AnsibleFest Atlanta – Infrastructure Automation

Blog_AnsibleFest2019-Infrastructure-Automation-Track

 

AnsibleFest is only a few short weeks away and we are excited to share with you all the great content and sessions we have lined up! On the Ansible blog, we have been taking a closer look at each of the breakout session tracks so that attendees can better personalize their AnsibleFest experience. We sat down with Track Lead Dylan Silva to find out more about the Infrastructure Automation Track and sessions within the track.  

 

Who is this track best for? 

This track is best for sysadmins that are looking for information related to general infrastructure automation with Ansible.

 

What topics will this track cover? 

Sessions in this track will cover bare-metal, server administration, and inventory management, among other related topics. There will be a session covering the automation of VMware infrastructure using REST APIs, how to use Ansible against your vSphere environment, how to use Ansible to pull approved firewall change requests from our change management system, and much more. 

 

What should attendees expect to learn from this track? 

Attendees should expect to learn best practices related to infrastructure management. This includes scaling Ansible for loT deployments, taking a closer Continue reading

SDxCentral’s Top 10 Articles — August 2019

HCX, VMware’s Top-Secret Sauce, Comes Out; VMware Buys Veriflow for Network Monitoring,...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Lanner Joins Forces With Hot OCP Ecosystem

Networking manufacture Lanner, well known for its uCPE and white box appliances, is the latest...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Huawei Accuses US of Cyberattacks, ‘Menacing’ Its Employees

Huawei accused the U.S. government of using cyberattacks and “every tool at its disposal” to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T Asks to Play With Its mmWave 5G Spectrum

The carrier has asked the FCC for early access to the 24 GHz spectrum it won during a recent...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Top Redis Use Cases by Core Data Structure Types

Top Redis Use Cases by Core Data Structure Types - ScaleGrid Blog

Redis, short for Remote Dictionary Server, is a BSD-licensed, open-source in-memory key-value data structure store written in C language by Salvatore Sanfillipo and was first released on May 10, 2009. Depending on how it is configured, Redis can act like a database, a cache or a message broker. It’s important to note that Redis is a NoSQL database system. This implies that unlike SQL (Structured Query Language) driven database systems like MySQL, PostgreSQL, and Oracle, Redis does not store data in well-defined database schemas which constitute tables, rows, and columns. Instead, Redis stores data in data structures which makes it very flexible to use. In this blog, we outline the top Redis use cases by the different core data structure types.

Data Structures in Redis

Sponsored Post: Educative, PA File Sight, Etleap, PerfOps, InMemory.Net, Triplebyte, Stream, Scalyr

Who's Hiring? 

  • Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O(1), not O(n). Apply here.

  • Need excellent people? Advertise your job here! 

Cool Products and Services

  • Grokking the System Design Interview is a popular course on Educative.io (taken by 20,000+ people) that's widely considered the best System Design interview resource on the Internet. It goes deep into real-world examples, offering detailed explanations and useful pointers on how to improve your approach. There's also a no questions asked 30-day return policy. Try a free preview today.

  • PA File Sight - Actively protect servers from ransomware, audit file access to see who is deleting files, reading files or moving files, and detect file copy activity from the server. Historical audit reports and real-time alerts are built-in. Try the 30-day free trial!

  • For heads of IT/Engineering responsible for building an analytics infrastructure, Etleap is an ETL solution for creating perfect data pipelines from day one. Unlike older enterprise solutions, Etleap doesn’t require extensive engineering work to set up, maintain, and scale. It automates most ETL setup and Continue reading

2019 Chapterthon – Our Chapters, Connecting the World One Community at a Time

Each year, the Chapterthon project competition brings enthusiasm and excitement among our global community. We look forward to this time of year, when our communities mobilize and work alongside each other to achieve a common goal for the development of the Internet.

For the 2019 Chapterthon, we are delighted to announce that 34 Chapters and Special Interest Groups (SIGs) from across the globe have started implementing their work on local solutions that will bring some of the hardest-to-reach places and community segments online—connecting the unconnected.

Over the next two months, these 34 projects will:

  • connect underprivileged and rural areas in Armenia, Bangladesh, Benin, Mali, and South Africa;
  • build a community network in Kenya;
  • establish online databases for rural farmers in Burkina Faso and Saint Vincent and the Grenadines;
  • create an online audio library for people living with disabilities in northern rural Argentina;
  • revolutionize a mobile network unit in Madagascar for use in the event of a natural disaster;
  • educate and empower over fifty rural women on how to use the Internet during a friendly game of “Tag”;
  • build an FM broadcast system in rural Ghana; preserve Indigenous culture in rural Brazil;
  • sweat it out at a bootcamp in Continue reading

Tech Bytes: Applying Cloud Principles To Networking With Big Switch Networks (Sponsored)

Today's sponsored Tech Bytes explores how Big Switch Networks applies cloud design principles to data center and cloud networks. Network engineers can provide a developer-friendly environment while still enforcing policy, enabling security controls, and getting visibility into the network. Our guest is Big Switch CTO Paul Unbehagen.

The post Tech Bytes: Applying Cloud Principles To Networking With Big Switch Networks (Sponsored) appeared first on Packet Pushers.

Forwarding using sFlow-RT

The diagrams show different two different configurations for sFlow monitoring:
  1. Without Forwarding Each sFlow agent is configured to stream sFlow telemetry to each of the analysis applications. This configuration is appropriate when a small number of applications is being used to continuously monitor performance. However, the overhead on the network and agents increases as additional analyzers are added. Often it is not possible to increase the number of analyzers since many embedded sFlow agents have limited resources and only support a small number of sFlow streams. In addition, the complexity of configuring each agent to add or remove an analysis application can be significant since agents may reside in Ethernet switches, routers, servers, hypervisors and applications on many different platforms from a variety of vendors.
  2. With Forwarding In this case all the agents are configured to send sFlow to a forwarding module which resends the data to the analysis applications. In this case analyzers can be added and removed simply by reconfiguring the forwarder without any changes required to the agent configurations.
There are many variations between these two extremes. Typically there will be one or two analyzers used for continuous monitoring and additional tools, like Wireshark, might be deployed Continue reading

Network Break 250: VMware Embraces Kubernetes; Dell Partners With VMware On Datacenters, SD-WAN

It's a heaping helping of Network Break as we try to parse all the Kubernetes pronouncements coming out of VMworld 2019, including Project Pacific and Tanzu Mission Control. Plus we cover new tech and new partnerships between Dell EMC and VMware, new products from Apstra and Mellanox, and HPE's latest financials.

The post Network Break 250: VMware Embraces Kubernetes; Dell Partners With VMware On Datacenters, SD-WAN appeared first on Packet Pushers.

BrandPost: IT Leaders Need to Get Aggressive with SD-WAN

Late last year I moderated a MicroScope roundtable in the UK on the challenges and opportunities of SD-WAN. The representatives included 12 leading SD-WAN vendors, including Michael O’Brien, vice president of worldwide channel sales for Silver Peak. I started off the discussion by introducing a data point from a TechTarget survey (TechTarget owns MicroScope) that only 26 percent of companies surveyed had an SD-WAN deployment underway. This spans any stage of the deployment cycle, including testing. Given the hype around SD-WAN and how many conversations I have with IT leaders about it, this number seemed low to me, so I wanted to get a better feel for what the leading vendors thought about it. To read this article in full, please click here

If You Have to Simulate Your Whole Network, You’re Doing It Wrong

This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.

Have you ever seen a presentation in which a startup is telling you how awesome their product is because it allows you to simulate your whole network in a virtual environment? Not only that, you can use that capability to build a test suite and a full-blown CI/CD pipeline and test whether your network works every time you make a change to any one box in the network.

Sounds awesome, right? It’s also dead wrong. Let me explain why that’s the case.

Read more ...

Using predictive analytics to troubleshoot network issues: Fact or fiction?

Predicting the future is getting easier. While it's still not possible to accurately forecast tomorrow's winning lottery number, the ability to anticipate various types of damaging network issues — and nip them in the bud — is now available to any network manager.Predictive analytic tools draw their power from a variety of different technologies and methodologies, including big data, data mining and statistical modeling. A predictive analytics tool can be trained, for instance, to use pattern recognition — the automated recognition of patterns and regularities in data — to identify issues before they become significant problems or result in partial or total network failures.To read this article in full, please click here

The TOGAF ADM – Part II

 Continuing right off from my last post, we going to continue our run-though of the ADM wrapping the last few phases. Phase E: opportunities & Solution: Now, it’s time for us to review the outputs from our previous phases and to start defining the beginning of our implementation details. We do this in the form of creating the […]

VMworld 2019 Vendor Meeting: Lightbits Labs

Last week at VMworld, I had the opportunity to meet with Lightbits Labs, a relatively new startup working on what they called “disaggregated storage.” As it turns out, their product is actually quite interesting, and has relevance not only in “traditional” VMware vSphere environments but also in environments more focused on cloud-native technologies like Kubernetes.

So what is “disaggregated storage”? It’s one of the first questions I asked the Lightbits team. The basic premise behind Lightbits’ solution is that by taking the storage out of nodes—by decoupling storage from compute and memory—they can provide more efficient scaling. Frankly, it’s the same basic premise behind storage area network (SANs), although I think Lightbits wants to distance themselves from that terminology.

Instead of Fibre Channel, Fibre Channel over Ethernet (FCoE), or iSCSI, Lightbits uses NVMe over TCP. This provides good performance over 25, 50, or 100Gbps links with low latency (typically less than 300 microseconds). Disks appear “local” to the node, which allows for some interesting concepts when used in conjunction with hyperconverged platforms (more on that in a moment).

Lightbits has their own operating system, LightOS, which runs on industry-standard x64 servers from Dell, HP, Lenovo, etc. To Continue reading