Google’s New Book: The Site Reliability Workbook

 

Google has released a new book: The Site Reliability Workbook — Practical Ways to Implement SRE.

It's the second book in their SRE series. How is it different than the previous Site Reliability Engineering book?

David Rensin, a SRE at Google, says:

It's a whole new book.  It's designed to sit next to the original on the bookshelf and for folks to bounce between them -- moving between principle and practice.

And from the preface:

The purpose of this second SRE book is (a) to add more implementation detail to the principles outlined in the first volume, and (b) to dispel the idea that SRE is implementable only at “Google scale” or in “Google culture.”

The Site Reliability Workbook weighs in at a hefty 508 pages and roughly follows the structure of the first book. It's organized into three different parts: Foundations, Practices, and Processes. There are three appendices: Example SLO Document, Example Error Budget Policy, and Results of Postmortem Analysis.

The table of content is quite detailed, but here are the chapter titles:

  1. How SRE Relates to DevOps.  
  2. Implementing SLOs.
  3. SLO Engineering Case Studies.
  4. Monitoring.
  5. Alerting on SLOs.
  6. Eliminating Toil.
  7. Simplicity.
  8. On-Call.
  9. Incident Response.
  10. Postmortem Continue reading

Episode 31 – Analytics and Security

Security is facing a crisis of well trained engineers. As a result, operators are relying more heavily on analytics to provide security intelligence. In this show, Eric Osterweil joins Network Collective to discuss the use of analytics in security, and the role analytics can play to augment engineering talent.


 

We would like to thank Core BTS for sponsoring this episode of Network Collective. Core BTS focuses on partnering with your company to deliver technical solutions that enhance and drive your business. If you’re looking for a partner to help your technology teams take the next step, you can reach out to Core BTS by emailing them here.

 

We also would also like to thank Cumulus Networks for sponsoring this episode of Network Collective. Cumulus is bringing S.O.U.L. back to the network. Simple. Open. Untethered. Linux. For more information about how you can bring S.O.U.L. to your network, head on over to https://cumulusnetworks.com/ncautomation. There you can find out how Cumulus Networks can help you build a datacenter as efficient and as flexible as the worlds largest data centers and try Cumulus technology absolutely free.

 


Eric Osterweil
Guest

Eyvonne Sharp
Host

Lenovo gets into the on-premises cloud game with ThinkAgile CP

Lenovo has launched a new product line called ThinkAgile CP that consists of Lenovo ThinkSystem hardware and Cloudistics software for what it calls a “composable cloud,” or cloud-in-a-box, where the attributes of cloud multi-tenancy are available to organizations behind their firewall.Basically it’s a hyperconverged system preconfigured to work right out of the box and operate inside a data center much like a cloud service provider. Compute, storage, and networking are designed to connect to the ThinkAgile CP Cloud Controller, which in turn lets an IT administrator spin up multi-tenant provisioning. Software-defined compute, storage, and networking can be achieved in just a few clicks.To read this article in full, please click here

Lenovo gets into the on-premises cloud game with ThinkAgile CP

Lenovo has launched a new product line called ThinkAgile CP that consists of Lenovo ThinkSystem hardware and Cloudistics software for what it calls a “composable cloud,” or cloud-in-a-box, where the attributes of cloud multi-tenancy are available to organizations behind their firewall.Basically it’s a hyperconverged system preconfigured to work right out of the box and operate inside a data center much like a cloud service provider. Compute, storage, and networking are designed to connect to the ThinkAgile CP Cloud Controller, which in turn lets an IT administrator spin up multi-tenant provisioning. Software-defined compute, storage, and networking can be achieved in just a few clicks.To read this article in full, please click here

MPLS and VRFs – Filling the Gaps

A few years ago, I took an SE role covering Higher Education accounts. I quickly realized one of the deficits Cisco has in the CCNA program as it pertains to networks with a certain set of requirements. While the program is jam-packed with great information, there are a few concepts that an administrator may have to deal with that catch them by surprise. Three related topics that aren’t covered in CCNA Routing and Switching are shown below.

This article is meant to serve as a starting point for those who may be very strong with routing and switching but lack the exposure to VRFs, Layer 3 Segmentation, and MPLS. It is a good starting point for new employees that might face this challenge and it will certainly help them gain perspective on these topics.

Introduction to VRFs

Segmenting Layer 3 Networks with VRFs

Going Proactive on Security: Driving Encryption Adoption Intelligently

Going Proactive on Security: Driving Encryption Adoption Intelligently

It's no secret that Cloudflare operates at a huge scale. Cloudflare provides security and performance to over 9 million websites all around the world, from small businesses and WordPress blogs to Fortune 500 companies. That means one in every 10 web requests goes through our network.

However, hidden behind the scenes, we offer support in using our platform to all our customers - whether they're on our free plan or on our Enterprise offering. This blog post dives into some of the technology that helps make this possible and how we're using it to drive encryption and build a better web.

Why Now?

Recently web browser vendors have been working on extending encryption on the internet. Traditionally they would use positive indicators to mark encrypted traffic as secure; when traffic was served securely over HTTPS, a green padlock would indicate in your browser that this was the case. In moving to standardise encryption online, Google Chrome have been leading the charge in marking insecure page loads as "Not Secure". Today, this UI change has been pushed out to all Google Chrome users globally for all websites: any website loaded over HTTP will be marked as insecure.

Going Proactive on Security: Driving Encryption Adoption Intelligently

That's not all though; Continue reading

MPLS Intro Series – Route Reflectors

This is the final article in the MPLS Intro Series and will quickly mention the need for route reflectors. This need is driven by the iBGP requirement for a full mesh of peers. This means that a network with only 4 PE nodes would have 6 iBGP peering sessions. This is calculated as n(n-1)/2 where n is the number of PE nodes required for a given topology.

As the scale grows, the need for a centralized peering point becomes obvious. For example, a network with 10 PE nodes would have 45 iBGP sessions to meet the full mesh requirement. Route reflectors overcome this rule by becoming a central point that can advertise routes between iBGP “route reflector clients”. The diagram below actually has more peering sessions than the one above (without RR). However, as a network continues to grow, the full mesh becomes quite challenging.

This is the extent of what I really wanted to cover in this introductory level article and this article concludes the MPLS Intro Series.  If you want to learn more about VPNv4 and route reflectors, you can check out this video below.

LabMinutes# SP0015 – Cisco MPLS VPN with BGP Route Reflector (Part 1)

Disclaimer: Continue reading