Google: Addressing Cascading Failures

Like the Spanish Inquisition, nobody expects cascading failures. Here's how Google handles them.

This excerpt is a particularly interesting and comprehensive chapter—Chapter 22 - Addressing Cascading Failures—from Google's awesome book on Site Reliability Engineering. Worth reading if it hasn't been on your radar. And it's free!

If at first you don't succeed, back off exponentially."

Dan Sandler, Google Software Engineer

Why do people always forget that you need to add a little jitter?"

Ade Oshineye, Google Developer Advocate

A cascading failure is a failure that grows over time as a result of positive feedback.107 It can occur when a portion of an overall system fails, increasing the probability that other portions of the system fail. For example, a single replica for a service can fail due to overload, increasing load on remaining replicas and increasing their probability of failing, causing a domino effect that takes down all the replicas for a service.

We’ll use the Shakespeare search service discussed in Shakespeare: A Sample Service as an example throughout this chapter. Its production configuration might look something like Figure 22-1.

Example production configuration for the Shakespeare search service.Figure 22-1. Example production configuration for the Shakespeare search service

Causes of Cascading Failures and Designing to Avoid Them

Continuing Support for the Work of the IETF

The Internet Engineering Task Force (IETF) has been working recently to update its administrative arrangements to match the changing requirements it faces as the premiere Internet standards organization.

It has been more than a decade since the IETF became an organized activity of the Internet Society. Given the changes in the world and the Internet in the intervening time, it is natural to reconsider how to most effectively organize and implement its administrative structure. The Internet Society Board of Trustees supports the IETF in this work, and has set aside funding for this purpose. Internet Society staff are prepared to help implement the changes required.

Aspects of the mutual relationship between the Internet Society and the IETF, such as the role of the Internet Society in the standards appeal process, the confirmation of the Internet Architecture Board (IAB) members by the Internet Society’s Board of Trustees, and four members of the Internet Society’s Board of Trustees being appointed by the IAB on the IETF’s behalf, are not subject to change.

Both the Internet Society and IETF will benefit from an updated administrative structure for the IETF that continues to provide a solid foundation for the development of open standards for the global Internet.

The post Continuing Support for the Work of the IETF appeared first on Internet Society.

Docker for Desktop is Certified Kubernetes

Certified KubernetesCertified Kubernetes

“You are now Certified Kubernetes.” With this comment, Docker for Windows and Docker for Mac passed the Kubernetes conformance tests. Kubernetes has been available in Docker for Mac and Docker for Windows since January, having first being announced at DockerCon EU last year. But why is this important to the many of you who are using Docker for Windows and Docker for Mac?

Kubernetes is designed to be a platform that others can build upon. As with any similar project, the risk is that different distributions vary enough that applications aren’t really portable. The Kubernetes project has always been aware of that risk – and this led directly to forming the Conformance Working Group. The group owns a test suite that anyone distributing Kubernetes can run, and submit the results for to attain official certification. This test suite checks that Kubernetes behaves like, well, Kubernetes; that the various APIs are exposed correctly and that applications built using the core APIs will run successfully. In fact, our enterprise container platform, Docker Enterprise Edition, achieved certification using the same test suite  You can find more about the test suite at https://github.com/cncf/k8s-conformance.

This is important for Docker for Windows and Docker for Continue reading

Datanauts 131: Masters And Mentorship

Today on the Datanauts podcast, we land on planet Mentorship to drive around in our exploratory rovers. Why? Mentoring came up on Twitter a while back.

Some of you are for it. You invest in your co-workers and your organization by sharing with others what you know. Some of you are against mentoring, arguing that you don t have the time and aren t getting paid to teach other people.

And then the Twitterverse connected us to Don Jones, who wrote a book called, Be The Master. Seems like a great excuse to fire up the microphone on our rovers and explore planet Mentorship in more detail.

Besides being an author, Don is an an IT pro and PowerShell expert who has created a variety of PowerShell training materials.

We talk about how a master/apprenticeship approach can be more effective than formal education, selfish reasons for being a mentor, how to address imposter syndrome, and how to get support for mentorship at work.

Show Links:

Don Jones.com

Be The Master.com

Don Jones on Twitter

Become The Master Or Go Away – Don Jones.com

Be the Master with Don Jones – RunAsRadio

The post Datanauts 131: Masters Continue reading

History Of Networking – Tony Przygienda – History of BIER

In this History of Networking episode Tony Przygienda joins us to discuss his involvement in the origins of BIER (Bit Index Explicit Replication). BIER is a new take on an old problem, the efficient forwarding of point-to-multipoint (multicast) traffic.

 

Tony Przygienda
Guest
Russ White
Host
Donald Sharp
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post History Of Networking – Tony Przygienda – History of BIER appeared first on Network Collective.

Cyxtera offers on-demand data center provisioning software

Cyxtera Technologies has launched the Cyxtera Extensible Data Center (CXD) platform, a software platform for data centers that offers customers rapid on-demand provisioning to a host of colocation and connectivity services.Through a combination of a network and services provisioning engine and an intra-data center software-defined network fabric, the CXD platform allows colocation customers to provision services on demand or via a web console.CXD brings cloud-like experience to colocation CXD comes with two key features: the Unified Services Port and Network Exchange. The Unified Services Port enables access to multiple data center services over a single physical port, while the Network Exchange provides automated provisioning to select network service providers. The caveat is they must also be running CXD.To read this article in full, please click here

Cyxtera offers on-demand data center provisioning software

Cyxtera Technologies has launched the Cyxtera Extensible Data Center (CXD) platform, a software platform for data centers that offers customers rapid on-demand provisioning to a host of colocation and connectivity services.Through a combination of a network and services provisioning engine and an intra-data center software-defined network fabric, the CXD platform allows colocation customers to provision services on demand or via a web console.CXD brings cloud-like experience to colocation CXD comes with two key features: the Unified Services Port and Network Exchange. The Unified Services Port enables access to multiple data center services over a single physical port, while the Network Exchange provides automated provisioning to select network service providers. The caveat is they must also be running CXD.To read this article in full, please click here

BGP Hijack of Amazon DNS to Steal Crypto Currency

Yesterday morning we posted a tweet (below) that Amazon’s authoritative DNS service had been impacted by a routing (BGP) hijack.  Little did we know this was part of an elaborate scheme to use the inherent security weaknesses of DNS and BGP to pilfer crypto currency, but that remarkable scenario appears to have taken place.

After posting the hijack tweet, I observed reports of a DNS hijack relating to the cryptocurrency website myetherwallet.com and thought the two things might be related:

Sure enough, it appears that eNet/XLHost (AS10297) suffered a breach enabling attackers to impersonate Amazon’s authoritative DNS service.  These attackers used AS10297 to announce five routes used by Amazon’s DNS:


205.251.192.0/24 Amazon.com, Inc.
205.251.193.0/24 Amazon.com, Inc.
205.251.195.0/24 Amazon.com, Inc.
205. Continue reading

IDG Contributor Network: Hello, cellular IoT

The Internet of Things (IoT) is an overused buzz phrase, but hype is finally giving way to some valuable IoT use cases. In 2017, 433.1 million smart home devices were shipped worldwide, according to IDC. Smart speakers are leading the way, and smart locks, fridges, thermostats, pet food dishes and more have become part of our daily, connected lives.What would I do without my smart egg tray?While there are plenty of smart “fill-in-the-blank” devices, the IoT still has some growing up to do. Battery life and standards still present significant challenges, and not all smart devices get along. The good news is, high-performance RF filters are providing faster data throughput, minimizing energy losses and extending battery life. Imagine a world where sensors need a charge only once in a decade?To read this article in full, please click here

Juniper multicloud management software targets enterprise data centers

Facing the reality that many enterprise data-center managers now work in a hybrid cloud environment, Juniper Networks is set to release Contrail Enterprise Multicloud, a software package designed to monitor and manage workloads and servers deployed across networking and cloud infrastructure from multiple vendors.Enterprises are moving to the cloud for operational efficiency and cost optimization, but at the moment most big companies are operating hybrid environments, which has added to the complexity of managing computing infrastructure.[ Check out What is hybrid cloud computing and learn what you need to know about multi-cloud. | Get regularly scheduled insights by signing up for Network World newsletters. ] Juniper is competing with a variety of networking and multicloud orchestration tools from major data center players, including VMware's NSX, Cisco's ACI, and HPE's OneSphere. What's more, Juniper does not have as big a presence in the data center as some of its rivals, particularly Cisco.To read this article in full, please click here

Juniper multicloud management software targets enterprise data centers

Facing the reality that many enterprise data-center managers now work in a hybrid cloud environment, Juniper Networks is set to release Contrail Enterprise Multicloud, a software package designed to monitor and manage workloads and servers deployed across networking and cloud infrastructure from multiple vendors.Enterprises are moving to the cloud for operational efficiency and cost optimization, but at the moment most big companies are operating hybrid environments, which has added to the complexity of managing computing infrastructure.[ Check out What is hybrid cloud computing and learn what you need to know about multi-cloud. | Get regularly scheduled insights by signing up for Network World newsletters. ] Juniper is competing with a variety of networking and multicloud orchestration tools from major data center players, including VMware's NSX, Cisco's ACI, and HPE's OneSphere. What's more, Juniper does not have as big a presence in the data center as some of its rivals, particularly Cisco.To read this article in full, please click here

Juniper multicloud management software targets enterprise data centers

Facing the reality that many enterprise data-center managers now work in a hybrid cloud environment, Juniper Networks is set to release Contrail Enterprise Multicloud, a software package designed to monitor and manage workloads and servers deployed across networking and cloud infrastructure from multiple vendors.Enterprises are moving to the cloud for operational efficiency and cost optimization, but at the moment most big companies are operating hybrid environments, which has added to the complexity of managing computing infrastructure.[ Check out What is hybrid cloud computing and learn what you need to know about multi-cloud. | Get regularly scheduled insights by signing up for Network World newsletters. ] Juniper is competing with a variety of networking and multicloud orchestration tools from major data center players, including VMware's NSX, Cisco's ACI, and HPE's OneSphere. What's more, Juniper does not have as big a presence in the data center as some of its rivals, particularly Cisco.To read this article in full, please click here

Espresso: brewing Java for more non-volatility with non-volatile memory

Espresso: brewing Java for more non-volatility with non-volatile memory Wu et al., ASPLOS’18

What happens when you introduce non-volatile memory (NVM) to the world of Java? In theory, with a heap backed by NVM, we should get persistence for free? It’s not quite that straightforward of course, but Espresso gets you pretty close. There are a few things to consider, for example:

  • we probably don’t want all of our objects backed by persistent memory, as it still has higher latency than DRAM
  • we don’t want to make intrusive changes to existing code, and ideally would be able to continue using JPA (but why go through an expensive ORM mapping if we’re not targeting a relational store?)
  • we need to ensure any persistent data structures remain consistent after a crash

Espresso adds a new type of heap, a persistent Java heap (PJH) backed by NVM, and a persistent Java object (PJO) programming abstraction which is backwards compatible with JPA. PJO gives a 3.24x speedup even over JPA backed by H2.

JPA, PCJ, and NVM

JPA is the standard Java Persistence API. Java classes are decorated with persistence annotations describing their mapping to an underlying relational database. It’s an Continue reading