Huawei Accuses US of Cyberattacks, ‘Menacing’ Its Employees

Huawei accused the U.S. government of using cyberattacks and “every tool at its disposal” to...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

AT&T Asks to Play With Its mmWave 5G Spectrum

The carrier has asked the FCC for early access to the 24 GHz spectrum it won during a recent...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Top Redis Use Cases by Core Data Structure Types

Top Redis Use Cases by Core Data Structure Types - ScaleGrid Blog

Redis, short for Remote Dictionary Server, is a BSD-licensed, open-source in-memory key-value data structure store written in C language by Salvatore Sanfillipo and was first released on May 10, 2009. Depending on how it is configured, Redis can act like a database, a cache or a message broker. It’s important to note that Redis is a NoSQL database system. This implies that unlike SQL (Structured Query Language) driven database systems like MySQL, PostgreSQL, and Oracle, Redis does not store data in well-defined database schemas which constitute tables, rows, and columns. Instead, Redis stores data in data structures which makes it very flexible to use. In this blog, we outline the top Redis use cases by the different core data structure types.

Data Structures in Redis

Sponsored Post: Educative, PA File Sight, Etleap, PerfOps, InMemory.Net, Triplebyte, Stream, Scalyr

Who's Hiring? 

  • Triplebyte lets exceptional software engineers skip screening steps at hundreds of top tech companies like Apple, Dropbox, Mixpanel, and Instacart. Make your job search O(1), not O(n). Apply here.

  • Need excellent people? Advertise your job here! 

Cool Products and Services

  • Grokking the System Design Interview is a popular course on Educative.io (taken by 20,000+ people) that's widely considered the best System Design interview resource on the Internet. It goes deep into real-world examples, offering detailed explanations and useful pointers on how to improve your approach. There's also a no questions asked 30-day return policy. Try a free preview today.

  • PA File Sight - Actively protect servers from ransomware, audit file access to see who is deleting files, reading files or moving files, and detect file copy activity from the server. Historical audit reports and real-time alerts are built-in. Try the 30-day free trial!

  • For heads of IT/Engineering responsible for building an analytics infrastructure, Etleap is an ETL solution for creating perfect data pipelines from day one. Unlike older enterprise solutions, Etleap doesn’t require extensive engineering work to set up, maintain, and scale. It automates most ETL setup and Continue reading

2019 Chapterthon – Our Chapters, Connecting the World One Community at a Time

Each year, the Chapterthon project competition brings enthusiasm and excitement among our global community. We look forward to this time of year, when our communities mobilize and work alongside each other to achieve a common goal for the development of the Internet.

For the 2019 Chapterthon, we are delighted to announce that 34 Chapters and Special Interest Groups (SIGs) from across the globe have started implementing their work on local solutions that will bring some of the hardest-to-reach places and community segments online—connecting the unconnected.

Over the next two months, these 34 projects will:

  • connect underprivileged and rural areas in Armenia, Bangladesh, Benin, Mali, and South Africa;
  • build a community network in Kenya;
  • establish online databases for rural farmers in Burkina Faso and Saint Vincent and the Grenadines;
  • create an online audio library for people living with disabilities in northern rural Argentina;
  • revolutionize a mobile network unit in Madagascar for use in the event of a natural disaster;
  • educate and empower over fifty rural women on how to use the Internet during a friendly game of “Tag”;
  • build an FM broadcast system in rural Ghana; preserve Indigenous culture in rural Brazil;
  • sweat it out at a bootcamp in Continue reading

Tech Bytes: Applying Cloud Principles To Networking With Big Switch Networks (Sponsored)

Today's sponsored Tech Bytes explores how Big Switch Networks applies cloud design principles to data center and cloud networks. Network engineers can provide a developer-friendly environment while still enforcing policy, enabling security controls, and getting visibility into the network. Our guest is Big Switch CTO Paul Unbehagen.

The post Tech Bytes: Applying Cloud Principles To Networking With Big Switch Networks (Sponsored) appeared first on Packet Pushers.

Forwarding using sFlow-RT

The diagrams show different two different configurations for sFlow monitoring:
  1. Without Forwarding Each sFlow agent is configured to stream sFlow telemetry to each of the analysis applications. This configuration is appropriate when a small number of applications is being used to continuously monitor performance. However, the overhead on the network and agents increases as additional analyzers are added. Often it is not possible to increase the number of analyzers since many embedded sFlow agents have limited resources and only support a small number of sFlow streams. In addition, the complexity of configuring each agent to add or remove an analysis application can be significant since agents may reside in Ethernet switches, routers, servers, hypervisors and applications on many different platforms from a variety of vendors.
  2. With Forwarding In this case all the agents are configured to send sFlow to a forwarding module which resends the data to the analysis applications. In this case analyzers can be added and removed simply by reconfiguring the forwarder without any changes required to the agent configurations.
There are many variations between these two extremes. Typically there will be one or two analyzers used for continuous monitoring and additional tools, like Wireshark, might be deployed Continue reading

Network Break 250: VMware Embraces Kubernetes; Dell Partners With VMware On Datacenters, SD-WAN

It's a heaping helping of Network Break as we try to parse all the Kubernetes pronouncements coming out of VMworld 2019, including Project Pacific and Tanzu Mission Control. Plus we cover new tech and new partnerships between Dell EMC and VMware, new products from Apstra and Mellanox, and HPE's latest financials.

The post Network Break 250: VMware Embraces Kubernetes; Dell Partners With VMware On Datacenters, SD-WAN appeared first on Packet Pushers.

BrandPost: IT Leaders Need to Get Aggressive with SD-WAN

Late last year I moderated a MicroScope roundtable in the UK on the challenges and opportunities of SD-WAN. The representatives included 12 leading SD-WAN vendors, including Michael O’Brien, vice president of worldwide channel sales for Silver Peak. I started off the discussion by introducing a data point from a TechTarget survey (TechTarget owns MicroScope) that only 26 percent of companies surveyed had an SD-WAN deployment underway. This spans any stage of the deployment cycle, including testing. Given the hype around SD-WAN and how many conversations I have with IT leaders about it, this number seemed low to me, so I wanted to get a better feel for what the leading vendors thought about it. To read this article in full, please click here

If You Have to Simulate Your Whole Network, You’re Doing It Wrong

This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.

Have you ever seen a presentation in which a startup is telling you how awesome their product is because it allows you to simulate your whole network in a virtual environment? Not only that, you can use that capability to build a test suite and a full-blown CI/CD pipeline and test whether your network works every time you make a change to any one box in the network.

Sounds awesome, right? It’s also dead wrong. Let me explain why that’s the case.

Read more ...

Using predictive analytics to troubleshoot network issues: Fact or fiction?

Predicting the future is getting easier. While it's still not possible to accurately forecast tomorrow's winning lottery number, the ability to anticipate various types of damaging network issues — and nip them in the bud — is now available to any network manager.Predictive analytic tools draw their power from a variety of different technologies and methodologies, including big data, data mining and statistical modeling. A predictive analytics tool can be trained, for instance, to use pattern recognition — the automated recognition of patterns and regularities in data — to identify issues before they become significant problems or result in partial or total network failures.To read this article in full, please click here

The TOGAF ADM – Part II

 Continuing right off from my last post, we going to continue our run-though of the ADM wrapping the last few phases. Phase E: opportunities & Solution: Now, it’s time for us to review the outputs from our previous phases and to start defining the beginning of our implementation details. We do this in the form of creating the […]

VMworld 2019 Vendor Meeting: Lightbits Labs

Last week at VMworld, I had the opportunity to meet with Lightbits Labs, a relatively new startup working on what they called “disaggregated storage.” As it turns out, their product is actually quite interesting, and has relevance not only in “traditional” VMware vSphere environments but also in environments more focused on cloud-native technologies like Kubernetes.

So what is “disaggregated storage”? It’s one of the first questions I asked the Lightbits team. The basic premise behind Lightbits’ solution is that by taking the storage out of nodes—by decoupling storage from compute and memory—they can provide more efficient scaling. Frankly, it’s the same basic premise behind storage area network (SANs), although I think Lightbits wants to distance themselves from that terminology.

Instead of Fibre Channel, Fibre Channel over Ethernet (FCoE), or iSCSI, Lightbits uses NVMe over TCP. This provides good performance over 25, 50, or 100Gbps links with low latency (typically less than 300 microseconds). Disks appear “local” to the node, which allows for some interesting concepts when used in conjunction with hyperconverged platforms (more on that in a moment).

Lightbits has their own operating system, LightOS, which runs on industry-standard x64 servers from Dell, HP, Lenovo, etc. To Continue reading

Just Published: NSX-T Technical Deep Dive Slide Deck

Last year when I was creating the first version of VMware NSX Deep Dive content, NSX-V was mainstream and NSX-T was the new kid on the block. A year later NSX-V is mostly sidelined, and all the development efforts are going into NSX-T. Time to adapt the webinar to new reality… taking the usual staged approach:

IPA: invariant-preserving applications for weakly consistent replicated databases

IPA: invariant-preserving applications for weakly consistent replicated databases Balegas et al., VLDB’19

IPA for developers, happy days!

Last we week looked at automating checks for invariant confluence, and extending the set of cases where we can show that an object is indeed invariant confluent. I’m not going to re-cover that background in this write-up, so I suggest you head over there for a quick catch-up before reading on if you missed it first time around.

Today’s paper is very much in same spirit, building on the same foundation of invariant confluence (I-Confluence), and also on Indigo which introduced an annotation model for application invariants, a invariant violation avoidance mechanism using lock reservations and escrows, and limited support for repairing violations that do happen.

With Invariant-Preserving Applications (IPAs), Balegas et al. introduce new mechanisms for avoiding invariant violations and for repairing them when detected, based on CRDTs. There’s also a very nice looking developer workflow to help ensure you’ve got all the bases covered. At the end of the day, you get the dual benefit of higher throughput and lower latency (as compared to coordination-based approaches) coupled with knowing that there isn’t some nasty invariant-violating concurrency bug waiting Continue reading

Cumulus content roundup: Summer 2019

Summer has flown by and you may have missed some of the great content that was published. Don’t worry, you can catch up on some of our favorite podcasts, blog posts, and articles below. So settle in and then dive into all things open networking!

From Cumulus Networks:

Customizing your network: Take a quick look at the types of automation available in Linux, from basic to dynamic, and how these automation capabilities help to enable data center-wide orchestration here.

Kernel of Truth podcast: Network monitoring: When it comes to network monitoring, have you run into a “switch that cried wolf?”Kernel of Truth host Brian O’Sullivan is joined by two new guests to the podcast Justin Betz & Faye Ly to chat more about networking monitoring here.

Best practices: MLAG backup IP: We cover the best ways to build a redundant backup IP link for multi-chassis link aggregation (MLAG).

Exploring Batfish with Cumulus – part one: With Batfish supporting Cumulus Networks this year, we show how it can fit into pipelines & replace or complement existing testing strategies in part one of a two-part series.

Kernel of Truth podcast: Innovation in the data center: Spiderman aka Rama Continue reading

ClearOS Installation on QEMU

ClearOS is an operating system based on CentOS for use in small and medium enterprises as a network gateway and network server with a web-based administration interface.

ClearOS in Gateway mode acts as a firewall, gateway and server on a local network. The tutorial provides installation and configuration steps for deployement of ClearOS on QEMU VM. We will later connect ClearOS QEMU VM into GNS3 network topology in order to test  features such as application traffic filtering and transparent proxy with user authentication.

Software Used:
Host OS: Kubuntu Linux 18.04.1 LTS with Qemu 3.0.0 installed and kvm-intel module loaded
Guest OS: ClearOS 7.5.0 x86_64

1. Preparing Host Network Infrastructure

As we are going to  install ClearOS guest QEMU VM in a gateway mode,  your host should have two network adapters available. (Picture 1). In our case, the first ClearOS guest network interface ens3 will be defined as LAN type during ClearOS installation. The second guest interface ens4 will be defined as External and used for connection to SOHO network. We will bridge the interface ens4 with the host interface enp4s0f2 using iproute utility. But first, we need to create tap interfaces tap0 and Continue reading