, please click here

Atos reportedly trying to dump on-prem consulting business

Just months after it was considering buying DXC Technology, Atos is reportedly looking to sell some of its legacy business operations, including its data-center and communications businesses. If true, it’s a further sign that the on-prem consulting business is falling out of favor.Bloomberg reported on Tuesday that Atos is exploring a sale of its legacy information technology business, including some outsourcing operations. One day later, Atos CEO Elie Girard said during its earnings call with analysts that the company is definitely looking to make some kind of changes to its businesses.To read this article in full, please click here

Atos reportedly trying to dump on-prem consulting business

Just months after it was considering buying DXC Technology, Atos is reportedly looking to sell some of its legacy business operations, including its data-center and communications businesses. If true, it’s a further sign that the on-prem consulting business is falling out of favor.Bloomberg reported on Tuesday that Atos is exploring a sale of its legacy information technology business, including some outsourcing operations. One day later, Atos CEO Elie Girard said during its earnings call with analysts that the company is definitely looking to make some kind of changes to its businesses.To read this article in full, please click here

Juniper touts cloud-ready data center, AI, automation

Enterprise networks are focused on buying full-stack offerings that include key software components such as management, automation and AI but also routing, switching and security rather than a piecemeal approach.That trend is being driven by a post-COVID rethinking of network architecture but also the need to simplify the network and access to cloud resources, says  Juniper Networks’ executive vice president and chief product officer Manoj Leelanivas. SD-WAN buyers guide: Key questions to ask vendors Juniper Networks Manoj LeelanivasTo read this article in full, please click here

What’s New in VMware HCX 4.2

Real-time Estimation of vMotion and Replication Assisted vMotion Migration 

HCX analyzes migration metrics and provides an estimate of the time required to complete the relocation phase of every configured vMotion, as well as the time required to complete the transfer phase of every RAV migration. Foreach virtual machine migration, the estimate is shown in the progress bar displayed on both the Migration Tracking and Migration Management pages while the transfer is underway. 

 The following snapshot shows an estimate of time remaining for the vMotion-based migration to complete. 

Here we see a similar estimate for a RAV (Replication Assisted vMotion) based migration.  

Predictive Estimation of Replication Assisted vMotion (RAV) Migrations 

For RAV migrations in draft state, HCX uses machine learning to generate an estimate of the time required to complete the migration. The estimate is shown in the progress bar displayed on the Migration Management page. Predictive estimationis available for Early Adoption (EA) with both RAV and Bulk migration. 

5The following snapshot shows how the user can get a predictive estimate of the time needed for Replication Assisted vMotion (RAV) to migrate workloads of virtual machines in a Mobility group. 

OS Assisted Migration (OSAM) with HCX for VMware Cloud 

HCX OS Assisted Migrations enable transitions from non-vSphere-based environments to vSphere-based environments. OSAM can now be runin VMware Cloud Continue reading

More devices, fewer CAPTCHAs, happier users

More devices, fewer CAPTCHAs, happier users
More devices, fewer CAPTCHAs, happier users

Earlier this year we announced that we are committed to making online human verification easier for more users, all around the globe. We want to end the endless loops of selecting buses, traffic lights, and convoluted word diagrams. Not just because humanity wastes 500 years per day on solving other people's machine learning problems, but because we are dedicated to making an Internet that is fast, transparent, and private for everyone. CAPTCHAs are not very human-friendly, being hard to solve for even the most dedicated Internet users. They are extremely difficult to solve for people who don’t speak certain languages, and people who are on mobile devices (which is most users!).

Today, we are taking another step in helping to reduce the Internet’s reliance on CAPTCHAs to prove that you are not a robot. We are expanding the reach of our Cryptographic Attestation of Personhood experiment by adding support for a much wider range of devices. This includes biometric authenticators — like Apple's Face ID, Microsoft Hello, and Android Biometric Authentication. This will let you solve challenges in under five seconds with just a touch of your finger or a view of your face -- without sending this private Continue reading

Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware

Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware
Introducing Zero-Knowledge Proofs for Private Web Attestation with Cross/Multi-Vendor Hardware

A few weeks ago we introduced Cryptographic Attestation of Personhood to replace CAPTCHAs with USB security keys, and today we announced additional support for on-device biometric hardware. While doing that work, it occurred to us that hardware attestation, proving identity or other properties of a user with a piece of hardware, could have many wider applications beyond just CAPTCHA alternatives and user authentication via WebAuthn. Really, why should someone have to have an account to prove they exist, when their own trusted device can do so?

Attestation in the WebAuthn standard lets websites know that your security key is authentic. It was designed to have good privacy properties baked into policies that must be followed by device manufacturers. The information your security key sends to websites is indistinguishable from that of myriad other keys.  Even so, we wanted to do better. If we’re taking attestation out of authentication, then we need to learn only that your security key is authentic — and we’ve designed a new Zero-Knowledge Proof for the browser to do that.

This is part of our work to improve privacy across the Internet. We’ve yet to put this proof of personhood in production, but you can see Continue reading

5 steps for modernizing enterprise networks

The business value of the network has never been higher, and this is driven by digital transformation as borne out businesses accelerating their digital initiatives by as much as seven years due to the pandemic. This is had a profound impact on the enterprise network as most of the enabling technologies such as cloud, mobility and IoT are network centric.This intense focus on digital transformation has exposed many flaws with legacy networks. They are rigid, require intensive manual processes, and lack the agility and intelligence to meet the demands of digital business. Organizations need to make network modernization a priority if they are to maximize their investments in other technologies. Here are five steps that all businesses should consider when modernizing the network.To read this article in full, please click here

5 steps for modernizing enterprise networks

The business value of the network has never been higher, and this is driven by digital transformation as borne out businesses accelerating their digital initiatives by as much as seven years due to the pandemic. This is had a profound impact on the enterprise network as most of the enabling technologies such as cloud, mobility and IoT are network centric.This intense focus on digital transformation has exposed many flaws with legacy networks. They are rigid, require intensive manual processes, and lack the agility and intelligence to meet the demands of digital business. Organizations need to make network modernization a priority if they are to maximize their investments in other technologies. Here are five steps that all businesses should consider when modernizing the network.To read this article in full, please click here

Kubernetes observability challenges in cloud-native architecture

Kubernetes is the de-facto platform for orchestrating containerized workloads and microservices, which are the building blocks of cloud-native applications. Kubernetes workloads are highly dynamic, ephemeral, and are deployed on a distributed and agile infrastructure. Although the benefits of cloud-native applications managed by Kubernetes are plenty, Kubernetes presents a new set of observability challenges in cloud-native applications.

Let’s consider some observability challenges:

  • Data silos – Traditional monitoring tools specialize in collecting metrics at the application and infrastructure level. Given the highly dynamic, distributed, and ephemeral nature of cloud-native applications, this style of metrics collection creates data in silos that need to be stitched together in the context of a service in order to enable DevOps and SREs to debug service issues (e.g. slow response time, downtime, etc.). Further, if DevOps or service owners add new metrics for observation, data silos can cause broken cross-references and data misinterpretation, leading to data misalignment, slower communication, and incorrect analysis.
  • Data volume and granular components – Kubernetes deployments have granular components such as pods, containers, and microservices that are running on top of distributed and ephemeral infrastructure. An incredibly high volume of granular data is generated at each layer as alerts, logs, and Continue reading

Docker, Openvswitch & Aruba VXLAN Network Build

Docker, Openvswitch & Aruba VXLAN Network Build

This blog provides details of how to build a static VXLAN network that connects physical hardware to a virtualised network, enabling communication from docker containers to external nodes.
The build is comprised of a hardware ArubaOS-Switch acting as a VTEP and an openvswitch VTEP running on an ubuntu server, which is the host for the docker containers.
This network also serves to prove interoperability between the ArubaOS-Switch VXLAN stack and that running on openvswitch.
The use of docker containers as target nodes enables rapid deploy and tear-down of network components, which is particularly useful in lab environments for testing.

Kit List

2 x ArubaOS-CX 6300 hardware switch (only 1 is required.)
1 x HP EliteDesk PC running Hyper-V hosting an ubuntu 21.04 VM
1 x HP EliteDesk PC running ubuntu 21.04 bare metal.

Notes:
I used a VM for the openvswitch / docker linux server to take advantage of snapshots while documenting this build. This server can be any linux server.

Network Diagram

Docker, Openvswitch & Aruba VXLAN Network Build

Build Steps

Configure the ArubaOS-CX hardware switch

  1. Configure the ArubaOS-CX switch and local server (172.18.1.1) so that they are in the same subnet and can ping each other.
  2. Configure the ArubaOS-CX Continue reading

Hedge 95: Mike Bushong and Agile

We’ve all been told agile is better … but as anyone who’s listened here long enough knows, if you haven’t found the tradeoffs, you haven’t looked hard enough. What is agile better for? Are there time when agile is better, and times when more traditional project management processes are better? Mike Bushong joins Tom Ammon, Eyvonne Sharp, and Russ White on this, the 95th episode of the Hedge, to discuss his experience with implementing agile, where it works, and where it doesn’t.

download

Day Two Cloud 110: Automation’s Unintended Consequences – The Bunny.net Outage Saga

Today's Day Two Cloud podcast walks through a massive outage that hit CDN provider Bunny.net. An automated update triggered cascading failures that essentially took the company offline for two frantic hours. The company shared a detailed postmortem of what happened, and we're joined by company founder Dejan Pelze to walk us through the issues and share lessons learned about infrastructure, automation, and dependencies.

Day Two Cloud 110: Automation’s Unintended Consequences – The Bunny.net Outage Saga

Today's Day Two Cloud podcast walks through a massive outage that hit CDN provider Bunny.net. An automated update triggered cascading failures that essentially took the company offline for two frantic hours. The company shared a detailed postmortem of what happened, and we're joined by company founder Dejan Pelze to walk us through the issues and share lessons learned about infrastructure, automation, and dependencies.

The post Day Two Cloud 110: Automation’s Unintended Consequences – The Bunny.net Outage Saga appeared first on Packet Pushers.

Ingress Controllers: The More the Merrier

Just like everything in the software development space, especially in today’s cloud native world, fragmentation is everywhere. As with any single category of tool — service meshes, orchestrators and observability tools — you will find multiple “brands” and variations of each tool being used in most organizations. We can identify two main causes for such fragmentation: One is deliberate, and the other is not. Let’s talk about the non-deliberate cause first and how that relates to my own service mesh company