GETTING STARTED: ANSIBLE TOWER’S API

Getting-Started-Ansible-Tower-API

Welcome to another entry in the Getting Started series. The API (Application Programming Interface) or, as I like to refer to it, the Magical Land of Automation Information, can be used in quite a few ways. In this Getting Started post, we will be discussing Red Hat Ansible Tower’s API and how you can use it to extract information to utilize in your playbooks and other tools.

The idea for this blog post came about when David Federlein was developing a new Ansible Tower demo and presentation. I will be making references to that codebase, which you can follow along with throughout this post. Please note that this demo utilizes Vagrant and VirtualBox so you’ll need to have those applications installed if you would like to stand up the demo yourself.

Ansible Tower’s API

Ansible Tower’s API is fully browsable. You can navigate to your instance’s REST API by typing this into your browser: http://<Tower server name>/api/v2. Once there, you can click any of the listed links and view the current objects loaded for that particular attribute in Ansible Tower. Everything you can do in Ansible Tower's UI can be done from the API; you can also use it Continue reading

Momentum for Bioinspired GPU Computing at the Edge

Bioinspired computing is nothing new but with the rise in mainstream interest in machine learning, these architectures and software frameworks are seeing fresh light. This is prompting a new wave of young companies that are cropping up to provide hardware, software, and management tools—something that has also spurred a new era of thinking about AI problems.

We most often think of these innovations happening at the server and datacenter level but more algorithmic work is being done (to suit better embedded hardware) to deploy comprehensive models on mobile devices that allow for long-term learning on single instances of object recognition

Momentum for Bioinspired GPU Computing at the Edge was written by Nicole Hemsoth at The Next Platform.

Team ISOC @ APRICOT 2018

Last month in Kathmandu, Nepal, 750 delegates participated in APRICOT 2018 – Asia-Pacific’s largest Internet conference. It was led by Internet Exchange Nepal (npIX) with support from several organizations including the Internet Society (ISOC) Nepal Chapter.

The Internet Society, through its Asia-Pacific Bureau, is a long-term partner of the APRICOT conferences, sponsoring a competitive fellowship programme, as part of the Internet Society’s mission to support capacity building in developing countries. Read more about our fellows at APRICOT 2018:

Meet the APRICOT 2018 Fellows

Team ISOC @ APRICOT 2018 comprised of staff from Regional Bureaus and Internet Technology. This included Andrei Robachevsky, Aftab Siddiqui, Rajnesh Singh, Salam Yamout, and myself.

In line with the Internet Society’s 2018 Action Plan, our core message at APRICOT 2018 was to strengthen the global Internet routing system and mitigate many of the risks facing the Internet’s core today. This includes route hijacking, traffic detouring, and address spoofing – which is a root cause of Distributed Denial of Service (DDOS) attacks. We promoted the Mutually Agreed Norms for Routing Security (MANRS), a set of recommendations addressing these risks, already adopted by some network operators.

Team ISOC took on a wide variety of roles Continue reading

Cumulus content roundup: April

It’s the beginning of a brand new month, and you know what that means… it’s time for the Cumulus content roundup! This month, we can’t stop talking about leveraging Linux and disaggregation — and it looks like we’re not the only ones who have white-box fever (congrats on joining the movement, Cisco)! All the webinars, videos and white papers you could ask for are included in this roundup, so grab a comfy seat and check out everything that piques your interest.

The latest from Cumulus

The S.O.U.L revolution: The era of oppressive traditional networking ends today! It’s time to add some S.O.U.L to your data center network. What does S.O.U.L stand for? Watch this video to find out and get into the movement that’s revolutionizing the way we think about networking.

Web-scale networking for telco: Cumulus Networks commissioned Heavy Reading to conduct a survey of 70+ IT leaders in the Telco and CSP space to understand what is top of mind in terms of IT priorities. Download this white paper to see what we discovered about their top concerns.

Why Linux in the data center: a fireside chat: Continue reading

Fueling AI With A New Breed of Accelerated Computing

A major transformation is happening now as technological advancements and escalating volumes of diverse data drive change across all industries. Cutting-edge innovations are fueling digital transformation on a global scale, and organizations are leveraging faster, more powerful machines to operate more intelligently and effectively than ever.

Recently, Hewlett Packard Enterprise (HPE) has announced the new HPE Apollo 6500 Gen10 server, a groundbreaking platform designed to tackle the most compute-intensive high performance computing (HPC) and deep learning workloads. Deep learning – an exciting development in artificial intelligence (AI) – enables machines to solve highly complex problems quickly by autonomously analyzing

Fueling AI With A New Breed of Accelerated Computing was written by Timothy Prickett Morgan at The Next Platform.

IDG Contributor Network: How NFV and interconnection can help you think outside the ‘box’

Networking used to be all about specialized “boxes,” but that era is fading fast.  By a specialized box, I mean a piece of hardware that was built to perform an individual function. Physical firewalls, routers, servers, load balancers, etc., are all examples of these different boxes, and they are still everywhere. But new technology is seriously disrupting the old ways of doing things.Virtualization has made it possible to separate the software functionality of all those boxes from the specific appliance-type hardware in which it resides. Network functions virtualization (NFV) software can replicate an appliance’s function in a more cost-effective commodity server, which is easy to obtain and deploy and can hold the software for numerous functions at once. People like the improved simplicity, cost, agility and speed that comes with this change.To read this article in full, please click here

IDG Contributor Network: How NFV and interconnection can help you think outside the ‘box’

Networking used to be all about specialized “boxes,” but that era is fading fast.  By a specialized box, I mean a piece of hardware that was built to perform an individual function. Physical firewalls, routers, servers, load balancers, etc., are all examples of these different boxes, and they are still everywhere. But new technology is seriously disrupting the old ways of doing things.Virtualization has made it possible to separate the software functionality of all those boxes from the specific appliance-type hardware in which it resides. Network functions virtualization (NFV) software can replicate an appliance’s function in a more cost-effective commodity server, which is easy to obtain and deploy and can hold the software for numerous functions at once. People like the improved simplicity, cost, agility and speed that comes with this change.To read this article in full, please click here

Product–services bundles boost AI

The infrastructure required to run artificial intelligence algorithms and train deep neural networks is so dauntingly complex, that it’s hampering enterprise AI deployments, experts say.“55% of firms have not yet achieved any tangible business outcomes from AI, and 43% say it’s too soon to tell,” says Forrester Research about the challenges of transitioning from AI excitement to tangible, scalable AI success.[ Check out REVIEW: VMware’s vSAN 6.6 and hear IDC’s top 10 data center predictions. | Get regularly scheduled insights by signing up for Network World newsletters. ] “The wrinkle? AI is not a plug-and-play proposition,” the analyst group says. “Unless firms plan, deploy, and govern it correctly, new AI tech will provide meager benefits at best or, at worst, result in unexpected and undesired outcomes.”To read this article in full, please click here

Product–services bundles boost AI

The infrastructure required to run artificial intelligence algorithms and train deep neural networks is so dauntingly complex, that it’s hampering enterprise AI deployments, experts say.“55% of firms have not yet achieved any tangible business outcomes from AI, and 43% say it’s too soon to tell,” says Forrester Research about the challenges of transitioning from AI excitement to tangible, scalable AI success.[ Check out REVIEW: VMware’s vSAN 6.6 and hear IDC’s top 10 data center predictions . | Get regularly scheduled insights by signing up for Network World newsletters. ] “The wrinkle? AI is not a plug-and-play proposition,” the analyst group says. “Unless firms plan, deploy, and govern it correctly, new AI tech will provide meager benefits at best or, at worst, result in unexpected and undesired outcomes.”To read this article in full, please click here

New in IPv6: Stable Random IPv6 Addresses on OpenBSD

The idea of generating random IPv6 addresses (so you cannot be tracked across multiple networks based on your MAC address) that stay stable within each subnet (so you don’t pollute everyone’s ND cache every time you open your iPad) is pretty old: RFC 7217 was published almost exactly four years ago.

Linux was quick to pick it up, OpenBSD got RFC 7127 support a few weeks ago. However, there’s an Easter egg in the OpenBSD patches that implement it: SLAAC on OpenBSD now works with any prefix length (not just /64).

Read more ...

BrandPost: SD-WAN: A Modern Approach to Connectivity for Digital Businesses

Digital transformation has crossed the chasm from visionary aspiration to practical implementation and in the process, it is disrupting technologies across the business landscape.As enterprises and governments transform their operations, many are finding their legacy wide area networks (WANs) cannot meet today’s digital-driven bandwidth demands. Rather than giving them a competitive edge and supporting business growth, their networks are stifling innovation and impeding flexibility.To address this challenge, software-defined WANs (SD-WANs) are emerging as a smart way to streamline connections among enterprise sites.Enterprise WANs are under pressure to keep pace with the cloud revolution, which plays a critical role in digital transformation. “Companies worldwide are aggressively consolidating their data centers, implementing new data models, and shifting development to agile, mobile-first, cloud-based models,” IDC Group Vice President and IT executive advisor Joseph Pucciarelli writes in the Winter 2018 Issue of CIO's Digital Magazine.To read this article in full, please click here

Using Travis CI (Continuous Integration) with GitHub

Hi ,

Am Planning to write a in detail usage of how we can leverage
Aws cloud - ansible - github - travis-(ci/cd) with in our networking 
deployment space. As of now, I will quickly author how you can 
leverage the usage of Travis CI in our 
experimental space. 

You can find more about Travis CI - Here - .org of travis will 
help to run Opensource Projects 

https://travis-ci.org/

I am using AWS cloud desktop to do the changes to the code, 
get it pushed to git-hub and then integrate everything 
if Travis CI passes the checks 

To let you know the workflow in a very simpler way 

-> You write any code or config related to networks on AWS cloud 
desktop
-> push the code into git-hub in a branch later to be integrated 
into Master Branch
-> Setup Travis to automatically run some pre-defined tests 
-> If all successful, we will merge the code into our master branch 

-> Lets write a very basic code in a branch and push to git-hub 

 




The github page has been integrated with Travis-CI 

 




Travis CI peforms the required checks, here it just 
checks for syntax, obvious this can be exetended  Continue reading

Wireless ESSID as ROT13 Ciphertext

Recently, I have scanned nearby wireless networks with airodump. I have discovered five networks transmitting on channel 3. MAC addresses of access points (BSSIDs) transmitting on channel 3 differ only in last two hexa digits and a signal level (PWR) reported by my WiFi card is almost same for all BSSIDs.

$ sudo airodump-ng wlp3s0

Picture 1 - Wireless Networks of Caffe Geo Guru

The following three ESSIDs have caught my attention.

1) Heslo do siete caffe.geo.guru
2) zistis rozlustenim sifry
3) qnw fv qboer cvib

In fact, the ESSIDs represent a cryptography challenge created for customers of caffe.geo.guru. Once the challenge is successfully solved a customer gains a password for connection to the wireless network with ESSID caffe.geo.guru.

Note: The first two ESSID are written in Slovak. Their English version is below.

1) Password to network caffe.geo.guru
2) can be gained by decoding words
3) qnw fv qboer cvib

The third ESSID represents an encoded password. Obviously, letters are substituted in ciphertext which let us to the assumption that ROT cipher is used. Using ROT13 cipher on the encoded text 'qnw fv qboer cvib' gives us a required plain-text password Continue reading

Wireless ESSID as ROT13 Ciphertext

Recently, I have scanned nearby wireless networks with airodump. I have discovered five networks transmitting on channel 3. MAC addresses of access points (BSSIDs) transmitting on channel 3 differ only in last two hexa digits and a signal level (PWR) reported by my WiFi card is almost same for all BSSIDs.

$ sudo airodump-ng wlp3s0

Picture 1 - Wireless Networks of Caffe Geo Guru

The following three ESSIDs have caught my attention.

1) Heslo do siete caffe.geo.guru
2) zistis rozlustenim sifry
3) qnw fv qboer cvib

In fact, the ESSIDs represent a cryptography challenge created for customers of caffe.geo.guru. Once the challenge is successfully solved a customer gains a password for connection to the wireless network with ESSID caffe.geo.guru.

Note: The first two ESSID are written in Slovak. Their English version is below.

1) Password to network caffe.geo.guru
2) can be gained by decoding words
3) qnw fv qboer cvib

The third ESSID represents an encoded password. Obviously, letters are substituted in ciphertext which let us to the assumption that ROT cipher is used. Using ROT13 cipher on the encoded text 'qnw fv qboer cvib' gives us a required plain-text password Continue reading