In the last part of my chat with David Bombal we discussed interesting technologies networking engineers could focus on if they want to grow beyond pure packet switching (and voice calls, if you happen to believe VoIP is not just an application). We mentioned public clouds, automation, Linux networking, tools like Git, and for whatever reason concluded with some of my biggest blunders.
In the last part of my chat with David Bombal we discussed interesting technologies networking engineers could focus on if they want to grow beyond pure packet switching (and voice calls, if you happen to believe VoIP is not just an application). We mentioned public clouds, automation, Linux networking, tools like Git, and for whatever reason concluded with some of my biggest blunders.
AWX is now deployed on Kubernetes (since AWX release 18), which is great – the only thing is, what do you do if this is the only application you need Kubernetes for? It is a bit of a hassle setting up the K8s master and worker nodes just for a single application.
The documentation suggests you use Minikube for this, but that seems to be designed for local / testing use only. There’s no middle ground between these two options, so I decided to work it out on MicroK8s.
MicroK8s is Canonical’s minimal production Kubernetes environment. It installs on one host, but can be set up for high availability and even run on a Raspberry Pi!
Here are the instructions if you want to do the same.
Install an Ubuntu 20 host on a t2.medium or higher instance in AWS.
Give it 20Gb of general purpose SSD disk.
Create a security group that permits TCP/443 through from your location – only TCP/22 is permitted by default.
Install Microk8s on a new Ubuntu host in AWS:
ubuntu@ip-172-31-0-208:~$ sudo snap install microk8s --classic microk8s (1.20/stable) v1.20.5 from Canonical✓ installed ubuntu@ip-172-31-0-208:~$
Add the ‘ubuntu’ user you are logged in Continue reading
In this week's IPv6 Buzz episode, Ed, Scott, and Tom discuss the state of public VPN services and IPv6 with Tomislav Čohar, principal architect at, and cofounder of, the hide.me VPN service.
The post IPv6 Buzz 074: IPv6 And Public VPN Services appeared first on Packet Pushers.
Today is Earth Day, an international event celebrated around the world to pledge support for environmental protection. From small actions to large, we all have a role to play in protecting our planet. As we celebrate today, we’re shining a light on people like Chomora Mikeka, a scientist in Malawi and a recent awardee of […]
The post Greening the Internet: Five Questions with Dr. Chomora Mikeka appeared first on Internet Society.
Bitcoin – something we have all heard of but never fully understand what the hype is all about. Apart from the hype, there are always news headlines regarding the scandals related to bitcoin. All of this talk in town only leads us to one question: what’s the controversy over Bitcoin?
For starters, you need to know what Bitcoin is. According to the company, they are the pioneers of a peer-to-peer payment network that involves no intermediary. Here , the first controversy begins: governments are highly against cryptocurrencies like Bitcoin simply due to the lack of a middleman during the buying and selling of money or commodities.
Governments are the ones who issue currencies to their people. While currencies are merely numbers printed on pieces of paper or metal, the government claims that they have value, and the general population believes them. These notes and coins are then used to make transactions of all kind, and the money flows around through the entire economy.
However, conventional currencies do not have any actual value since they cannot be given back to the government in exchange for commodities. If you want to purchase even something as simple Continue reading
Recently I joked there’s significant difference between AWS and Azure launching features:
Those with long enough memories shouldn’t be surprised. It’s not the first time Microsoft is using the same tactics.
Recently I joked there’s significant difference between AWS and Azure launching features:
Those with long enough memories shouldn’t be surprised. It’s not the first time Microsoft is using the same tactics.
Although there are varying opinions 5G—is it real? Is it really going to have extremely low latency? Does the disaggregation of software and hardware really matter? Is it really going to provide a lot more bandwidth? Are existing backhaul networks going to be able to handle the additional load? For network engineers in particular, the world of 5G is a foreign country with its own language, expectations, and ways of doing things.
On this episode of the Hedge, Ian Goetz joins Tom Ammon and Russ White to provide a basic overview of 5G, and inject some reality into the discussion.
Across industries, network segmentation is quickly becoming a critical capability for enterprises of all sizes. Why? First, network segmentation prevents the lateral spread of threats inside the network. Second, it separates dev, test, and production environments. And lastly, it meets increasingly complex compliance requirements while enabling a Zero Trust security strategy.
However, historically network segmentation has been fraught with operational challenges and limited by platform capabilities, leading to the perception that setting up and configuring segmentation policies requires massive changes to the physical network as well as a complex, bloated, and costly deployment of physical firewall appliances.
Not anymore. VMware takes a distributed, software-based approach to segmentation, eliminating the need to redesign your network in order to deploy security. Instead, segmentation policies are applied at the workload level through NSX Firewall, which is deployed on top of your existing VSphere 7 environments. This allows you to easily create zones in the data center where you can separate traffic by application or environment — providing the quickest and easiest way to achieve your data center segmentation Continue reading