Happy Pi Day with Docker and Raspberry Pi

What better way to say “Happy Pi Day” than by installing Docker Engine – Community (CE) 18.09 on Raspberry Pi. This article will walk you through the process of installing Docker Engine 18.09 on a Raspberry Pi. There are many articles out there that show this process, but many failed due to older Engine versions and some syntax issues.

Special thanks to Docker Solutions Engineer, Stefan Scherer and his monitoring image (stefanscherer/monitor) along with the whoami image (stefanscherer/whoami) that allows Pimoroni Blinkt! LED’s to turn on/off when scaling an application within a Swarm Cluster.

Instructions

For this demo, I used 7 Raspberry Pi’s 3 (model B+) and 1 Pimoroni Blinkt! LED for each Pi.

1. Download the following Raspian image ‘2018-11-13-raspbian-stretch-full.img’ from https://www.raspberrypi.org/downloads/raspbian/

2. Use balenaEtcher to write the image to each of your microusb cards.

3. To make DNS hostname resolution a little easier, I setup local hostnames on each Pi device. Below is an example.

192.168.93.231 pi-mgr1 pi-mgr1.docker.cafe
192.168.93.232 pi-mgr2 pi-mgr2.docker.cafe
192.168.93.233 pi-mgr3 pi-mgr3.docker.cafe
192.168.93.241 pi-node1 pi-node1.docker.cafe
192. Continue reading

BrandPost: Micro Data Centers Evolve to Fit New Business Requirements of Edge Computing

Recent breakthroughs in technology have expanded the possibilities for where data is gathered, processed, stored and analyzed. IT staffs and their business counterparts now have the flexibility of deciding whether their applications are more efficient residing in the cloud, within a traditional data center, or on the network edge. In fact, for the first time, the nature of the applications themselves is determining where they best should run. Over the last several months, micro data centers have emerged as a technology of choice for helping to manage the growing computing needs across edge environments.To read this article in full, please click here

QoS Is Dead. Long Live QoS!

Ah, good old Quality of Service. How often have we spent our time as networking professionals trying to discern the archaic texts of Szigeti to learn how to make you work? QoS is something that seemed so necessary to our networks years ago that we would spend hours upon hours trying to learn the best way to implement it for voice or bulk data traffic or some other reason. That was, until a funny thing happened. Until QoS was useless to us.

Rest In Peace and Queues

QoS didn’t die overnight. It didn’t wake up one morning without a home to go to. Instead, we slowly devalued and destroyed it over a period of years. We did it be focusing on the things that QoS was made for and then marginalizing them. Remember voice traffic?

We spent years installing voice over IP (VoIP) systems in our networks. And each of those systems needed QoS to function. We took our expertise in the arcane arts of queuing and applied it to the most finicky protocols we could find. And it worked. Our mystic knowledge made voice better! Our calls wouldn’t drop. Our packets arrived when they should. And the world was Continue reading

Summit Simulations to Change How we Drive and Explore Space

At the Oak Ridge National Laboratory (ORNL) in Tennessee, Professor Joe Oefelein, from the Department of Aerospace Engineering at Georgia Tech, is heading up a team of researchers working to solve the multifaceted grand challenge of simulating turbulent reactive flows in propulsion and power systems.

Summit Simulations to Change How we Drive and Explore Space was written by Timothy Prickett Morgan at .

Juniper vSRX 15.1X49 on QEMU

Recently, I have been quite busy running into some problems with deployment of Junos 15.1X49-D15.4 on Qemu image. So, I want make your lifer easier and I share my quick installation steps with you.

1. Download vSRX VMware Appliance

Download the file media-srx-ffp-vsrx-vmdisk-15.1X49-D15.4.ide.ova. The good news is that you do not need to enter a licence key after you download the image. The bad new is that you still need a valid contract with Juniper in order to download the file. Luckily, you can find the installation file flying somewhere on the Internet.

2. Extract Archive and OVA files

$ unrar e media-srx-ffp-vsrx-vmdisk-15.1X49-D15.4.ide.rar
$ tar xvf media-srx-ffp-vsrx-vmdisk-15.1X49-D15.4.ide.ova

3. Convert StreamOptimized Virtual Machine Disk to Format 

Details ale explained in my original vSRX article.

$ qemu-img convert -O qcow2 media-srx-ffp-vsrx-vmdisk-15.1X49-D15.4-disk1.vmdk media-srx-ffp-vsrx-vmdisk-15.1X49-D15.4-disk1.img 

4. Hack Image To Support QEMU

Unfortunately, vSRX 15.1 image boots to “Wind River Linux 6.0.0.15” prompt but it would not launch the freebsd VM within the nested KVM instance. The workaround along with the detailed explanation of the issue is originally posted here.

$ /usr/local/bin/qemu-system-x86_64 -m 4192M Continue reading

Pulling Configs from Cisco NSO using curl and json2yaml.py

We’re using Cisco NSO in our lab at the moment to provision L3VPNs across multi-vendor environments as part of a demo. Just noting down a few things here for future reference:

You can use the curl (command-line URL) utility to query NSO’s API and retrieve the configuration of a device it knows about. You probably know that NSO syncs a device’s config locally, so this will be a way to retrieve the device config that NSO knows about – if the device is out of sync, of course this won’t quite be the latest:

curl -u username:password -H "Accept: application/vnd.yang.data+json" http://192.168.8.172:8080/api/config/devices/device/CPE-3/config | json2yaml

I’ll break this down:

curl -u username:password – provides the username and password of your NSO installation

-H “Accept: application/vnd.yang.data+json” – specifies an HTTP header to send in the request. In this instance, we are saying that we are expecting a JSON response. Alternatively you could specify ‘vnd.yang.data+xml’ to receive an XML response.

http://192.168.8.172:8080/api/config/devices/device/CPE-3/config – this is the API request we are making. CPE-3 is the device we are requesting the configuration of.

| json2yaml – this pipes the JSON response through a python module Continue reading

Using Screen Scraping in Network Automation

The first time I encountered screen scraping was in mid-1990. All business applications were running on IBM mainframes those days, and IBM used proprietary terminal system (remember 3270) that was almost impossible to interact with, so some people got the “bright” idea of emulating that screen, scraping information off the emulated screen and copying it into HTML pages… thus webifying their ancient apps.

Guess what – we’re still doing the very same thing in network automation as Andrea Dainese succinctly explained in the latest addition to his Automation for Cisco NetDevOps article.

Introduction to DNS Privacy

DNSSEC

Almost every time we use an Internet application, it starts with a DNS (Domain Name System) transaction to map a human-friendly domain name to a set of IP addresses that can be used to deliver packets over the Internet. DNS transactions can therefore be correlated to the applications we use, the websites we visit, and sometimes even the people we communicate with.

While the domain name information itself is public, the transactions performed by the hosts are not. Unfortunately, the DNS does not inherently employ any mechanisms to provide confidentiality for these transactions, and the corresponding information can therefore easily be logged by the operators of DNS resolvers and name servers, as well as be eavesdropped by others.

So we are publishing our Introduction to DNS Privacy to raise awareness of the privacy implications of the DNS, and the mechanisms that have been recently developed to improve user privacy.

Please also check our DNS Privacy page for more information!

Further Information

The post Introduction to DNS Privacy appeared first on Internet Society.

The State of DNSSEC Validation

Many aspects of technology adoption in the Internet over time show simple "up and to the right" curves. What lies behind these curves is the assumption that once a decision is made to deploy a technology the decision is not subsequently "unmade." When we observe an adoption curve fall rather than rise, then it’s reasonable to ask what is going on.

BrandPost: What’s the Difference between OFDMA and MU-MIMO in 11ax?

The IEEE's latest standard, 802.11ax, has been designed inside and out for high efficiency. Also known as Wi-Fi 6, 11ax promises real-world performance improvements that will keep today’s mobile users and IoT devices connected and happy. To achieve that, over 50 features have been proposed as part of the 11ax standard. Once adopted into the standard, they will be rolled out to the market in phases – Wave 1 and Wave 2, just like with 802.11ac.Multi-user Multiple-Input, Multiple-Output (MU-MIMO) and Orthogonal Frequency-Division Multiple Access (OFDMA) are two of the most significant technical enhancements in 11ax. Both MU-MIMO and OFDMA are multiuser technologies that enable simultaneous bidirectional communication between an access point (AP) and end users. So how are they different?To read this article in full, please click here

BrandPost: The First SD-WAN ‘App Store’

The incredible power and automation offered by today’s more advanced SD-WAN platforms is transforming how enterprises are building and managing their networks. Operations that were once massive resource-intensive projects for network teams, have now been reduced to mere minutes of work. Need to change how an application operates across 1000+ locations, modify QoS settings across every site in your network or enforce a common security policy simply? Just point and click.What’s been missing from this incredible transformation is how the power of automation can be extended to ecosystem partners. Today is the day we’re going to change all of that.To read this article in full, please click here

Datanauts 160: The Hitchhiker’s Guide To IT Travel

Today's Datanauts episode offers travel advice for IT pros who spend a lot of time on the road. Our three guests have logged millions of miles for work. They share tips on getting from A to B smoothly, offer packing hints for clothes and equipment, give advice on maximizing travel programs, and tout their favorite travel gear.

The post Datanauts 160: The Hitchhiker’s Guide To IT Travel appeared first on Packet Pushers.

The noise in fiber could be used to increase data capacity

Increasing the capacity of fiber-optic cables might one day be possible through the exploitation of a part of the signal commonly thought of as substandard. That imperfect element in a carrier, called “noise” is usually something one tries to avoid—it can muddy the accurate reading of the data.However, scientists now suggest that one could, in fact, embrace the rubbishy, and thus far unusable, part of the signal to hold data and allow it to be decoded. The ordinarily data-obscuring hubbub could potentially be harnessed and used to increase data capacity in light waves.“Information is encoded in the correlated noise between spatially separated light waves,” writes Oliver Morsch in an article on the website of ETH Zurich, a technical and scientific university. “The new coding technology, developed by ETH researchers, makes it possible to make better use of the transmission capacity of optical fibers.”To read this article in full, please click here

The noise in fiber could be used to increase data capacity

Increasing the capacity of fiber-optic cables might one day be possible through the exploitation of a part of the signal commonly thought of as substandard. That imperfect element in a carrier, called “noise” is usually something one tries to avoid—it can muddy the accurate reading of the data.However, scientists now suggest that one could, in fact, embrace the rubbishy, and thus far unusable, part of the signal to hold data and allow it to be decoded. The ordinarily data-obscuring hubbub could potentially be harnessed and used to increase data capacity in light waves.“Information is encoded in the correlated noise between spatially separated light waves,” writes Oliver Morsch in an article on the website of ETH Zurich, a technical and scientific university. “The new coding technology, developed by ETH researchers, makes it possible to make better use of the transmission capacity of optical fibers.”To read this article in full, please click here