Archive

Category Archives for "Networking"

Ingress Controllers: The More the Merrier

Just like everything in the software development space, especially in today’s cloud native world, fragmentation is everywhere. As with any single category of tool — service meshes, orchestrators and observability tools — you will find multiple “brands” and variations of each tool being used in most organizations. We can identify two main causes for such fragmentation: One is deliberate, and the other is not. Let’s talk about the non-deliberate cause first and how that relates to my own service mesh company

LISP – OMP – BGP EVPN Interoperability – Part VIII: LISP, OMP, and BGP EVPN Comparison

 

IP reachability

 

Every Overlay Network solution requires IP reachability between edge devices via Underlay Network. This section explains the basic routing solution in Underlay Network from Campus Fabric, SD-WAN, and Datacenter Fabric perspectives. Figure 7-1 illustrates the IP reachability requirements for Campus Fabric, SD-WAN, and Datacenter Fabric.


Figure 7-1: IP Reachability Requirements.

 

Continue reading

ITRenew and Vapor IO partner for edge infrastructure and connectivity

ITRenew and Vapor IO are teaming up on an enterprise service that's designed to bring performance and affordability to edge computing. ITRenew, which I've written about before, specializes in acquiring used data-center gear from hyperscale vendors, refurbishing it, and selling it to data-center operators for much less than new equipment would cost.Up until now, ITRenew focused on enterprise data-center customers. Now it's eyeing the edge through its partnership with Vapor IO, which specializes in colocation, networking and interconnection services.To read this article in full, please click here

ITRenew and Vapor IO partner for edge infrastructure and connectivity

ITRenew and Vapor IO are teaming up on an enterprise service that's designed to bring performance and affordability to edge computing. ITRenew, which I've written about before, specializes in acquiring used data-center gear from hyperscale vendors, refurbishing it, and selling it to data-center operators for much less than new equipment would cost.Up until now, ITRenew focused on enterprise data-center customers. Now it's eyeing the edge through its partnership with Vapor IO, which specializes in colocation, networking and interconnection services.To read this article in full, please click here

Infrastructure 1. Building Virtualized Environment with Debian Linux and Proxmox on HP and Supermicro

Hello my friend,

Just the last week we finished our Zero-to-Hero Network Automation Training, which was very intensive and very interesting. The one could think: it is time for vacation now!.. Not quite yet. We decided to use the time wisely and upgrade our lab to bring possibilities for customers to use it. Lab upgrade means a major infrastructure project, which involves brining new hardware, changing topology and new software to simplify its management. Sounds interesting? Jump to details!


1
2
3
4
5
No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.

What is Infrastructure Automation?

Each and every element of your entire IT landscape requires two actions. It shall be monitored and it shall be managed. Being managed means that the element shall be configured and this is the first step for all sort of automations. Configuration management is a perfect use case to start automating your infrastructure, which spans servers, network devices, VMs, containers and much more. And we are here to help you to do Continue reading

Working around a memory leak in Cisco Cat 9000 switches

Cisco Catalyst 9000 Series switches have become the switch of choice for many enterprises, including the environment that I work in, where Cisco Catalyst 9300 24- and 48-port switches running Gibraltar-16.12.3 code had become the standard for the access layer when more than 12 ports were needed.That was about two years ago, and a year or so after that we began receiving notifications from an onsite location that there were intermittent network outages and performance degradation at the site. This is an account of how we found workarounds to the problem until Cisco provided a permanent fix.The 10 most powerful companies in enterprise networking 2021 We started troubleshooting the issue and found the following syslog messages that we had never seen before:To read this article in full, please click here

Extreme targets SD-WAN services with Ipanema buy

With an eye toward reinforcing its cloud management business, Extreme Networks said it will acquire Ipanema’s SD-WAN business for about $73 million in cash.Ipanema and its SD-WAN business has been owned by France-based network orchestration firm Infovista since 2015 and has approximately 400 customers, mostly in Europe. Its cloud-managed SD-WAN platform is designed to deliver different workloads and applications securely across conventional wide-area networks and multicloud service providers, according to the company.To read this article in full, please click here

The ‘Itanic’—Intel’s ill-fated Itanium processor—finally sinks

After two decades of failure and endless jokes, the Intel Itanium is officially no more. Intel has finally stopped shipping its doomed-from-the-start 64-bit processor, two years after saying it would cease shipments.Really, the end came some time ago. The last Itaniums were the 9000 series “Kittson,” which shipped in 2017. It’s a bane of technology firms to support technologies they would much rather ditch but can't due to customer investment, and for years Intel was obligated to support the paltry market that existed for Itanium.To read this article in full, please click here

Using the Linux cut command to grab portions of lines from files

One surprisingly easy command for grabbing a portion of every line in a text file on a Linux system is cut. It works something like awk in that it allows you to select only what you want to see from files, enabling you to pull fields (regardless of the delimiter used), characters or bytes. To check on cut, you can ask about its version like this:$ cut --version cut (GNU coreutils) 8.32 Copyright (C) 2020 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Written by David M. Ihnat, David MacKenzie, and Jim Meyering. Selecting by field To illustrate how the cut command works, we'll first run commands using a sample "cities" file that contains details of the largest cities in the US in a tab-separated format. The lines in this file look something like what is shown below:To read this article in full, please click here

The ‘Itanic’—Intel’s ill-fated Itanium processor—finally sinks

After two decades of failure and endless jokes, the Intel Itanium is officially no more. Intel has finally stopped shipping its doomed-from-the-start 64-bit processor, two years after saying it would cease shipments.Really, the end came some time ago. The last Itaniums were the 9000 series “Kittson,” which shipped in 2017. It’s a bane of technology firms to support technologies they would much rather ditch but can't due to customer investment, and for years Intel was obligated to support the paltry market that existed for Itanium.To read this article in full, please click here

Using the Linux cut command to grab portions of lines from files

One surprisingly easy command for grabbing a portion of every line in a text file on a Linux system is cut. It works something like awk in that it allows you to select only what you want to see from files, enabling you to pull fields (regardless of the delimiter used), characters or bytes. To check on cut, you can ask about its version like this:$ cut --version cut (GNU coreutils) 8.32 Copyright (C) 2020 Free Software Foundation, Inc. License GPLv3+: GNU GPL version 3 or later <https://gnu.org/licenses/gpl.html>. This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Written by David M. Ihnat, David MacKenzie, and Jim Meyering. Selecting by field To illustrate how the cut command works, we'll first run commands using a sample "cities" file that contains details of the largest cities in the US in a tab-separated format. The lines in this file look something like what is shown below:To read this article in full, please click here

ZeroLB, a New Decentralized Pattern for Load Balancing

Marco Palladino Marco Palladino is an inventor, software developer and internet entrepreneur based in San Francisco. As the CTO and co-founder of Kong, he is Kong’s co-author, responsible for the design and delivery of the company’s products, while also providing technical thought leadership around APIs and microservices within both Kong and the external software community. Prior to Kong, Marco co-founded Mashape in 2010, which became the largest API marketplace and was acquired by RapidAPI in 2017. With advancements in technology-driven by the Kubernetes — new architectural patterns have emerged to provide decentralized load balancing, yet portable across various platforms and clouds. The old monolithic and centralized load balancer, a technology largely stuck in the early 2000s, becomes deprecated in this new distributed world. The most common breed of load balancers being deployed across every application — centralized load balancers — are a legacy technology. They don’t work well in our new distributed and decentralized world. Remnants of a monolithic legacy way of doing things that did not adapt to modern best practices, centralized load balancers prevent users and organizations from effectively transitioning to the cloud Continue reading

The Grass is Always Greener

This last week I was talking to someone at a small startup that intends to eliminate all the complex routing from campus networks. In the past, when reading blog posts about Kubernetes, I’ve read about how it was designed to eliminate routing protocols because “routing protocols are so complex.”

Color me skeptical.

There are two reasons for complexity in a design. The first is you’re solving a hard problem. The second is you’ve made bad design choices in the past, and you’re pasting complexity on top to solve some perceived problem (whether perceived or real).

The problem with all this talk about building something that’s “less complex” is people tend to see complexity of the first kind and think, “we can get rid of that complexity if we start over.” Failing to understand the past before building the future is a recipe for repeated failures of the same kind. Building a network without a distributed routing protocol hasn’t been tried before either, right? Well, yes, it has … We either forget how it turned out, or we say “well, that’s not the same thing I’m talking about here” (just like “real socialism hasn’t ever been tried”).

Even worse, Continue reading

Dynamic DNS Security Blues

Whenever you run into a network problem, the wise network admin or sysadmin always remembers “It’s always Black Hat USA 2021 security conference Ami Luttwak and head of research simple loophole that allowed them to intercept dynamic DNS (DDNS) traffic going through managed DNS providers like Amazon and Google. And, yes, that includes the DDNS you’re using on your cloud. And, if you think that’s bad, just wait until you see just how trivial this attack is. Our intrepid researchers found that “simply registering certain ‘special’ domains, specifically the name of the name server itself, has unexpected consequences on all other customers using the name server.

Network Break 345: Marvell Acquires High-End Ethernet ASICs; Arista CEO Says Component Shortage ‘Worst I’ve Seen’

This week's Network Break podcat discusses Marvell's Innovium buy and its impact on the high-end Ethernet market, new Juniper security software for applications, Arista financial results and component concerns, and more IT news.

The post Network Break 345: Marvell Acquires High-End Ethernet ASICs; Arista CEO Says Component Shortage ‘Worst I’ve Seen’ appeared first on Packet Pushers.