Red Hat Balances Istio, Knative Challenges in OpenShift Update

Recent reports have noted that Google, which has been a key contributor to both platforms, was not...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Internet2 Research Network Taps Ciena 800G Platform

Ciena says its 800G-capable optics will increase Internet2's capacity and reduce operational costs...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Google Fuses Security Analytics in Cloud Wars Quest

The new security tool follows a slew of product upgrades and acquisitions as Google tries to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

The Fallacy of Telco Cloud

The Telco Cloud is characterized as the existing core data centers transitioning to be more...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Huawei Smashes Q3 Predictions Despite US Campaign

Huawei’s business continues to grow despite a sustained campaign by the U.S. government and some...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Using Kustomize with Kubeadm Configuration Files

Last week I had a crazy idea: if kustomize can be used to modify YAML files like Kubernetes manifests, then could one use kustomize to modify a kubeadm configuration file, which is also a YAML manifest? So I asked about it in one of the Kubernetes-related channels in Slack at work, and as it turns out it’s not such a crazy idea after all! So, in this post, I’ll show you how to use kustomize to modify kubeadm configuration files.

If you aren’t already familiar with kustomize, I recommend having a look at this blog post, which provides an overview of this tool. For the base kubeadm configuration files to modify, I’ll use kubeadm configuration files from this post on setting up a Kubernetes 1.15 cluster with the AWS cloud provider.

While the blog post linked above provides an overview of kustomize, it certainly doesn’t cover all the functionality kustomize provides. In this particular use case—modifying kubeadm configuration files—the functionality described in the linked blog post doesn’t get you where you need to go. Instead, you’ll have to use the patching functionality of kustomize, which allows you to overwrite specific fields within the YAML definition Continue reading

Using Kustomize with Kubeadm Configuration Files

Last week I had a crazy idea: if kustomize can be used to modify YAML files like Kubernetes manifests, then could one use kustomize to modify a kubeadm configuration file, which is also a YAML manifest? So I asked about it in one of the Kubernetes-related channels in Slack at work, and as it turns out it’s not such a crazy idea after all! So, in this post, I’ll show you how to use kustomize to modify kubeadm configuration files.

If you aren’t already familiar with kustomize, I recommend having a look at this blog post, which provides an overview of this tool. For the base kubeadm configuration files to modify, I’ll use kubeadm configuration files from this post on setting up a Kubernetes 1.15 cluster with the AWS cloud provider.

While the blog post linked above provides an overview of kustomize, it certainly doesn’t cover all the functionality kustomize provides. In this particular use case—modifying kubeadm configuration files—the functionality described in the linked blog post doesn’t get you where you need to go. Instead, you’ll have to use the patching functionality of kustomize, which allows you to overwrite specific fields within the YAML definition Continue reading

Meet Three APrIGF 2019 Fellows

The Internet Society, APNIC, and Coordination Center for TLD .RU sponsored 20 fellows to the 10th Asia Pacific Regional Internet Governance Forum (APrIGF 2019) held in Vladivostok, Russia in July. Let’s meet three fellows from Bangladesh, Myanmar, and Singapore as they share their experience at APrIGF 2019, as well as their interests and future aspirations.

Shah Zahidur Rahman, Technology Business Consultant, Bangladesh

I completed my Bachelor’s degree in Computer Science and Engineering from the American International University-Bangladesh and have many technical course certifications. Currently, I am a technology business consultant for small- and medium-sized enterprises and startup companies. I have also been mentoring youths in the Youth4IG coalition to become further engaged in Internet Governance issues. I have been an active member of the Internet Society Bangladesh Chapter since 2014. I am also a member of the Bangladesh School of Internet Governance Programme Committee and Fellowship Committee, the Bangladesh Internet Governance Forum, and the ICANN Non-Commercial Stakeholder Group and Non-Commercial Users Constituency. Additionally, I am a former fellow of IETF, APSIG and APAN.

This year at APrIGF 2019, my main interest was in one of the six subthemes on Emerging Technologies and Society, and here are some of the key things I learned Continue reading

Train to be an in-demand DevOps pro for just $39

Tech companies are always looking for more ways to increase efficiency, and today, DevOps is the way they're doing it. For the uninitiated, DevOps is a series of practices that brings software development teams together with IT operations professionals so they may create products that are both reliable and efficient. If you want to work in software development, then knowing DevOps could make all the difference.To read this article in full, please click here

Visit the VMware Team at ONUG 2019 in NYC!

Come see VMware and the Networking and Security team at ONUG Fall 2019 in NYC, NY from October 16-17.

Why Attend ONUG 2019?

Join us in New York at ONUG Fall 2019 for an opportunity to meet the industry’s leading trailblazers and thought leaders, as they share their insights and ideas on Digital Transformation.

ONUG Fall 2019 is your chance to get access to the industry’s leading luminaries. We’ve assembled an amazing group of notable speakers from the Global 2000 and developed a jam-packed agenda, that includes:

  • Working Groups
  • Showcases
  • Proof Of Concept Sessions
  • Roundtable discussions

Topics Covered at ONUG 2019

The focus of ONUG Fall 2019 will be Building, Managing and Securing the Digital Enterprise, but we’ll be covering a range of topics that include:

  • Hybrid multi-cloud
  • A secure internet
  • Machine learning
  • Artificial intelligence
  • Automated and software-driven infrastructure
  • Software-Defined Wide Area Networking (SD-WAN) 2.0 and more

VMware Participation At ONUG Fall 2019

VMware is participating in multiple ways this week at the event. Many of the solutions from the networking and security team are represented, additionally our SVP + GM of Networking and Security Business Unit, Tom Gillis, hosted a security focused dinner last evening, and we Continue reading

Day Two Cloud 020: Design Tips For Cloud Networking Success

VPCs. Vnets. DirectConnect. Kubernetes. Calico. Public clouds. Hybrid clouds. Networking is no small feat when it comes to the cloud. How does an organization keep their cloud networks from turning into a flying spaghetti monster? Day Two Cloud tackles this critical question with guest Andrew Wertkin, Chief Strategy Officer at BlueCat Networks. We discuss design tips, the critical role of DNS, monitoring and troubleshooting options, and more.

Day Two Cloud 020: Design Tips For Cloud Networking Success

VPCs. Vnets. DirectConnect. Kubernetes. Calico. Public clouds. Hybrid clouds. Networking is no small feat when it comes to the cloud. How does an organization keep their cloud networks from turning into a flying spaghetti monster? Day Two Cloud tackles this critical question with guest Andrew Werkin, Chief Strategy Officer at BlueCat Networks. We discuss design tips, the critical role of DNS, monitoring and troubleshooting options, and more.

The post Day Two Cloud 020: Design Tips For Cloud Networking Success appeared first on Packet Pushers.

vSAN Stretched Cluster Using an NSX-T Backed L3 Network

VMware vSAN and NSX-T Compatibility 

There are lot of discussions that talk about VMware NSX and VMware vSAN, most of them around compatibility.

vSAN and NSX are compatible with each other, however, vSAN traffic is not supported on NSX overlay network. But, the way VDS Portgroups can be used to configure vSAN vmkernel adapters, NSX-T VLAN backed logical switches can also be used to configure vSAN vmkernel adapters. Apart from this, NSX-T logical routers can be used as gateways to route the vSAN traffic, of course the backing for such configuration must be with NSX-T VLAN logical switches.

In this blog post I cover how NSX-T can be used to setup configuration for vSAN stretched cluster.

Deep Dive of vSAN Stretched Cluster Using an NSX-T Backed L3 Network

One of the configurations for vSAN stretched cluster can be achieved with L3 networking between Data Nodes and the Witness Host. In such deployment, the Data Nodes and Witness Host may reside in different networks. Hence, the vSAN vmkernel adapters need to point to their gateways to talk to each other. Following is the high-level network view of such topology for vSAN stretched cluster where hosts use VDS Portgroups to configure the Continue reading

How inspiration from your data center can modernize your campus network.

Campus networks are undergoing a rapid evolution as they draw inspiration from their data center peers from both a technology and cost perspective. At the forefront of this evolution is open networking, led by innovation and cost efficiencies that apply equally across data center and campus networks.

Interestingly, Cumulus Linux was originally intended for data center networking, but without a doubt, we’re seeing the lines between data center and campus blurring with campus standing to benefit significantly, and it’s about time. It’s the data center that has historically benefited from innovation, especially in compute and storage. The data center network, however, seemed to lag for more than a decade until our founders set out in 2010 to develop a fundamentally different approach to the data center with Cumulus Networks.

Cumulus Networks introduced an open, modern and innovative network operating system called Cumulus Linux. Cumulus Linux was originally designed to emulate the network architecture of the web-scale giants including Google, Amazon, Apple, Microsoft and Facebook allowing you to automate, customize and scale your data center network like no other, and for the first time, bringing this capability to the masses.

Cumulus Networks is building the modern data center network for applications Continue reading

How Did We End with 1500-byte MTU?

A subscriber sent me this intriguing question:

Is it not theoretically possible for Ethernet frames to be 64k long if ASIC vendors simply bothered or decided to design/make chipsets that supported it? How did we end up in the 1.5k neighborhood? In whose best interest did this happen?

Remember that Ethernet started as a shared-cable 10 Mbps technology. Transmitting a 64k frame on that technology would take approximately 50 msec (or as long as getting from East Coast to West Coast). Also, Ethernet had no tight media access control like Token Ring, so it would be possible for a single host to transmit multiple frames without anyone else getting airtime, resulting in unacceptable delays.

Read more ...

“I was told to buy a software or lose my computer: I ignored it.” A study of ransomware

“I was told to buy a software or lose my computer. I ignored it”: a study of ransomware Simoiu et al., SOUPS 2019

This is a very easy to digest paper shedding light on the prevalence of ransomware and the characteristics of those most likely to be vulnerable to it. The data comes from a survey of 1,180 US adults conducted by YouGov, an online global market research firm. YouGov works hard to ensure respondent participation representative of (in this case) the general population in the U.S., but the normal caveats apply.

We define ransomware as the class of malware that attempts to defraud users by restricting access to the user’s computer or data, typically by locking the computer or encrypting data. There are thousands of different ransomware strains in existence today, varying in design and sophistication.

The survey takes just under 10 minutes to complete, and goes to some lengths to ensure that self-reporting victims really were victims of ransomware (and not some other computer problem).

For respondents that indicated they had suffered from a ransomware attack, data was collected on month and year, the name of the ransomware variant, the ransom demanded, the payment method, Continue reading