sFlow to JSON

The latest version of sflowtool can convert sFlow datagrams into JSON, making it easy to write scripts to process the standard sFlow telemetry streaming from devices in the network.

Download and compile the latest version of sflowtool:
git clone https://github.com/sflow/sflowtool.git
cd sflowtool/
./boot.sh
./configure
make
sudo make install
The -J option formats the JSON output to be human readable:
$ sflowtool -J
{
"datagramSourceIP":"10.0.0.162",
"datagramSize":"396",
"unixSecondsUTC":"1544241239",
"localtime":"2018-12-07T19:53:59-0800",
"datagramVersion":"5",
"agentSubId":"0",
"agent":"10.0.0.231",
"packetSequenceNo":"1068783",
"sysUpTime":"1338417874",
"samplesInPacket":"2",
"samples":[
{
"sampleType_tag":"0:2",
"sampleType":"COUNTERSSAMPLE",
"sampleSequenceNo":"148239",
"sourceId":"0:3",
"elements":[
{
"counterBlock_tag":"0:1",
"ifIndex":"3",
"networkType":"6",
"ifSpeed":"1000000000",
"ifDirection":"1",
"ifStatus":"3",
"ifInOctets":"4162076356",
"ifInUcastPkts":"16312256",
"ifInMulticastPkts":"187789",
"ifInBroadcastPkts":"2566",
"ifInDiscards":"0",
"ifInErrors":"0",
"ifInUnknownProtos":"0",
"ifOutOctets":"2115351089",
"ifOutUcastPkts":"7087570",
"ifOutMulticastPkts":"4453258",
"ifOutBroadcastPkts":"6141715",
"ifOutDiscards":"0",
"ifOutErrors":"0",
"ifPromiscuousMode":"0"
},
{
"counterBlock_tag":"0:2",
"dot3StatsAlignmentErrors":"0",
"dot3StatsFCSErrors":"0",
"dot3StatsSingleCollisionFrames":"0",
"dot3StatsMultipleCollisionFrames":"0",
"dot3StatsSQETestErrors":"0",
"dot3StatsDeferredTransmissions":"0",
"dot3StatsLateCollisions":"0",
"dot3StatsExcessiveCollisions":"0",
"dot3StatsInternalMacTransmitErrors":"0",
"dot3StatsCarrierSenseErrors":"0",
"dot3StatsFrameTooLongs":"0",
"dot3StatsInternalMacReceiveErrors":"0",
"dot3StatsSymbolErrors":"0"
}
]
},
{
"sampleType_tag":"0:1",
"sampleType":"FLOWSAMPLE",
"sampleSequenceNo":"11791",
"sourceId":"0:3",
"meanSkipCount":"2000",
"samplePool":"34185160",
"dropEvents":"0",
"inputPort":"3",
"outputPort":"10",
"elements":[
{
"flowBlock_tag":"0:1",
"flowSampleType":"HEADER",
"headerProtocol":"1",
"sampledPacketSize":"102",
"strippedBytes":"0",
"headerLen":"104",
"headerBytes":"0C-AE-4E-98-0B-89-05-B6-D8-D9-A2-66-80-00-54-00-00-45-08-12-04-00-04-10-4A-FB-A0-00-00-BC-A0-00-00-EF-80-00-DE-B1-E7-26-00-20-75-04-B0-C5-00-00-00-00-96-01-20-00-00-00-00-00-01-11-21-31-41-51-61-71-81-91-A1-B1-C1-D1-E1-F1-02-12-22-32-42-52-62-72-82-92-A2-B2-C2-D2-E2-F2-03-13-23-33-43-53-63-73-1A-1D-4D-76-00-00",
"dstMAC":"0cae4e980b89",
"srcMAC":"05b6d8d9a266",
"IPSize":"88",
"ip.tot_len":"84",
"srcIP":"10.0.0.203",
"dstIP":"10.0.0.254",
"IPProtocol":"1",
"IPTOS":"0",
"IPTTL":"64",
"IPID":"8576",
"ICMPType":"8",
"ICMPCode":"0"
},
{
"flowBlock_tag":"0:1001",
"extendedType":"SWITCH",
"in_vlan":"1",
"in_priority":"0",
"out_vlan":"1",
"out_priority":"0"
}
]
}
]
}
The output shows the JSON representation of a single sFlow datagram containing one counter sample and one flow sample.

The Continue reading

The Week in Internet News: Australia Adopts Controversial Encryption Law

Australia vs. encryption: The Australian Parliament has passed a law that requires tech companies to give law enforcement agencies there access to encrypted communications, the New York Times reports. Several tech companies and privacy groups opposed the law, saying it hurts efforts to protect data from hackers. Fortune, which called the law “draconian,” says it will create headaches for large tech companies.

Slow rolling: While several news stories this year talked about quantum computing being an eventual threat to encryption, that possibility is still more than a decade away, according to a report from the U.S. National Academies of Sciences, Engineering, and Medicine. The U.S. may need to invest heavily in quantum computing to retain a global lead in the technology, the report recommends. Nextgov has the story.

Filling the pipes: Botnets of compromised Internet of Things devices make up more than three quarters of the malware on communication service provider networks this year, up from 33 percent of the malware in 2016, Infosecurity reports. Hackers are increasingly targeting IoT devices instead of PCs and other traditional systems.

Blockchain tackles phishing: A company called MetaCert wants to use blockchain to help fight the scourge of phishing emails, Wired. Continue reading

Introducing VMware NSX Service Mesh

Introducing VMware NSX Service Mesh

We are excited to introduce VMware NSX® Service Mesh. Built on the foundation of Istio, this VMware offering will extend the capabilities of the Istio service mesh technology to bring visibility, control, and security at the application layer to microservices, the data they access, the users that interact with them, as well as traditional monolithic applications. In short, NSX Service Mesh will enable visibility, control, and security for services, data, and users at the API level. This acts as a natural evolution of cloud-native constructs and will act as an extension of the NSX-T Data Center platform’s replication of networking and security services in software, which is applied directly to containers via the Container Network Interface (CNI).

 

NSX Service Mesh

The Rise of Microservices

With the rise of cloud-native architectures built on distributed microservices, developers are encountering challenges with visibility, management, and control of these new applications. The microservices that these apps are comprised of are developed on cloud-native platforms like Kubernetes or Cloud Foundry, using a variety of programming languages, and often across multiple cloud environments. In addition, these applications consist of many more endpoints to scale, secure, and monitor than in traditional ones. This ultimately Continue reading

2019: Look for improvements to software-defined data-center networks

IDG To help IT pros attain top performance for their software-defined data-center networks (SDDCN), we have identified 10 crucial technology areas to watch and evaluate during 2019.SDDCN performance requires advanced network software to provision, manage and secure high-speed traffic flows, and network administrators need automated solutions to monitor and deliver reliable quality of service to critical applications.To read this article in full, please click here

2019: Look for improvements to software-defined data-center networks

IDG To help IT pros attain top performance for their software-defined data-center networks (SDDCN), we have identified 10 crucial technology areas to watch and evaluate during 2019.SDDCN performance requires advanced network software to provision, manage and secure high-speed traffic flows, and network administrators need automated solutions to monitor and deliver reliable quality of service to critical applications.To read this article in full, please click here

Cisco IT Blog Awards Finalist

I’m proud to announce that I’ve been selected as a finalist in the Cisco IT Blog Awards in the “most inspirational” category.

Cisco IT Blog Awards Finalist

I’m happy to be in this category as I hope that my posts here have inspired others to learn about design, architecture and to have an open mindset towards technology.

If you want to vote for me, you can do that here. Thanks for your support!

The post Cisco IT Blog Awards Finalist appeared first on Daniels Networking Blog.

MadMax: surviving out-of-gas conditions in Ethereum smart contracts

MadMax: surviving out-of-gas conditions in ethereum smart contracts Grech et al., OOPSLA’18

We’re transitioning to look at a selection of papers from the recent OOPSLA conference this week. MadMax won a distinguished paper award, and makes a nice bridge from the CCS blockchain papers we were looking at last week.

Analysis and verification of smart contracts is a high-value task, possibly more so than in any other programming setting. The combination of monetary value and public availability makes the early detection of vulnerabilities a task of paramount importance. (Detection may occur after contract deployment. Despite the code immutability, which prevents bug fixes, discovering a vulnerability before an attacker may exploit it could enable a trusted third party to move vulnerable funds to safety).

MadMax is in the same vein as Securify, performing EVM bytecode analysis using Datalog (also with Soufflé) to infer security issues in contracts. In this instance, MadMax focuses on detecting vulnerabilities caused by out-of-gas conditions. The paper touches on some nice reusable building blocks (e.g. Vandal). I could easily see Vandal + Soufflé becoming a standard foundation for powerful EVM-based smart contract analysis.

MadMax is available on GitHub at https://github.com/nevillegreech/MadMax.

MaxMax Continue reading

Routers Getting Routered – Silver Peak SD-WAN

Silver Peak SD-WAN. Routers Getting Routered – One of the Silver Peak’s Slogan for SD-WAN. First, let’s have a look at the video below  that the Slogan of “Routers Getting Routered” seems marketing, but actually it has a technical meaning behind it.     Video : Silver Peak Youtube Channel    I attended the last …

The post Routers Getting Routered – Silver Peak SD-WAN appeared first on Cisco Network Design and Architecture | CCDE Bootcamp | orhanergun.net.

Do I Need a WAN?

In the latest Network Break, Network Break 213 from Packet Pushers, they discussed some of the latest news in networking, such as Amazon Outpost. With the rise of SaaS applications, the questions was also raised, do I even need a WAN?

Let’s assume you are running Office365. Your e-mail and office application is in the cloud. You are using Salesforce for your CRM. You ERP is also cloud-hosted. You’ve moved pretty much all of your previously internal apps to the cloud. Do you still need a WAN? I would argue yes. Considering all the applications mentioned previously have been moved, what do we still have left?

All though we’ve been talking about paperless societies for ages, have you ever seen an office environment without a printer? Neither have I. Your printers likely need to reach a print server.  Do you have Active Directory? Would you be comfortable putting it entirely in the cloud? How do you provision PC images? Do you use something like SCCM? Do you have lighting, doors, larms etc that are connected to the network? Are all of your stored files in the cloud? Probably not depending on how sensitive they are. Do your offices Continue reading

Network automation as network architecture

I spent a very large part of my professional life as a network engineer working on automation.  A journey that started back in 1996 when I and a few colleagues engineered Bloomberg’s first global IP WAN.  That WAN evolved into the most recognized (and agile) WAN in the financial services industry.  And that automation which started small, over the years evolved into a very lean and flexible model-based provisioning library, with the various programs (provisioning, health-checking, discovery, etc) that were built on top.  The automation library drove a high function multi-service network with less than 15K of OO code, and with support for 6+ different NOS and 100+ different unique packet forwarding FRUs.  It was quite unique in that I have yet to see some of its core concepts repeated elsewhere.  

Over the thousands of hours I spent evolving and fine tuning that network automation engine, I’ve learned quite a lot along the way.  I hope to write about some of my high level learnings over the next year.  In this blog entry, I want to share my perspective on the foundational basis of any proper network automation — this is network Continue reading

BiB 067: Custom APIs For Business Logic With BlueCat Gateway

BlueCat Networks offers a free add-on product to their DDI (DNS, DHCP, IPAM) product called Gateway. Gateway is a platform customers can use to create their own custom APIs that make sense for their business. Put another way, Gateway provides a REST API endpoint for other applications within the business to talk to. That makes for some interesting workflow capabilities.

The post BiB 067: Custom APIs For Business Logic With BlueCat Gateway appeared first on Packet Pushers.