Hello my friend,
Some time ago we have covered in-depth OpenConfig with NETCONF configuration as well as the OpenConfig telemetry with NETCONF. Today we want to make a next step and start discussion about another approach to manage the network elements in a programmatic way, which is gNMI.
1
2
3
4
5 No part of this blogpost could be reproduced, stored in a
retrieval system, or transmitted in any form or by any
means, electronic, mechanical or photocopying, recording,
or otherwise, for commercial purposes without the
prior permission of the author.
Following your asks we open a new format for the network automation training – self-paced format:
You decide on your own when, how often and how quickly you can learn.
However, if you want to join groups, that is something we are happy to offer you as well.

At this training we teach you all the necessary concepts such as YANG data modelling, working with JSON/YAML/XML Continue reading
Imagine a life where you would be able to…
… and be able to do all that in a multi-vendor environment without writing tons of Ansible playbooks or Python code.
Juniper devices have a default ARP policer that drops ARP requests and responses over 150kbps. By default, this is an aggregate policer that applies to all interfaces. This can lead to unexpected behavior when high levels of ARP on one interface lead to BGP session drops on another interface. You can’t change the default policer limits, but you can create a new policer, with higher limits.
I was investigating a problem reported by one of our Transit providers. Once a day or so, our IPv4 BGP session with them would flap. The interface itself was stable, and the IPv6 session remained up. One particular site was seeing this more than others. The sites used different platforms, but were running the same code version.
The curious thing was the logs - we saw log messages saying that we had a notification message saying NOTIFICATION received from 192.0.2.188 (External AS 64498): code 4 (Hold Timer Expired Error). The syslog included this hold timer 30s, hold timer remain 0s, last sent 2s. So our router thought it was sending regular KEEPALIVE messages, but the remote end thought it had missed too many.
Looking Continue reading
Juniper devices have a default ARP policer that drops ARP requests and responses over 150kbps. By default, this is an aggregate policer that applies to all interfaces. This can lead to unexpected behavior when high levels of ARP on one interface lead to BGP session drops on another interface. You can’t change the default policer limits, but you can create a new policer, with higher limits.
I was investigating a problem reported by one of our Transit providers. Once a day or so, our IPv4 BGP session with them would flap. The interface itself was stable, and the IPv6 session remained up. One particular site was seeing this more than others. The sites used different platforms, but were running the same code version.
The curious thing was the logs - we saw log messages saying that we had a notification message saying NOTIFICATION received from 192.0.2.188 (External AS 64498): code 4 (Hold Timer Expired Error). The syslog included this hold timer 30s, hold timer remain 0s, last sent 2s. So our router thought it was sending regular KEEPALIVE messages, but the remote end thought it had missed too many.
Looking Continue reading
Nokia faced a hostile takeover bid; Google eyeing a D2iQ purchase; T-Mobile to slash $30M in cloud...
A tweet by Corey Quinn pointed me to his hilarious riff on the you are not Google and don’t have the same problems theme. Enjoy!
"We might be slowed down on the number of base stations that we are able to construct, but I...
Mat Jovanovic decided to follow my lead and migrate his blog from Blogger to Hugo, using Docsy theme, AWS Amplify as the CI/CD pipeline, and AWS S3 as the hosting platform.
Nice job… but he did way more than that - he documented the whole process, including tool selection, setup, and Blogger migration.
Thank you Mat! Every time I see someone publishing blog posts about open-source tools on Medium I’ll send them a link to your blog (with a comment “this is how you should blog about open-source solutions").
Network Tracing sometimes is really important, although most of the times tcpdump utility is quite handy there are other tools that can make life much easier.
while am no expert in eBPF and scripts, i do know how to use bcc-tools in some scenarios.
https://github.com/iovisor/bcc/blob/master/INSTALL.md#ubuntu—binary
Alright What is the scenario:
Let’s start with something small, you want to measure TCP connection latency.



Other interesting options, you can capture lifetime, stats and most importantly TCP-Retransmissions


Ebpf filters are safer and more powerful to implement, give this a consideration during any Linux troubleshooting scenarios.
-Rakesh
Cisco patched firewall bugs; Amazon threw another JEDI tantrum fit ; and Dish fought off critics,...
On today's Heavy Networking podcast, guest Cory Steele visits the podcast to make the case that overlays such as LISP offer unique benefits for the network. Greg Ferro disagrees, and makes the case for protocols like QUIC, TLS, and IPSec, and argues for the concept of end-to-end connectivity as the IP network was intended.
The post Heavy Networking 516: Is LISP The Overlay Of The Future? appeared first on Packet Pushers.
What is Python Automated Test System (pyATS)? None of the answers I found to this question really made much sense to me initially. A Python3 based Test Automation and Validation Framework developed by Cisco (but open and extensible to any vendor) is probably the best short answer but still too vague. Add in Genie because, READ MORE
The post Getting Started with pyATS (and Genie) appeared first on The Gratuitous Arp.
The Internet Society India Chennai Chapter organized a virtual roundtable in March, a few days after the Indian government announced a three-week nationwide lockdown. The virtual roundtable was a conversation on the importance of keeping the Internet open, and on the ways in which the Internet community could contribute to COVID-19 response and recovery in India and around the globe.
The virtual roundtable brought together a wide range of Internet stakeholders, including Andrew Sullivan, Jane Coffin, Mike Godwin, Yrjö Länsipuro, Wolfgang Kleinwächter, Olivier Crepin-Leblond, Sébastien Bachollet, Samiran Gupta, and Glen McKnight, as well as members of the Chapter from civil society and the private sector.
Some key highlights and takeaways from the virtual roundtable include the following:
The COVID-19 pandemic underscores the importance of the Internet. Without access, people are unable to communicate with family members and health workers, and participate in online learning and remote work.
The pandemic has clearly exposed the inequalities in Internet access and affordability – the digital divide across the region. Connecting the billions of people who are not yet connected must be a priority. At the same time, their privacy and autonomy must be protected.
Internet technologies can help us fight against the pandemic. Continue reading
Despite the calamity brought on by COVID-19, Dish still plans to launch 5G service in a single...
SDxCentral Weekly Wrap for May 8, 2020: Nutanix to furlough 25% of its workforce; IBM wears Red Hat...
Steven Wood, Cisco’s principal engineer of enterprise architectures and SD-WAN, made the...