Archive

Category Archives for "Networking"

SC19 SCinet: Grafana network traffic dashboard

The Grafana sFlow-RT Countries and Networks dashboard above shows traffic on the SCinet network, described as the fastest, most powerful volunteer-built network in the world. The network is build each year to support The International Conference for High Performance Computing, Networking, Storage, and Analysis. The SC19 conference is currently underway in Denver, Colorado and the screen capture is live data from the conference network.
The high speed switches and routers used to construct the SCinet network support industry standard sFlow streaming telemetry. In this case an instance of the sFlow-RT analytics engine receives the telemetry stream and generates flow analytics that are scraped every 15 seconds by an instance of the Prometheus time series database. The Prometheus database is in turn queried by an instance of Grafana which generated the dashboard shown at the top of the page.
In addition, sFlow-RT is running an embedded application that generates a real-time, up to the second, view of the traffic over the last 5 minutes.
This solution is extremely scalable. A single sFlow-RT instance, allocated only 1G of memory, easily monitors 158 network devices, while supporting 11 different applications (including the real-time dashboard and Prometheus export applications shown above).

A10 Says Multi-Cloud Is Passé, Pushes Polynimbus

Polynimbus is essentially multi-cloud phase two, and it addresses how to manage and secure...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Five Key Takeaways from the Summit in Asia-Pacific on Deploying, Sustaining and Scaling Community Networks

Community networks (CNs) offer a solution to connect the unconnected billions. They are becoming all the more important as recent trends reveal a slowdown in Internet connectivity growth through national operators in the Asia-Pacific region.

Late August, the Internet Society and the United Nations Economic and Social Commission for Asia and the Pacific organized the Asia-Pacific Regional CN Summit 2019 in Bangkok, Thailand. The event brought together about 110 participants that included high-level government officials from Asia and the Pacific, and a multidisciplinary group of regional experts on community networks, civil society groups, industry representatives, and academics and researchers to deliberate on critical issues surrounding CNs.

What are Community Networks?

They are “do-it-yourself” networks built by people for people. They are not just connecting communities, but are empowering rural and remote communities to improve their lives. Speakers and participants at the Summit shared some successful examples from the region, including India’s Garm Marg Rural Broadband Project, which has improved communities’ access to government and financial services, Nepal’s community networks, which have helped communities recover from the devastating Gorkha Earthquake in 2015 and prepare for future disasters, and Pakistan’s community network, which has enhanced learning for girls at a remote Continue reading

Nvidia, Azure Bring Supercomputing to the Masses

Nvidia's GPU-accelerated supercomputers will soon be available for researchers to rent on Microsoft...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

5G and Me: And Manufacturing

With its increased speed, higher bandwidth and lower latency, fifth-generation wireless cellular...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

NSX Service Mesh on VMware Tanzu: CONNECT & PROTECT Applications Across Your Kubernetes Clusters and Clouds

Authors: Mark Schweighardt, Tom Spoonemore

Modern enterprises are sprawling and complicated. They are transitioning from private to public clouds to address, for example, performance, availability, and data residency requirements, and to gain access to advanced services such as analytics and ML. They are also transforming their application architectures from monoliths to distributed microservices.

In August 2019, VMware introduced VMware Tanzu, a new portfolio of products and services to transform the way enterprises BUILD modern applications on Kubernetes, consistently RUN Kubernetes across clouds, and MANAGE Kubernetes fleets from a single control point. This is a huge win for our customers: Using Tanzu Mission Control to consistently create and manage the lifecycle of Kubernetes clusters across any cloud. 

But how do we consistently connect and secure traffic between the services distributed across all of these clusters and clouds, while delivering on application SLAs? Today we further develop this picture by introducing NSX Service Mesh on VMware TanzuNSX Service Mesh provides an application connectivity and security fabric that can span across all of your Kubernetes clusters and cloud environments. NSX Service Mesh allows you to: 

Get this $112 Cybersecurity eBook Bundle for just $15 today

The internet has made it easier than ever for companies to expand their reach and go digital, but by doing so, they’re also at risk of being attacked by hackers and cybercriminals. Luckily, this also means that cybersecurity professionals are in high demand, and if you want to land a career in cybersecurity, there’s no better time! With this eBook bundle, you’ll learn what it takes to become a cybersecurity professional for just $15.To read this article in full, please click here

Network Break 261: Juniper EX Switches Get Misty; Cisco’s Tough Day On Wall Street

Time for a break! Enjoy a virtual donut as we analyze the latest tech news, including a new wired automation service from Juniper, Docker's divestment of its enterprise biz, a new SD-WAN entrant from Untangle, the rollout of a commercial version of AT&T's open network OS, and more!

The post Network Break 261: Juniper EX Switches Get Misty; Cisco’s Tough Day On Wall Street appeared first on Packet Pushers.

BrandPost: SD-WANs Enable Scalable Local Internet Breakout but Pose Security Risk

SD-WAN streamlines how application traffic is routed from the branch, making it easier to create local internet breakout and allowing users to access cloud services directly from the branch. In an ideal SD-WAN scenario, every remote location and device has its own local internet breakout and corresponding security services. Yet, reality looks a lot different for many companies. This is something network professionals have wanted to enable for decades. The problem was that setting up local internet breakout using traditional routers was not trivial and required a tremendous amount of engineering work so most businesses, except for the ones that had high levels of technical talent shied away. The shift to cloud and edge computing has made local internet breakout almost mandatory today, so businesses have turned to SD-WAN as a simpler path to enable it. As this happens, organizations need to understand the security risks. To read this article in full, please click here

Security Policy as Code Now Fully Automated with Calico Enterprise 2.6

We are excited to announce the general availability of Calico Enterprise 2.6 (formerly known as Tigera Secure). With this release, it is now possible to fully-automate Security-Policy-as-Code within a CI-CD pipeline, including the ability to implement security as a Canary rollout, which is the most critical requirement to automating network security.

DevOps is now mainstream and practiced in nearly every major enterprise; it has transitioned from what was a competitive differentiator a few years ago to the industry standard today.

DevOps relies on automation to continuously optimize the cycle time from code to production. DevOps automation manifests itself in 2 forms.

  1. Automation of the underlying infrastructure (infrastructure as code)
  2. Automation of the software delivery process (Continuous Integration and Continuous Delivery (CICD) pipeline)

Security has become an integral part of the DevOps team’s responsibilities. A quick sample of DevOps jobs on LinkedIn is a quick example; nearly every DevOps job posting has “security” as a required responsibility. It’s no longer enough to automate the infrastructure, it is now necessary to implement security within the delivery pipeline and perhaps link SW CI-CD pipelines with the corresponding security policies that they should be deployed with. DevOps teams have struggled to automate this Continue reading

Go Notes: Variables

There are a number of methods to define variables in Go. Considerations Variable names must begin with a letter or a number When a variable is declared but not yet assigned it has a default value for its type A variable that is declared must be used Constants can only be assigned at the...

Test coverage of Python packages in Cisco NSO

In most of the Python projects I’m working with Pytest is used to test the code, and Coverage is used to check what lines that the tests validate. For this to work, Coverage must take part in the execution of the Python code. While this isn’t a problem for most projects working with NSO poses a challenge since the actual Python code for each NSO package gets executed in a separate Python virtual machine. The goal of this article is to show you how you can overcome this obstacle and gain some insight into your test coverage for your NSO Python packages. Continue reading

IBM Kicks Up Kubernetes Compatibility With Open Source

IBM unveiled new open source projects Kui and Iter8, along with advancements to existing Tekton and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.