Archive

Category Archives for "Networking"

The Real Intent Behind Intent Based Networking

Networking is one of the industries where every time a good idea comes around it doesn’t take long for that idea to get coopted and turned into something to sell products, often drastically changing the intent of the original idea. Today we’re going to try to roll back the clock a bit and discuss the original idea around Intent Based Networking. What is it? What does it mean for you? And how do products fit into the original intent.

Show Notes

  • Compare/contrast the original intent of Intent Based Networking with what it has been marketed as
  • Trajectory towards Intent Based Networks
    • Traditional models
    • Automation added
    • Orchestration added
    • Intent added
  • Three pillars of Intent Based Networking
    • Defining Intent
    • Fulfilling Intent
    • Assuring Intent
  • Gaps between the vision and current reality
  • Approach vs. Product – what’s the right way to think about Intent Based Networking
Daren Fulwell
Guest
Tony Efantis
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post The Real Intent Behind Intent Based Networking appeared first on Network Collective.

MUST READ: Fast and Simple Disaster Recovery Solution

More than a year ago I was enjoying a cool beer with my friend Nicola Modena who started explaining how he solved the “you don’t need IP address renumbering for disaster recovery” conundrum with production and standby VRFs. All it takes to flip the two is a few changes in import/export route targets.

I asked Nicola to write about his design, but he’s too busy doing useful stuff. Fortunately he’s not the only one using common sense approach to disaster recovery designs (as opposed to flat earth vendor marketectures). Adrian Giacometti used a very similar design with one of his customers and documented it in a blog post.

Bill Krause | Zero to a Million Ethernet Ports + The Epiphany

Hosts Brandon and Derick have the honor of interviewing Bill Krause and hearing some fascinating stories about the early days of Silicon Valley, including the origins of HP's first computer division, and how Bill (along with previous podcast guest Bob Metcalfe) took Ethernet from zero to one million ports ahead of their already-ambitious timeline.

Bill is a tech luminary, having served as the CEO and President, and then Board Chairman, of 3Com, growing the business from a VC-backed startup to a publicly traded $1B company with global operations. Prior to 3Com, Bill was the GM of HP's first personal computer division, and grew that business exponentially as well.  He's currently a board partner with Andreessen Horowitz as well as Chairman of the Board at Veritas, and he also serves on the boards of CommScope, SmartCar, and Forward Networks.  Bill is a noted philanthropist; he and his wife Gay Krause have funded many national and local programs focusing on education, leadership, and ethics. 

Tune in and join us to hear Bill's amazing stories, his lessons learned, and his profound advice to young entrepreneurs. 

Networking software can ease the complexity of multicloud management

Deploying and operating applications in multiple public clouds is critical to many IT leaders, and networking software can help.Migrating applications to cloud infrastructure requires scale, performance, and, importantly, automation. But achieving them all can be challenging due to limited visibility into that infrastructure and the fact that each IaaS platform has proprietary controls for networking and security that can make multicloud operations highly manual and therefore time consuming.[Get regularly scheduled insights by signing up for Network World newsletters.] As a result, IT teams can be challenged to quickly resolve application performance issues, protect against external attacks and reduce costs. Their goal should be to combine the agility of IaaS resources with the security, manageability and control of their physical network.To read this article in full, please click here

The Hedge Podcast #69: Container Networking Done Right

Everyone who’s heard me talk about container networking knows I think it’s a bit of a disaster. This is what you get, though, when someone says “that’s really complex, I can discard the years of experience others have in designing this sort of thing and build something a lot simpler…” The result is usually something that’s more complex. Alex Pollitt joins Tom Ammon and I to discuss container networking, and new options that do container networking right.

download

Technology Must Be Net Pain Negative – Video

Day Two Cloud podcast co-host Ned Bellavance asks Envoy creator Matt Klein about the tipping point for certain tech. When do you need an API gateway? Egress control? A service mesh? Matt is a “keep it as simple as you can for as long as you can” sort of guy. Why adopt technology that doesn’t […]

The post Technology Must Be Net Pain Negative – Video appeared first on Packet Pushers.

Day Two Cloud 083: Should Cloud Be A Public Utility?

Computing power is a vital part of modern life. Should access to that power be more equitably distributed? Is there a role for a public-utility-style cloud that could make computing more cost-effective and accessible to a broader number of constituencies? These are the starting questions for today's episode of Day Two Cloud. Our guest is Dwayne Monroe, a cloud architect, consultant, and author.

The post Day Two Cloud 083: Should Cloud Be A Public Utility? appeared first on Packet Pushers.

Day Two Cloud 083: Should Cloud Be A Public Utility?

Computing power is a vital part of modern life. Should access to that power be more equitably distributed? Is there a role for a public-utility-style cloud that could make computing more cost-effective and accessible to a broader number of constituencies? These are the starting questions for today's episode of Day Two Cloud. Our guest is Dwayne Monroe, a cloud architect, consultant, and author.

Using Traefik Ingress Controller with Istio Service Mesh

Tetrate sponsored this post. Petr McAllister Petr is an IT Professional with more than 20+ years of international experience and Master’s Degree in Computer Science. He is a technologist at Tetrate. The Istio service mesh comes with its own ingress, but we see customers with requirements to use a non-Istio ingress all the time. Previously, we’ve covered Traefik ingress. With some slight adjustments to the approach we suggested previously, we at Tetrate learned how to implement Traefik as the ingress gateway to your Istio Service Mesh. This article will show you how. The flow of traffic is shown on the diagram below. As soon as requests arrive at the service mesh from the Traefik ingress, Istio has the ability to apply security, observability and traffic steering rules to the request: Incoming traffic bypasses the Istio sidecar and arrives directly at Traefik, so the requests terminate at the Traefik ingress. Traefik uses the IngressRoute config to rewrite the “Host” header to match the destination, and forwards the request to the targeted service, which is a several step process: Requests exiting Traefik Ingress are redirected to the Istio sidecar Continue reading

The effect of switching to TCMalloc on RocksDB memory use

The effect of switching to TCMalloc on RocksDB memory use

In previous posts we wrote about our configuration distribution system Quicksilver and the story of migrating its storage engine to RocksDB. This solution proved to be fast, resilient and stable. During the migration process, we noticed that Quicksilver memory consumption was unexpectedly high. After our investigation we found out that the root cause was a default memory allocator that we used. Switching memory allocator improved service memory consumption by almost three times.

Unexpected memory growth

After migrating to RocksDB, the memory used by the application increased significantly. Also, the way memory was growing over time looked suspicious. It was around 15GB immediately after start and then was steadily growing for multiple days, until stabilizing at around 30GB.  Below, you can see a memory consumption increase after migrating one of our test instances to RocksDB.

The effect of switching to TCMalloc on RocksDB memory use

We started our investigation with heap profiling with the assumption that we had a memory leak somewhere and found that heap size was almost three times less than the RSS value reported by the operating system. So, if our application does not actually use all this memory, it means that memory is ‘lost’ somewhere between the system and our application, which points to possible problems with Continue reading

Data-center staffing shortage to spike in coming years

With the predicted growth in the data-center market comes a concurrent need for more staff. According to a report from the Uptime Institute, the number of staff needed to run the world's data centers will grow from around two million in 2019 to nearly 2.3 million by 2025.This estimate covers more than 230 specialist job roles for different types and sizes of data centers, with varying criticality requirements, from design through operation, and across all global regions.Already the industry is bedeviled by staffing shortages. Fifty percent of those surveyed by Uptime Institute said they were currently experiencing difficulties finding candidates for open positions, up from 38% in 2018.To read this article in full, please click here

Impact of Centralized Control Plane Partitioning

A long-time reader sent me a series of questions about the impact of WAN partitioning in case of an SDN-based network spanning multiple locations after watching the Architectures part of Data Center Fabrics webinar. He therefore focused on the specific case of centralized control plane (read: an equivalent of a stackable switch) with distributed controller cluster (read: switch stack spread across multiple locations).

SDN controllers spread across multiple data centers

SDN controllers spread across multiple data centers

The Internet of Trash

It's often a clear signal that we’re in in deep trouble when politicians believe that they need to lend a hand and help out with regulations. Either the actions of the market have failed consumers and some form of public action is necessary to address aspects of this failure, or the situation is so desperately broken and beyond help that the legislature is performing a largely ineffectual action that serves more to disclaim any residual responsibility on the part of the public sector for the mess that we’ve created.

azruntime: Manage Azure Infrastructure with Python

I wrote a new Python script called azruntime. It helps me manage my Azure VMs. The script is open-source and should work for anyone who also uses the Azure CLI. azruntime is available on my azure-scripts GitHub repository.

Table of Azure VM information

I learned a lot about the Azure Python SDK while working on the azruntime project. In this post, I share what I learned and highlight the more interesting topics like how to find information faster in the Azure Python SDK documentation, Azure authorization, and sorting nested lists by key.

Learning the Azure Python SDK and API

Microsoft offers excellent documentation of all its Azure services, including detailed documentation for the Azure Python SDK. The problem may be that there is so much documentation it is hard to know where to start.

In my opinion, the best place to start is to look at the Azure sample scripts available at the following URL:

Search by keyword or category. When you find a script that appears to display some of the functionality you want to implement, use a search engine to search for the Azure Python SDK classes and functions you see used in the sample scripts.

This is a faster Continue reading

Arista embraces segmentation as part of its zero-trust security

Arista has expanded its security software to let customers control authorized network access and communication between groups from the data center to the cloud.The new software, Macro-Segmentation Service (MSS)-Group, expands the company’s MSS security-software family, which currently includes MSS Firewall for setting security policies across customer edge, data-center and campus networks. Additionally, the company’s MSS Host focuses on data-center security policies.See how AI can boost data-center availability and efficiency MSS software works with Arista Extensible Operating System (EOS) and its overarching CloudVision management software to provide network-wide visibility, orchestration, provisioning and telemetry across the data center and campus. CloudVision’s network information can be utilized by Arista networking partners including VMware, Microsoft and IBM’s Red Hat.To read this article in full, please click here