As I’ve recently had the opportunity to start working with Cumulus Linux (running on a Dell S6000-ON switch), in this post I wanted to share a few concepts I’ve learned about networking with Cumulus Linux.
I’m not a networking guru, but I’m also not new to configuring network equipment—I’ve configured GRE tunnels on a Cisco router, set up link-state tracking, and enabled jumbo frames on a Nexus 5000 (to name a few examples). I’ve worked with Cisco gear, HP equipment, Dell PowerConnect switches, and Arista EOS-powered switches. However, as a full distribution of Linux, networking with Cumulus Linux is definitely different from your typical network switch. To help make the transition easier, I’ll share here a few things I’ve learned so far.
It’s important to understand that Cumulus Linux isn’t just a “Linux-based network OS”—it’s actually a full Linux distribution (based on Debian). Lots of products are Linux-based these days, but often hide the full power of Linux behind some sort of custom command-line interface (CLI) or shell. Not so in this case! I think this fact is perhaps a bit easy to overlook, but it shapes everything that happens in Cumulus Linux:
Ansible's Director of EMEA Business Development, Mark Phillips, presented at the recent IPEXPO. His talk Simplicity - The Art of Automation was recorded and he was able to combine the slides and the video.
IT infrastructures have grown in complexity over recent years as businesses seek every last competitive gain. Managing these complex infrastructures has become almost as complicated, but should it have? Could we actually gain more, by doing less?
We’re proud to announce some of the speaker lineup for AnsibleFest NYC. AnsibleFest is a day-long conference bringing together hundreds of Ansible users, developers and industry partners to share best-practices, case studies and Ansible news.
Check out our line up of some of the sessions.
AnsibleFest is next Thursday, June 4th in NYC.
Register today as space is very limited.
Ansible v2, James Cammarata, Director of Engineering
A walk through of some of the new features and benefits in the 2.0 release.
Bio:
James Cammarata is a Director of Engineering at Ansible. He is the lead developer of Ansible, and has worked on tools such as Ansible and Cobbler in the past.
Twitter @thejimic
Ansible Tower 2.2, Bill Nottingham, Director of Product, Ansible
Everyone knows about Ansible’s simple, agentless, and powerful automation. (At least, we assume that’s why you’re here.) But sometimes you need more in your organization - you want to be able to find out what happened with your playbook run last week. You want to delegate your rollouts to the dev team, so you don’t have to do it.
We’ll show how Ansible Tower adds control, security, and delegation around Ansible. Plus, we’ll Continue reading
Rubrik today announced a new Series B investment (of $41 million) and introduced their r300 Series Hybrid Cloud Appliance, powered by what they’re touting as a “Converged Data Management” platform. Wow—that’s a mouthful, isn’t it? It sounds a bit like buzzword bingo, but after having spent a bit of time talking to Rubrik last week, there are some interesting (in my opinion) things going on here.
So what exactly is Rubrik doing? Here’s the “TL;DR” for those of you that don’t have the patience (or the time) for anything more in-depth: Rubrik is targeting the secondary storage and backup/recovery market with a solution that combines a distributed file system, a distributed metadata service, clustering, and a distributed task scheduler to provide a scale-out backup/recovery solution that also seamlessly integrates cloud storage platforms for long-term retention. The catch-phrase they’re using is “Time Machine for cloud infrastructure” (I wonder how our good friends in Cupertino will react to the use of that phrase?).
Here’s a bit more detail on the various components of the solution:
As part of a lab rebuild I’ve been doing over the last few weeks (funny how hardware failures can lead to a lab rebuild), I’ve been expanding the use of Ansible for configuration automation. In this post, I’m going to share the process I’ve created for bootstrapping newly-built servers into Ansible.
I developed this Ansible bootstrapping process to work in conjunction with the fully automated Ubuntu installation method that I described in an earlier post. The idea is that I would be able to boot a new server (virtual or physical), choose a configuration from the PXE menu, and a few minutes later have a built Ubuntu system. Then, with a single command, I could “bootstrap” the server into an Ansible configuration automation system. This latter part—configuring systems to work with Ansible—is what I’ll be describing here.
First, a (very) brief overview of Ansible. Ansible is a configuration automation tool that leverages standard SSH connections to remote devices in order to perform its work. Ansible is agentless, so no software has to be pre-installed on the managed servers, but this means Ansible has to authenticate against remote systems in order to establish these SSH connections. This authentication should, in ideal Continue reading
Welcome to Technology Short Take #51, another collection of posts and links about key data center technologies like networking, virtualization, cloud management, and applications/operating systems. Here’s hoping you find something useful in this collection!
We were excited to announce our Simple OpenStack Initiative earlier this week which kicked off with our Collaboration Day in Vancouver at the OpenStack Summit.
The weather, the setting and the conference overall have been just fantastic. I wanted to recap some of the discussions we had in during our collaboration day as it was the perfect jumpstart to this already great week.
We had solid participation from across the board -– networking and hardware leaders, consultants, cloud providers, etc. -- and it reinforced to me how much interest there is in Ansible, and how many angles there are to consider while trying to remain true to our mission of simplicity.
Ansible’s goal is to help everyone move faster to make OpenStack more viable. We really don’t have a horse in the race; we are not in the business of betting on who will get there first, or better. We just want OpenStack to work, for all of us.
There were two high-level themes to the day -- undercloud and overcloud -- and lots of listening, learning and active discussions.
The Undercloud Discussion: OSAD and friends
Kevin Carter of Rackspace, PTL of the OS-Ansible-Deployment (OSAD) project, opened the day with Continue reading
In this post I’ll show you how to use apt-cacher-ng as an Apt proxy for Ubuntu systems on your network. I’m sure there are a lot of other resources that also provide this information, but I’m including it here for the sake of completeness and making it as easy as possible for others. Using an Apt proxy will help reduce the traffic coming from your network to external repositories, but it simpler and easier than running your own internal repository or mirror.
This isn’t the first time I’ve discussed apt-cacher-ng; almost two years ago I showed you how to use Puppet to configure Ubuntu to use apt-cacher-ng. This post focuses on the manual configuration of an Apt proxy.
On the server side, setting up an Apt proxy is as simple as one command:
apt-get install apt-cacher-ng
I’m sure there are some optimizations or advanced configurations, but this is enough to get the Apt proxy up and running.
On the client side, there are a couple of ways to configure the system. You could use a tool like Puppet (as described here), or manually configure the system. If you choose manual configuration, you can place the configuration in either /etc/apt/apt. Continue reading