Archive

Category Archives for "Networking"

Getting grounded in AWS cloud skills

With more and more data-center workloads being shifted to the cloud, it’s important for enterprise IT staff to learn cloud skills not only to stay relevant within their organizations but also to prepare for career advancement and better salaries.One way to accomplish this is to learn the ins and outs of working in specific cloud providers’ environments. This is a brief description of how to get grounded in AWS.According to training firm Global Knowledge, the pay associated with two of the dozens of AWS certifications ranks among the top 15 IT certifications—AWS Certified Solutions Architect—Associate ($149,446) and AWS Certified Cloud Practitioner ($131,465).To read this article in full, please click here

New White Paper: Considerations for Mandating Open Interfaces

People all around the world depend on the Internet to live their lives and do their jobs. Behind the surface of applications, online services depend on “interoperability” – the ability of software to work together.

For instance, this is what allows you to send a document from the Outlook account on your iPhone to a friend’s Gmail, then edit the document on a Samsung tablet before saving it in Alibaba cloud, and finally posting it on Twitter using an application like Hootsuite.

But as we recognized in the 2019 Global Internet Report, trends of consolidation in the Internet economy, particularly at the application layer and in web services, have spurred concerns and public debates on the need to regulate Big Tech. Among the proposed measures by policymakers, academics, and other thought leaders across the world is for software services and systems to be legally required to provide interoperability or open interfaces. Today we release a new white paper on this topic, with the aim to support and add depth to the discussions about the key considerations involved.

The general sentiment among competition experts, policymakers and other stakeholders is that existing competition policy is not addressing the economic and societal Continue reading

An introduction to three-phase power and PDUs

An introduction to three-phase power and PDUs

Our fleet of over 200 locations comprises various generations of servers and routers. And with the ever changing landscape of services and computing demands, it’s imperative that we manage power in our data centers right. This blog is a brief Electrical Engineering 101 session going over specifically how power distribution units (PDU) work, along with some good practices on how we use them. It appears to me that we could all use a bit more knowledge on this topic, and more love and appreciation of something that’s critical but usually taken for granted, like hot showers and opposable thumbs.

A PDU is a device used in data centers to distribute power to multiple rack-mounted machines. It’s an industrial grade power strip typically designed to power an average consumption of about seven US households. Advanced models have monitoring features and can be accessed via SSH or webGUI to turn on and off power outlets. How we choose a PDU depends on what country the data center is and what it provides in terms of voltage, phase, and plug type.

An introduction to three-phase power and PDUs

For each of our racks, all of our dual power-supply (PSU) servers are cabled to one of the two vertically mounted PDUs. Continue reading

Diversity and The Digital Divide: Thoughts From Tech Leaders

Diversity and The Digital Divide: Thoughts From Tech Leaders

Leaders from across the tech industry and beyond recently joined us for Cloudflare’s Birthday Week, helping us celebrate Cloudflare’s 10th birthday. Many of them touched on the importance of diversity and making the Internet accessible to everyone.

Here are some of the highlights.

On the value of soliciting feedback

Selina Tobaccowala
Chief Digital Officer at Openfit, Co-Founder of Gixo
Former President & CTO of SurveyMonkey

Diversity and The Digital Divide: Thoughts From Tech Leaders

When you think about diversity and inclusion, unfortunately, it's often only the loudest voice, the squeakiest wheel [who gets heard]. And what a survey allows you to do is let people's voices be heard who are not always willing to raise their hand or speak the loudest.

So at SurveyMonkey, we always made sure that when we were thinking about user testing and we were thinking about usability testing — that it was that broad swath of the customer because you wanted people across all different segments to submit their opinion.

I think that collecting data in a way that can be anonymized, collecting data in a way that lets people have a thoughtful versus always off the cuff conversation is really important. And what we also provided was a benchmarking product, because if you Continue reading

AWS offers “bare-metal” Mac cloud services

Amazon Web Services has announced that it is offering what it calls bare-metal Macs in its cloud, although Amazon’s definition of “bare metal” doesn’t exactly jibe with the generally accepted definition.“Bare metal” typically means no operating system. It’s very popular as a means of what is known as “lift and shift,” where a company takes its custom operating environment, starting with the operating system, libraries, apps, databases, and so on, and moves it from on-premises to the cloud without needing to make a modification to its software stack.Here, Amazon is offering Macs running macOS 10.14 (Mojave) or 10.15 (Catalina) on an eighth generation, six-core Intel Core i7 (Coffee Lake) processor running at 3.2 GHz. (Amusingly, the instances are run on Mac Minis. What I wouldn’t give to see a data center with racks full of Mac Minis.)To read this article in full, please click here

What Does A Good Network Design Look Like? – James Bensley, Senior Network Design Engineer

Is a good network design just about technical specifications or should you take into account business drivers and needs? James is a network design veteran and presented on this topic at UKNOF45. We talk about design considerations, tips and tricks, drivers and motivations, asking the question behind the question and even about a book that is ‘in the works’. James is very active on Twitter, LinkedIn and can be reached via [email protected].

MANRS Welcomes 500th Network Operator

Today, we are glad to share a milestone for the Mutually Agreed Norms for Routing Security (MANRS) initiative: the number of participants in the network operator program has reached 500.

By joining the community-driven initiative, these network operators, big and small, from around the world have taken specific, concrete actions to improve the resilience and security of the Internet’s inherently insecure routing infrastructure.

Systemic security issues about how traffic is routed on the Internet make it a relatively easy target for criminals. MANRS helps reduce the most common routing threats and increase efficiency and transparency among Internet service providers (ISPs) on peering relationships.

The growth of the network operator program – the oldest among three today – has been accelerating in recent years. Launched in 2014 with a group of nine operators, the number of participants in the program took four years to reach 100 in 2018 and has risen sharply in the last two years, with 156 joining in 2019 and 244 so far in 2020.

The 500 network operators manage 651 autonomous systems in total, as some of them manage multiple networks.

Meanwhile, the Internet Exchange Point (IXP) program, which we launched in 2018, now has 60 Continue reading

Isovalent Harnesses eBPF for Cloud Native Security, Visibility

Veteran networking pros at Extended Berkeley Packet Filter (eBPF) technology, which makes the Linux kernel programmable, to address the ephemeral challenges of Kubernetes and microservices. “If you think about the Linux kernel, traditionally, it’s a static set of functionality that some Linux kernel developer over the course of the last 20 or 30 years decided to build and they compiled it into the Linux kernel. And it works the way that kernel developer thought about, but may not be applicable to the use case that we need to do today,” said Isovalent CEO

Fast Failover: Techniques and Technologies

Continuing our Fast Failover saga, let’s focus on techniques and technologies available to implement it (assuming you still think it’s worth the effort).

The following text is heavily based on comments Jeff Tantsura wrote on one of my LinkedIn posts as well as the original blog post. Thank you!

There are numerous technologies you can use to implement fast reroute, from the most complex to the easiest one:

Rails Generators Cheat Sheet

As I am digging into Rails again I find myself constantly having to look the naming and syntax of generators up so I am documenting them in this post. Rails utilizes convention over configuration to speed up development and increase developer happiness. If you embrace this fact you will...

Bypassing safety check for an obviously safe change

This is less concrete technical than my usual blog post.

For every 100 changes we’re 99% sure won’t cause an outage, one will

It’s actually hard to be 99% sure of anything. I’m not 99% sure today’s Thursday. I say that because more often than one day in a hundred, I’ll think “hmm… feels like Wednesday” when it’s not.

I just closed my eyes and tried to remember what time it is. I don’t think I can guess with 99% accuracy what hour I’m in. (but to be fair, it’s de-facto Friday afternoon today, as I’m off tomorrow).

Anyway… the reason I say this is that this should be kept in mind every time someone comes and says they want to circumvent some process for a change that they are absolutely sure won’t cause an outage, that can actually be put into numbers. And those numbers are “you are not 100% sure of anything”.

By saying you are 99% sure this won’t cause an outage (and are you right about that?) you are saying that for every 100 requests like yours that will bypass normal checks, there will be an outage. You are taking on an amortized 1% of Continue reading

SUSE’s Rancher acquisition brings containerization support

SUSE’s acquisition of Rancher Labs puts the Germany-based open-source software company in a much stronger position to offer flexible, edge-based services to its customers, according to an analyst at IDC.The deal—which was originally announced this summer—essentially makes Rancher Labs into SUSE’s containerization “innovation center,” said IDC research director Gary Chen. Any customer working on digital transformation and rapid development is likely to appreciate the improved support for containerization—letting workloads function on whatever hardware is handy, and communicate across different arrangements of edge, cloud and local computing.Terms of the deal were not publicly disclosed, but a CNBC report published after the initial announcement quoted sources familiar with the deal as saying that SUSE is paying between $600 million and $700 million.To read this article in full, please click here

SUSE’s Rancher acquisition brings containerization support

SUSE’s acquisition of Rancher Labs puts the Germany-based open-source software company in a much stronger position to offer flexible, edge-based services to its customers, according to an analyst at IDC.The deal—which was originally announced this summer—essentially makes Rancher Labs into SUSE’s containerization “innovation center,” said IDC research director Gary Chen. Any customer working on digital transformation and rapid development is likely to appreciate the improved support for containerization—letting workloads function on whatever hardware is handy, and communicate across different arrangements of edge, cloud and local computing.Terms of the deal were not publicly disclosed, but a CNBC report published after the initial announcement quoted sources familiar with the deal as saying that SUSE is paying between $600 million and $700 million.To read this article in full, please click here

What is a WAN? Wide-area network definition and examples

People want to connect to all of their apps all of the time from all of their devices no matter where they are. And they pretty much can, thanks to wide-area networks (WANs).At its core, a WAN is a network of networks. The Internet itself is a giant WAN, and how you connect to it can be as diverse as through an Ethernet cable, coaxial cable, or a cellular radio signal.Your office network, home Wi-Fi, cellphone, smartwatch, doorbell camera and vehicle-based Internet connection are just endpoints on a vast global WAN that is constantly evolving to carry more traffic, and to carrt that traffic faster as the demands for near-instantaneous access to resources increase.To read this article in full, please click here

BGP Training on Ignition

The first hour of material in my new BGP course over at Ignition dropped this week. I’m not going to talk about configuration and other operational things—this is all about understanding how BGP works, why it works that way, and thinking about design. This course will apply to cloud, Internet edge, DC fabric, and other uses of BGP. From the official site:

BGP is one of the fundamental protocols for routing traffic across the Internet. This course, taught by networking expert and network architect Russ White, is designed to take you from BGP basics to understanding BGP at scale. The 6-hour course will be divided into several modules. Each module will contain multiple video courses of approximately 15 minutes each that drill into key concepts. The first module contains four videos that describe how BGP works. They cover basics including reachability, building loop-free paths, BGP convergence, intra-AS models, and route reflectors.

Available here.