Podcast with Cumulus on Infrastructure-as-a-code in real life.

Hello my friend,

I had an honour to be invited to Cumulus Linux podcast, where we had quite an interesting discussion about the role of network automation and real-life challenges.

The discussion covered the experience we collected in THG (The Hut Group) Hosting during driving the build of the open network data centres implementing the latest achievements of white boxes, disaggregation and (add your marketing buzzword here). And yes, we speak about real-life experience, not the lab tests in Cumulus VX ?

The whole podcast you can list at the Cumulus Website.

Support us





P.S.

If you have further questions or you need help with your networks, I’m happy to assist you, just send me message. Also don’t forget to share the article on your social media, if you like it.

BR,

Anton Karneliuk 

How to tell if you’re using a bash builtin in Linux

If you’re not sure if you’re running a Linux command or you’re using a bash builtin, don’t stress, it isn’t all that obvious. In fact, you can get very used to commands like cd without realizing that they’re part of your shell, unlike commands like date and whoami that invoke executables (/bin/date and /usr/bin/whoami).Builtins in general are commands that are built into shell interpreters, and bash is especially rich in them, which is a good thing because built-ins by their very nature run a bit faster than commands which have to be loaded into memory when you call them into play.To read this article in full, please click here

Kernel of Truth season 2 episode 14: Infrastructure as code in action

Subscribe to Kernel of Truth on iTunes, Google Play, SpotifyCast Box and Sticher!

Click here for our previous episode.

In this episode we continue the conversation about “infrastructure as code.” Last time we chatted about it we talked to Nick Mitchell and Eric Pulvino, two of our consultants, and shared not only what it is but what the problems infrastructure as code is solving for and why you should care. In this latest episode we go a step further.​ Kernel of Truth hosts Brian O’Sullivan and Pete Lumbis are joined by​ Anton Karneliuk who talk more about what it is and also discuss how to evolve it, what the challenges are and Anton shares his real-life experiences implemented it at The Hut Group.

Guest Bios

Brian O’Sullivan: Brian currently heads Product Management for Cumulus Linux. For 15 or so years he’s held software Product Management positions at Juniper Networks as well as other smaller companies. Once he saw the change that was happening in the networking space, he decided to join Cumulus Networks to be a part of the open networking innovation. When not working, Brian is a voracious reader and has held a Continue reading

Routing Boosts Switching As The Lines Between Them Blur

With the dividing line between switching and routing blurring among the hyperscalers and cloud builders, it is no wonder to us that switching is growing as Ethernet switch ASICs get more and more routing functions and true Ethernet routing has remained more or less flat in the past five years.

Routing Boosts Switching As The Lines Between Them Blur was written by Timothy Prickett Morgan at The Next Platform.

Fortinet Leapfrogs Cisco With 21,000 SD-WAN Customers

Late last month Cisco announced it had 20,000 SD-WAN customers spread across its Viptela and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Tenancy and the importance of defining it.

One of the common starting points during the IT architecture process is trying to define and identify tenancy. Part of the problem is that the term “tenant” has various definitions depending on the business unit. As a network engineer, I don’t care about one of those definitions of the word: “Layer 3 subnet isolation with a unified set of routing and security policies.” Trying to communicate that to technical leaders in other IT organizations is hard enough, but trying to communicate this to a non-technical business leader can feel like an impossible task.

The goal then becomes trying to distill the complexities of a tenant into a consumable morsel.

What happened?

In my most recent consulting engagement, I worked with a company that had three key players during the design stage:

  • Server team
  • Network team
  • Business team

We kept using the word “tenancy” thinking we were speaking the same language , but we slowly realized that we weren’t speaking with the same definitions. In my network-first definition, I only cared about the subnets allocated to the servers and whether the servers were able to talk to each other. From my definition of tenancy, any server allocated to a tenant Continue reading

Full Stack Journey 037: The Influence Of Open Source In A Tech Career With Matt Broberg

Open source software has had a significant influence on the tech career of today's Full Stack Journey podcast guest, Matt Broberg. We discuss why open source has been so influential, the importance of community in IT, and topics such as how to stay technical when your role changes, and why business fundamentals should matter to technologists.

The post Full Stack Journey 037: The Influence Of Open Source In A Tech Career With Matt Broberg appeared first on Packet Pushers.

Amazon Snaps at New York Times Open Source Critique

“AWS has not copied anybody’s software or services," wrote Andi Gutmans, VP for analytics and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cisco Wins Latest Battle in War Against Chinese Counterfeiters

Cisco has been battling Chinese manufacturers over the sale of spurious versions of its products...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Intel Chip Flaw Plunderbolt Hits Secure Enclaves

The chipmaker issued a patch for the vulnerability, which could allow attackers to change...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Heavy Networking 495: Smart, Effective, Automated SecOps With Tufin (Sponsored)

The growing complexity of IT environments make it harder for SecOps teams to keep pace with developers, manage access to resources, and ensure that the right controls are in place and policies are met. Sponsor Tufin joins the Heavy Networking podcast to discuss how automation can boost SecOps effectiveness while tackling initiatives such as zero trust and network segmentation on premises and in the cloud.

The post Heavy Networking 495: Smart, Effective, Automated SecOps With Tufin (Sponsored) appeared first on Packet Pushers.

Corsa’s Eduardo Cervantes Talks Scaling Network Security for Encrypted Traffic Inspection

Hear from Corsa's Eduardo Cervantes and his thoughts on security, the data explosion, and why...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Related Stories

BGP PIC – Prefix Independent Convergence Fundemantals

BGP PIC ( Prefix Independent Convergence ) is a BGP Fast reroute mechanism which can provides sub second convergence even for the 500K internet prefixes by taking help of IGP convergence.

BGP PIC uses hierarchical data plane in contrast to flat FIB (Forwarding table) design which is used by Cisco CEF and many legacy platforms.

In a hierarchical dataplane , the FIB used by the packet processing engine reflects recursions between the routes.

I will explain the recursion concept throughout the post so don’t worry about the above sentence, it will make sense.

There are two implementation of BGP PIC concept and they can protect the network traffic from multiple failures.

Link, node in the core or edge of the network can be recovered under a second and most of the case under 100ms ( It mostly depends on IGP convergence, so IGP should be tuned or IGP FRR can be used ).

In this article I will not explained IGP fast convergence or IGP Fast reroute but you can read my Fast reroute mechanism article from here.

BGP PIC can be thought as BGP Fast Reroute Mechanism which relies on IGP convergence for the failure detection. ( All overlay Continue reading

Working together to build a bigger, stronger Internet

[Published on behalf of the Internet Society Board of Trustees.]

The Internet Society’s vision is that the Internet is for everyone. Earlier this month, we wrote about our efforts to ensure a stable and diverse funding model to support the work that takes us towards our vision. The role of the Board of Trustees is to provide, with support from the community, the strategic direction for that work. In this post, we discuss our recent and current strategic efforts, put them into context, and provide pointers with more information for our community to get involved in defining our wanted future.

Naturally, the starting point of our current strategy was to agree with the community on the overall direction. Therefore, two years ago, during 2017, the Board consulted with our community to revise our mission statement into what we have today. Many of you contributed to that 2017 effort, which resulted in the following three focus areas:

  • Building and supporting the communities that make the Internet work;
  • Advancing the development and application of Internet infrastructure, technologies, and open standards; and
  • Advocating for policy that is consistent with our view of the Internet

Based on that community agreement on the development of this new mission, the Continue reading

Automation Solution: Data Center Fabric with Tenant Connectivity

I always tell attendees in the Building Network Automation Solutions to create minimalistic data models with (preferably) no redundant information. Not surprisingly, that’s a really hard task (see this article for an example) - using a simple automation tool like Ansible you end with either a messy and redundant data model or Jinja2 templates (or Ansible playbooks) full of hard-to-understand and impossible-to-maintain business logic.

Read more ...

Google Cloud Beefs Up Security With Palo Alto Networks, Fortinet

Palo Alto Networks and Google Cloud pledged to jointly develop a new multi-cloud security framework...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Larry Ellison: Oracle Will Not Replace Hurd

Former co-CEO Mark Hurd passed away in October. Safra Catz will take on sole leadership at...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.