Network-as-a-Service Part 2 – Designing a Network API

In the previous post, we’ve examined the foundation of the Network-as-a-Service platform. A couple of services were used to build the configuration from data models and templates and push it to network devices using Nornir and Napalm. In this post, we’ll focus on the user-facing part of the platform. I’ll show how to expose a part of the device data model via a custom API built on top of Kubernetes and how to tie it together with the rest of the platform components.

Interacting with a Kubernetes API

There are two main ways to interact with a Kubernetes API: one using a client library, which is how NaaS services communicate with K8s internally, the other way is with a command line tool called kubectl, which is intended to be used by humans. In either case, each API request is expected to contain at least the following fields:

  • apiVersion - all API resources are grouped and versioned to allow multiple versions of the same kind to co-exist at the same time.
  • kind - defines the type of object to be created.
  • metadata - collection of request attributes like name, namespaces, labels etc.
  • spec - the actual payload Continue reading

Tech Bytes: Network Automation In Multi-Vendor Environments With Anuta ATOM (Sponsored)

On today's Tech Bytes we talk with sponsor Anuta Networks about its ATOM network automation software. Guest Kiran Sirupa explains ATOM’s capabilities including low-code automation, network device configurations, compliance checks, telemetry collection, and more.

The post Tech Bytes: Network Automation In Multi-Vendor Environments With Anuta ATOM (Sponsored) appeared first on Packet Pushers.

Cisco issues critical security warnings on SD-WAN, DNA Center

Cisco has released two critical warnings about security issues with its SD-WAN and DNA Center software packages. The worse, with a Common Vulnerability Scoring System rating of 9.3 out of 10, is a vulnerability in its Digital Network Architecture (DNA) Center software that could let an unauthenticated attacker connect an unauthorized network device to the subnet designated for cluster services. More about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you’ll need it What are the options for security SD-WAN? A successful exploit could let an attacker reach internal services that are not hardened for external access, Cisco stated.  The vulnerability is due to insufficient access restriction on ports necessary for system operation, and the company discovered the issue during internal security testing, Cisco stated.To read this article in full, please click here

Cisco issues critical security warnings on SD-WAN, DNA Center

Cisco has released two critical warnings about security issues with its SD-WAN and DNA Center software packages. The worse, with a Common Vulnerability Scoring System rating of 9.3 out of 10, is a vulnerability in its Digital Network Architecture (DNA) Center software that could let an unauthenticated attacker connect an unauthorized network device to the subnet designated for cluster services. More about SD-WAN How to buy SD-WAN technology: Key questions to consider when selecting a supplier How to pick an off-site data-backup method SD-Branch: What it is and why you’ll need it What are the options for security SD-WAN? A successful exploit could let an attacker reach internal services that are not hardened for external access, Cisco stated.  The vulnerability is due to insufficient access restriction on ports necessary for system operation, and the company discovered the issue during internal security testing, Cisco stated.To read this article in full, please click here

Applications for 2019 Chapterthon Now Open

We’re happy to announce that the call for applications for the 2019 Chapterthon is now open.

Our world is more digitally connected than ever before, yet barriers still remain for the half of the world’s population who are unconnected.

For 2019, Chapterthon projects will help with Connecting the Unconnected. The Internet for everyone, including every last person on the planet, and we won’t rest until each person has the option of choosing to be connected.

Want to take part in this challenge?

We are looking for creative, innovative, and impactful short-term projects from our Chapters and Special Interest Groups (SIGs) that are for the community, with the community, by the community.

Find out how to apply at: https://www.internetsociety.org/grants/chapterthon/2019/

Only one project will be selected per Chapter to participate in this contest. The selected projects then participate in the global Chapterthon contest. The three winning projects will receive an award!

To guide you through this process, we’ve organised an info session on 27 June 2019 at 11:00 UTC.You can register in advance at:
https://isoc.zoom.us/meeting/register/5b0fba421a1ce3737510d14dfea9e911

All other information about the Chapterthon is available here:https://www.internetsociety.org/grants/chapterthon/2019/

Take part  and help us connect the world one community Continue reading

Validation vibes: How we’ve won the praise of customers and employees alike

The success of a company is often defined by two key factors: how your customers feel about you and how your employees feel about you. We’re excited to share that recently we’ve had some great validation by both!

Customer validation

We’re very honored to work with a variety of innovative companies that are breaking the status quo with open networking principles in data centers designed to scale. All of our customers have realized the need for an open, modern data center and are looking to build infrastructure with purpose. From web-scale giants to visionary enterprises, we give them all the ability to build something “EPIC.”

This was recently highlighted when for the second year in a row, our customers have rallied around our vision for the future of data center networking and recognized us as “The Best Data Center Networking 2019” with their reviews through Gartner Peer Insights.

As Gartner puts it, “The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account both the number of reviews and the overall user ratings.” To ensure fair evaluation, Gartner maintains rigorous criteria for recognizing vendors with Continue reading

With Tableau, SaaS king Salesforce becomes a hybrid cloud company

I remember a time when people at Salesforce events would hand out pins that read “Software” inside a red circle with a slash through it. The High Priest of SaaS (a.k.a. CEO Marc Benioff) was so adamant against installed, on-premises software that his keynotes were always comical.Now, Salesforce is prepared to spend $15.7 billion to acquire Tableau Software, the leader in on-premises data analytics.On the hell-freezes-over scale, this is up there with Microsoft embracing Linux or Apple PR people returning a phone call. Well, we know at least one of those has happened.To read this article in full, please click here

History Of ATM (Part 2) – Daniel Grossman

In this episode we talk with Daniel Grossman about his role in the development of Asynchronous Transfer Mode, or ATM. This is part 2 of a 2 part series. If you haven’t listened to the first episode, you can find it here.

Daniel Grossman
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of ATM (Part 2) – Daniel Grossman appeared first on Network Collective.

2019 Hackathon@AIS: Testimonials from the Trainers

What is Hackathon@AIS?

The Internet, with its endless supply of knowledge and information, has become a strategic element in nearly all economic endeavors in Africa. To build tactical awareness among primary stakeholders as well as resiliency and robustness into Internet-enabled grids, the Internet Society and AFRINIC have organized the third Hackathon@AIS event, which is taking place in Kampala, Uganda, from 19-20 June 2019.

Network engineers, software developers, and computer science students from across Africa are gearing up for another round of collaborative computer programming aimed at introducing participants to existing and evolving Internet standards development that can help further their careers through shared skillsets.

The first Hackathon@AIS was held in 2017 in Nairobi and attracted 39 participants from 12 countries. The second event, held in 2018 in Dakar, attracted 75 participants from 15 countries. Both events consisted of three different tracks led by expert facilitators from across the globe. This year, the event consists of five tracks spanning different fields, and again we’ve called on expert facilitators from around the world to share their expertise and guidance.

The Hackathon is a breeding ground for talent that can change the world through innovation and create productivity and efficiency in business. Continue reading

HPE To Sell Every Product As A Service By 2022

The public cloud has given enterprises a taste of infrastructure that is highly agile and scalable, that is deployed and managed by someone else and that can be paid for based on the resources use, and now they increasingly are looking for tech vendors to give them a similar experience with their on-premises and hybrid cloud environments.

HPE To Sell Every Product As A Service By 2022 was written by Jeffrey Burt at .

Cloudflare’s Ethereum Gateway

Cloudflare's Ethereum Gateway
Cloudflare's Ethereum Gateway

Today, as part of Crypto Week 2019, we are excited to announce Cloudflare's Ethereum Gateway, where you can interact with the Ethereum network without installing any additional software on your computer.

This is another tool in Cloudflare’s Distributed Web Gateway tool set. Currently, Cloudflare lets you host content on the InterPlanetary File System (IPFS) and access it through your own custom domain. Similarly, the new Ethereum Gateway allows access to the Ethereum network, which you can provision through your custom hostname.

This setup makes it possible to add interactive elements to sites powered by Ethereum smart contracts, a decentralized computing platform. And, in conjunction with the IPFS gateway, this allows hosting websites and resources in a decentralized manner, and has the extra bonus of the added speed, security, and reliability provided by the Cloudflare edge network. You can access our Ethereum gateway directly at https://cloudflare-eth.com.

This brief primer on how Ethereum and smart contracts work has examples of the many possibilities of using the Cloudflare Distributed Web Gateway.

Primer on Ethereum

You may have heard of Ethereum as a cryptocurrency. What you may not know is that Ethereum is so much more. Ethereum is a distributed virtual Continue reading