5 Things You Should Know About VMware
Serverless, IoT security, and the crack house were all hot topics at VMware’s annual research and development conference.
Serverless, IoT security, and the crack house were all hot topics at VMware’s annual research and development conference.
It’s a full OpenStack suite including compute, storage, networking, and the virtual infrastructure manager (VIM) layer. It comprises an end-to-end NFVi platform.
One problem I’ve heard in the past is that much of the career advice given in the networking world is not practical. In this short take, I take this problem on, explaining why it might be more practical than it initially seems.
Cisco executives tout their API-driven approach as the company's DevNet membership now tops 500,000 registered developers.
By 2019, 69 percent of enterprise IT organizations will be trying to manage some type of multi-cloud environment.
During a recent client visit, we were asked to help migrate the following script for deploying a centralized sudoers file to RHEL and AIX servers. This is a common scenario which can provide some good examples of leveraging advanced Ansible features. Additionally, we can consider the shift in approach from a script that does a task to describing and enforcing the state of an item idempotently.
Here is the script:
#!/bin/sh
# Desc: Distribute unified copy of /etc/sudoers
#
# $Id: $
#set -x
export ODMDIR=/etc/repos
#
# perform any cleanup actions we need to do, and then exit with the
# passed status/return code
#
clean_exit()
{
cd /
test -f "$tmpfile" && rm $tmpfile
exit $1
}
#Set variables
PROG=`basename $0`
PLAT=`uname -s|awk '{print $1}'`
HOSTNAME=`uname -n | awk -F. '{print $1}'`
HOSTPFX=$(echo $HOSTNAME |cut -c 1-2)
NFSserver="nfs-server"
NFSdir="/NFS/AIXSOFT_NFS"
MOUNTPT="/mnt.$$"
MAILTO="[email protected]"
DSTRING=$(date +%Y%m%d%H%M)
LOGFILE="/tmp/${PROG}.dist_sudoers.${DSTRING}.log"
BKUPFILE=/etc/sudoers.${DSTRING}
SRCFILE=${MOUNTPT}/skel/sudoers-uni
MD5FILE="/.sudoers.md5"
echo "Starting ${PROG} on ${HOSTNAME}" >> ${LOGFILE} 2>&1
# Make sure we run as root
runas=`id | awk -F'(' '{print $1}' | awk -F'=' '{print $2}'`
if [ $runas -ne 0 ] ; then
echo "$PROG: you must be root to run Continue reading
While AT&T and China Mobile contributed the lion’s share of the initial code for ONAP, others are now stepping up to contribute more. A snapshot of contributors from the second quarter of 2018 shows that Huawei, Amdocs, and ZTE, along with many others, are contributing.
Resin.io uses Linux-based containers and cloud technologies to support IoT deployments. Those efforts revolve around separating core operations of the IoT device from the application layer.
The much-touted Cisco-Ericsson partnership is languishing thanks to the executive changes at Ericsson.
By adding centralized orchestration and network automation to its Unity EdgeConnect SD-WAN, Silver Peak customers can segment their users and applications to improve security.
This Course is By Joseph Holbrook and is 4 hours and 34 minutes long. You can view the full course on our streaming Site, or buy the course at ine.com.
A blockchain is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network. Distributed to all member nodes in the network, the ledger permanently records, in a sequential chain of cryptographic hash-linked blocks, the history of asset exchanges that take place between the peers in the network. This course has been designed for technical architects, pre sales architects, developers and project managers who must make technical decisions about distributed architectures and development platforms.
While exploring some of the intricacies around the use of X.509v3 certificates in Kubernetes, I found myself wanting to be able to view the details of a certificate embedded in a kubeconfig file. (See this page if you’re unfamiliar with what a kubeconfig file is.) In this post, I’ll share with you the commands I used to accomplish this task.
First, you’ll want to extract the certificate data from the kubeconfig file. For the purposes of this post, I’ll use a kubeconfig file named config
and found in the .kube
subdirectory of your home directory. Assuming there’s only a single certificate embedded in the file, you can use a simple grep
statement to isolate this information:
grep 'client-certificate-data' $HOME/.kube/config
Combine that with awk
to isolate only the certificate data:
grep 'client-certificate-data' $HOME/.kube/config | awk '{print $2}'
This data is Base64-encoded, so we decode it (I’ll wrap the command using backslashes for readability now that it has grown a bit longer):
grep 'client-certificate-data' $HOME/.kube/config | \
awk '{print $2}' | base64 -d
You could, at this stage, redirect the output into a file (like certificate.crt
) if so desired; the data you have is Continue reading