The cloud giant signed a deal to provide services to different U.K. government agencies at...
IPv6 is old enough to buy its own beer (in US, not just in Europe), but there are still tons of naysayers explaining how hard it is to deploy. That’s probably true if you’re forced to work with decades-old boxes, or if you handcrafted your environment with a gazillion clicks in a fancy GUI, but if you used Terraform to deploy your application in AWS, it’s as hard as adding a few extra lines in your configuration files.
Nadeem Lughmani did a great job documenting the exact changes needed to get IPv6 working in AWS VPC, including adjusting the IPv6 routing tables, and security groups. Enjoy ;)
Rakuten Mobile isn’t going far, less than 10 miles in fact, for the procurement of its 5G core.
The company claims these new appliances will help to support a wider array of operator use cases...
Personal branding and marketing are two key topics that surface from time to time, but very few people talk about how to actually do these things. For this episode of the Hedge, Evan Knox from Caffeine Marketing to talk about the importance of personal marketing and branding, and some tips and tricks network engineers can follow to improve their personal brand.
Early adopting service providers include AT&T, Bestel, Bloomberg, Colt Technology Services,...
YAML, previously known as Yet Another Markup Language, but now YAML Ain’t Markup Language, is a human friendly data serialization standard for programming languages.
YAML and JSON, JavaScript Object Notation, are related to each other, where YAML, according to YAML 1.2 specification, is a superset of JSON.
YAML supports using scalars, sequences, and mappings. A scalar is a string, a number, or boolean, a sequence is a list, and a mapping is a key/value pair.
YAML is commonly used by configuration files in open source tools and Ansible, a network automation tool, uses YAML to run its playbooks.
When it comes to YAML syntax, be aware of the following:
Scalars are single values. It can be a string, number, or a boolean value. Strings don’t need to be quoted, except for some special cases:
Hello my friend,
We have received a lot of positive feedbacks in the social media regarding our previous post about collecting info from Nokia SR OS and Arista EOS using gRPC/gNMI. Thank you! Today we will cover the configuration part; hence, you will learn how to configure Arista EOS and Nokia SR OS using the gRPC transport with gNMI specification and OpenConfig YANG modules.
1
2
3
4
5 No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.
Just in two weeks we start the new network automation training! This time we have ever biggest agenda with all the cutting edge technologies (NETCONF, REST API, gNMI), data models (YANG, Protobuf, JSON, XML, YAML), vendors (Cisco, Nokia, Arista, Cumulus) and a lot of programming (Ansible, Python, Bash) salted with Linux administration, virtualisation, containerisation and many more
In one place you will learn all the technologies and tolls you need to start or improve your career in the world of the Continue reading
Today we are excited to announce the release of Noction Flow Analyzer v 20.05.0 The new version is now even more powerful,
The post Noction Flow Analyzer v 20.05.0 appeared first on Noction.
Subscribe to Kernel of Truth on iTunes, Google Play, Spotify, Cast Box and Sticher!
Click here for our previous episode.
With the recent acquisition of Cumulus Networks by Nvidia, what does that mean for open networking? Kernel of Truth host Roopa Prabhu is joined by Partho Mishra and Amit Katz to discuss what does the acquisition mean for the future of accelerated data center and for open networking in the data center. This is a must listen episode!
Guest Bios
Roopa Prabhu: Roopa Prabhu is Chief Linux Architect at Cumulus Networks. At Cumulus she and her team work on all things kernel networking and Linux system infrastructure areas. Her primary focus areas in the Linux kernel are Linux bridge, Netlink, VxLAN, Lightweight tunnels. She is currently focused on building Linux kernel dataplane for E-VPN. She loves working at Cumulus and with the Linux kernel networking and debian communities. Her past experience includes Linux clusters, ethernet drivers and Linux KVM virtualization platforms. She has a BS and MS in Computer Science. You can find her on Twitter at @__roopa.
Amit Katz: Amit is Vice President Ethernet Switch at Mellanox, Nvidia Business Unit. Amit served as Senior Director of Continue reading
SDxCentral also condemns police brutality and the rash of racially motivated murders of the black,...
Workplace expert Maxie McCoy says the COVID-19 era has changed almost everything about the office,...
Mitsubishi Corporation (“MC”) and Nippon Telegraph and Telephone Corporation...
Cisco Live postposed in light of recent events; Dell, VMware supercharged AI; and Chipmakers...
As we’ve often seen in the past, real world protest and violence is usually accompanied by attacks on the Internet. This past week has been no exception. The shocking murder of George Floyd on May 25 was followed, over the weekend of May 30/31, by widespread protests and violence in the US. At the same time, Cloudflare saw a large uptick in cyberattacks, particularly cyberattacks on advocacy organizations fighting racism.
This chart shows the number of cyberattack HTTP requests blocked by Cloudflare over the last week (blue line) compared to the corresponding week in April a month before (green line). Cloudflare’s scale means that we are blocking attacks in the many 10s of billions per day, but even with that scale it’s clear that during the last week there have been even more attacks than before. And those attacks grew over the weekend.
Digging in a little deeper we can compare the attacks over this past weekend with a corresponding weekend a month before. Over the weekend of April 25/26, Cloudflare blocked a total of 116,317,347,341 (a little over 116 billion cyberattack HTTP requests performing DDoS or trying to break into websites, apps or APIs were blocked).
Since 116,317,347,341 can Continue reading
Fear not slow migrators, legacy technologies are not obsolete – yet.
By now, many of us are realizing we’ve been taking access to basic things for granted, such as social interaction, health care, on-site education, and…the Internet. While always valuable, the Internet is now a lifeline offering a fortunate few the ability to adapt and maintain a semblance of reality and connection to our employment, health services, and our family and friends. But those who don’t have access to fast, reliable broadband Internet are experiencing the pain of staying at home. Last year, an analysis by Microsoft indicated that 162.8 million Americans aren’t able to use the Internet at broadband speeds. That’s unacceptable, and while there are steps that communities continue to take to build their own networks, Congress needs to lead by taking steps to ensure that broadband access is available at an affordable price to all Americans.
While some cities and states have begun to relax orders, our return to normal life is still a long way off.
Congress took the first important step with the CARES Act, but it did not go far enough. The HEROES Act and the COVID-19 DISASTER in Indian Country Act are a more serious step toward addressing the connectivity needs of localities, and we applaud these Congressional actions. Now, it is time to move this critical legislation Continue reading