Working with variables on Linux

A lot of important values are stored on Linux systems in what we call “variables,” but there are actually several types of variables and some interesting commands that can help you work with them. In a previous post, we looked at environment variables and where they are defined. In this post, we're going to look at variables that are used on the command line and within scripts.User variables While it's quite easy to set up a variable on the command line, there are a few interesting tricks. To set up a variable, all you need to do is something like this:To read this article in full, please click here

BrandPost: AI Ops: Let the data talk

Marie Fiala, Director of Portfolio Marketing for Blue Planet at Ciena The catalysts and ROI of AI-powered network analytics for automated operations were the focus of discussion for service providers at the recent FutureNet conference in London. Blue Planet’s Marie Fiala details the conversation.Do we need perfect data? Or is ‘good enough’ data good enough? Certainly, there is a need to find a pragmatic approach or else one could get stalled in analysis-paralysis. Is closed-loop automation the end goal? Or is human-guided open loop automation desired? If the quality of data defines the quality of the process, then for closed-loop automation of critical business processes, one needs near-perfect data. Is that achievable?To read this article in full, please click here

The Microsoft/BMW IoT Open Manufacturing Platform might not be so open

Last week at Hannover Messe, Microsoft and German carmaker BMW announced a partnership to build a hardware and software technology framework and reference architecture for the industrial internet of things (IoT), and foster a community to spread these smart-factory solutions across the automotive and manufacturing industries.The stated goal of the Open Manufacturing Platform (OMP)? According to the press release, it's “to drive open industrial IoT development and help grow a community to build future Industry 4.0 solutions.” To make that a reality, the companies said that by the end of 2019, they plan to attract four to six partners — including manufacturers and suppliers from both inside and outside the automotive industry — and to have rolled out at least 15 use cases operating in actual production environments.To read this article in full, please click here

Guest Introspection Re-introduction for NSX-T 2.4

(Re-)Introduction to Guest Introspection

The Guest Introspection platform has been included in NSX Data Center for vSphere for several years, mostly as a replacement for the VMware vShield Endpoint product and providing customers the ability to plug in their VMware certified partner solutions to allow agent-less anti-virus and anti-malware protections for a variety of data center workloads.

 

The Benefit of the Guest Introspection Platform

The Guest Introspection platform provides customers several outcomes.

Simplified AV management – Manual installation of agents into the guest operating system requires massive operational overhead just getting the agents deployed out on every virtual workload, managing the agent life-cycle post deployment, and for troubleshooting issues with the in-guest agents in day 2 operations.

Guest Introspection provides a centralized management interface for deploying the agentless components to the vSphere hosts, including the security policies, all while using vSphere objects and grouping of those objects to associate the endpoint policy.  This provides granular policy creation and association in the workload environments.

Improved endpoint performance – When several or all of the virtual workloads kick off a scheduled AV scan, this can produce a massive resource drain from host resources where workloads might suffer performance concerns during Continue reading

Recovering from Network Automation Failures

This blog post was initially sent to subscribers of my SDN and Network Automation mailing list. Subscribe here.

One of my readers sent me this question:

Would you write about methods for reverting from expected new state to old state in the case automation went wrong due to (un)predictable events that left a node or network in a limbo state betwixt and between.

Like always, there’s the easy and the really hard part.

Read more ...

Not Your First DockerCon? Join Docker Pals As A Guide

The Docker Pals program matches groups of attendees who are newer to DockerCon (the “Pals”) with an attendee who has been to one or more DockerCons (the “Guide”). Our goal is to help everyone at DockerCon feel comfortable and see what this amazing community has to offer. Both Pals and Guides find the experience rewarding! The first step in being a Guide is registering for DockerCon so if you haven’t yet, register here now!

Here’s what some of our Guides have said about the program:

“Conferences can be lonely if you don’t know anyone, or are the only person from your company. Docker Pals provides stress free opportunity to connect with people and get to know them.”    

 

“A fantastic experience to meet new people and help them to enjoy DockerCon as much as I do.”

 

It was great meeting the Pals assigned to me. For me it was interesting to learn about the different people and use cases. I also enjoyed walking everyone through the vendor area explaining all the technologies.”

 

“Last DockerCon was my third in a row and the third time I’ve been involved with Docker Pals as a Guide. Continue reading

BrandPost: SD-WAN and Multi-Cloud Digital Transformation, Part 1: Enterprise Reality Check

This is the first in a 3-part blog series that will detail how deploying a business-driven SD-WAN edge platform can help enterprises successfully accelerate multi-cloud digital transformation initiatives.For a growing number of enterprises, a migration to the cloud is not a simple matter of deploying an application or two onto Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure or some other hosted service. It’s now a multi-cloud strategy that’s a key part of a digital transformation initiative aimed at modernizing business processes. Using multiple cloud computing services such as infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS), and software-as-a-service (SaaS) in a single unified cloud strategy offers the ability to reduce dependence on any single vendor.To read this article in full, please click here

The Week in Internet News: Facebook Calls for New Internet Regulations

More regulation, please: Facebook CEO Mark Zuckerberg, in an op-ed in the Washington Post, called on governments to get more involved in Internet regulation, including defining harmful content and making rules on how sites should handle it. Governments should also look at new laws to protect elections, to improve consumer privacy, and to guarantee data portability, Zuckerberg said. His ideas weren’t universally embraced, however. The Electronic Frontier Foundation, in a blog post, said there were “fundamental problems” with governments policing harmful content, particularly in defining what’s harmful.

Hold my beer: Australia’s parliament didn’t take long to look at new regulations, with lawmakers passing legislation that would create three-year jail terms for social media executives and operators of other websites that do not remove violent content in an “expeditious” manner, NPR reports. Web-based services could also be fined up to 10 percent of their annual revenue for not complying with the law.

Even more laws: Singapore is the latest country to consider legislation attacking fake news. A proposed law there would require online news sites to publish corrections or warnings about stories the government decides are fake news and remove articles in extreme cases, the Straits Times reports. The Continue reading

Breaking Out of the Hadoop Cocoon

The announcement last fall that top Hadoop vendors Cloudera and Hortonworks were coming together in a $5.2 billion merger – and reports about the financial toll that their competition took on each other in the quarters leading up to the deal – revived questions that have been raised in recent years about the future of Hadoop in an era where more workloads are moving into public clouds like Amazon Web Services (AWS) that offer a growing array of services that many of the jobs that the open-source technology already does.

Breaking Out of the Hadoop Cocoon was written by Nicole Hemsoth at .

BIER Basics

Multicast is, at best, difficult to deploy in large scale networks—PIM sparse and BIDIR are both complex, adding large amounts of state to intermediate devices. In the worst case, there is no apparent way to deploy any existing version of PIM, such as large-scale spine and leaf networks (variations on the venerable Clos fabric). BEIR, described in RFC8279, aims to solve the per-device state of traditional multicast.

In this network, assume A has some packet that needs to be delivered to T, V, and X. A could generate three packets, each one addressed to one of the destinations—but replicating the packet at A is wastes network resources on the A->B link, at least. Using PIM, these three destinations could be placed in a multicast group (a multicast address can be created that describes T, V, and X as a single destination). After this, a reverse shortest path tree can be calculated from each of the destinations in the group towards the source, A, and the correct forwarding state (the outgoing interface list) be installed at each of the routers in the network (or at least along the correct paths). This, however, adds a lot of state to the network.
Continue reading