Network Engineers Feel Pressure to Embrace DevOps Practices
By 2019, 69 percent of enterprise IT organizations will be trying to manage some type of multi-cloud environment.
By 2019, 69 percent of enterprise IT organizations will be trying to manage some type of multi-cloud environment.
During a recent client visit, we were asked to help migrate the following script for deploying a centralized sudoers file to RHEL and AIX servers. This is a common scenario which can provide some good examples of leveraging advanced Ansible features. Additionally, we can consider the shift in approach from a script that does a task to describing and enforcing the state of an item idempotently.
Here is the script:
#!/bin/sh
# Desc: Distribute unified copy of /etc/sudoers
#
# $Id: $
#set -x
export ODMDIR=/etc/repos
#
# perform any cleanup actions we need to do, and then exit with the
# passed status/return code
#
clean_exit()
{
cd /
test -f "$tmpfile" && rm $tmpfile
exit $1
}
#Set variables
PROG=`basename $0`
PLAT=`uname -s|awk '{print $1}'`
HOSTNAME=`uname -n | awk -F. '{print $1}'`
HOSTPFX=$(echo $HOSTNAME |cut -c 1-2)
NFSserver="nfs-server"
NFSdir="/NFS/AIXSOFT_NFS"
MOUNTPT="/mnt.$$"
MAILTO="[email protected]"
DSTRING=$(date +%Y%m%d%H%M)
LOGFILE="/tmp/${PROG}.dist_sudoers.${DSTRING}.log"
BKUPFILE=/etc/sudoers.${DSTRING}
SRCFILE=${MOUNTPT}/skel/sudoers-uni
MD5FILE="/.sudoers.md5"
echo "Starting ${PROG} on ${HOSTNAME}" >> ${LOGFILE} 2>&1
# Make sure we run as root
runas=`id | awk -F'(' '{print $1}' | awk -F'=' '{print $2}'`
if [ $runas -ne 0 ] ; then
echo "$PROG: you must be root to run Continue reading
While AT&T and China Mobile contributed the lion’s share of the initial code for ONAP, others are now stepping up to contribute more. A snapshot of contributors from the second quarter of 2018 shows that Huawei, Amdocs, and ZTE, along with many others, are contributing.
Resin.io uses Linux-based containers and cloud technologies to support IoT deployments. Those efforts revolve around separating core operations of the IoT device from the application layer.
The much-touted Cisco-Ericsson partnership is languishing thanks to the executive changes at Ericsson.
By adding centralized orchestration and network automation to its Unity EdgeConnect SD-WAN, Silver Peak customers can segment their users and applications to improve security.
This Course is By Joseph Holbrook and is 4 hours and 34 minutes long. You can view the full course on our streaming Site, or buy the course at ine.com.
A blockchain is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network. Distributed to all member nodes in the network, the ledger permanently records, in a sequential chain of cryptographic hash-linked blocks, the history of asset exchanges that take place between the peers in the network. This course has been designed for technical architects, pre sales architects, developers and project managers who must make technical decisions about distributed architectures and development platforms.
While exploring some of the intricacies around the use of X.509v3 certificates in Kubernetes, I found myself wanting to be able to view the details of a certificate embedded in a kubeconfig file. (See this page if you’re unfamiliar with what a kubeconfig file is.) In this post, I’ll share with you the commands I used to accomplish this task.
First, you’ll want to extract the certificate data from the kubeconfig file. For the purposes of this post, I’ll use a kubeconfig file named config and found in the .kube subdirectory of your home directory. Assuming there’s only a single certificate embedded in the file, you can use a simple grep statement to isolate this information:
grep 'client-certificate-data' $HOME/.kube/config
Combine that with awk to isolate only the certificate data:
grep 'client-certificate-data' $HOME/.kube/config | awk '{print $2}'
This data is Base64-encoded, so we decode it (I’ll wrap the command using backslashes for readability now that it has grown a bit longer):
grep 'client-certificate-data' $HOME/.kube/config | \
awk '{print $2}' | base64 -d
You could, at this stage, redirect the output into a file (like certificate.crt) if so desired; the data you have is Continue reading
If you’re not one of the 6,000 expected attendees at DockerCon 2018 in San Francisco, don’t worry, you don’t have to miss a thing! We’ve put together a list of the Top 5 thing you can do to stay current on all things DockerCon, if you’re not attending this year.
1. Learn about the latest release – Docker Enterprise Edition (EE) 2.0
Learn about the only enterprise-ready container platform that enables IT leaders to choose how to cost-effectively build and manage their entire application portfolio at their own pace, without fear of architecture and infrastructure lock-in. Read the blog and watch the Docker EE 2.0 Launch Virtual Event with customer stories from Liberty Mutual, Franklin American Mortgage, and ADP.
2. Watch the Livesteam of the DockerCon Keynotes and Cool Hacks
Register now to see the DockerCon keynote sessions live, from where in the world you may be, on June 13th and 14th at 9AM PDT . Hear the latest Docker announcements from Steve Singh (CEO) and Scott Johnston (Chief Product Officer) and enjoy the highly technical demos of the latest innovations from the Docker team.
3. Follow the News from your peers at DockerCon
Be sure to get Continue reading
Ethernet markets grows, Cisco isn’t keeping up as new markets grow
Don't be overwhelmed by DevOps. Picking individual steps in the process makes it achievable for small businesses.
In this Network Collective podcast, hear Martin Casado talk about his work in pioneering software-defined networking.