One of my readers wanted to use EIBGP (hint: wrong tool for this particular job1) to load balance outgoing traffic from a pair of WAN edge routers. He’s using a design very similar to this one with VRRP running between WAN edge routers, and the adjacent firewall cluster using a default route to the VRRP IP address.
The problem: all output traffic goes to the VRRP IP address which is active on one of the switches, and only a single uplink is used for the outgoing traffic.
In this archived keynote session, vCISO Adam Gordon delivers a presentation during our 'Network Resilience Boot Camp' presented by Data Center Knowledge and Network Computing. This excerpt is from our live 'Network Resilience Boot Camp' virtual event moderated by Bonnie D. Graham on June 29, 2023.
On today's Kubernetes Unpacked, Michael and Kristina catch up with Roberth Strand, Principal Cloud Engineer at Amesto Fortytwo to talk about all things Internal Developer Platform (IDP) on Kubernetes and beyond. Roberth dives into what an IDP is, what it isn’t, and how all engineers should be thinking about IDPs. If you’re interested in diving into platform engineering, this is the perfect episode for you.
On today's Kubernetes Unpacked, Michael and Kristina catch up with Roberth Strand, Principal Cloud Engineer at Amesto Fortytwo to talk about all things Internal Developer Platform (IDP) on Kubernetes and beyond. Roberth dives into what an IDP is, what it isn’t, and how all engineers should be thinking about IDPs. If you’re interested in diving into platform engineering, this is the perfect episode for you.
Toyota assembly plants across Japan shut down for about a day last week due to a malfunction following routine maintenance. Insufficient disk space in servers used to process parts orders caused the systems to become unavailable, according to the automaker.Toyota this week provided the cause of the production system outage and reassured customers and partners that the company did not suffer from a cyberattack, but rather a lack of disk space across some of the servers in its production order system. The malfunction suspended operations at some 14 plants in Japan. (Read more about the biggest outages of the year)To read this article in full, please click here
Toyota assembly plants across Japan shut down for about a day last week due to a malfunction following routine maintenance. Insufficient disk space in servers used to process parts orders caused the systems to become unavailable, according to the automaker.Toyota this week provided the cause of the production system outage and reassured customers and partners that the company did not suffer from a cyberattack, but rather a lack of disk space across some of the servers in its production order system. The malfunction suspended operations at some 14 plants in Japan. (Read more about the biggest outages of the year)To read this article in full, please click here
Toyota assembly plants across Japan shut down for about a day last week due to a malfunction following routine maintenance. Insufficient disk space in servers used to process parts orders caused the systems to become unavailable, according to the automaker.Toyota this week provided the cause of the production system outage and reassured customers and partners that the company did not suffer from a cyberattack, but rather a lack of disk space across some of the servers in its production order system. The malfunction suspended operations at some 14 plants in Japan. (Read more about the biggest outages of the year)To read this article in full, please click here
Year after year network engineering media, vendors, and influencers talk about the importance of network automation—and yet according to surveys, most network operators still have not automated their network operations. In this episode of the Hedge, part 2 of 2, Chris Grundemann and Scott Robohn join the Hedge to give their ideas on why network automation isn’t happening, and how we can resolve the many blockers to automation.
Netskope this week acquired digital experience monitoring firm Kadiska in a move that the SASE provider says will expand Netskope’s DEM capabilities for networking and infrastructure professionals who need greater visibility across their SD-WAN, secure service edge, and cloud environments.“The founding vision of Kadiska matches uncannily well with the Netskope platform vision. Both technologies have been built to recognize the new world where data, users, cloud infrastructure, and applications are all dispersed, leaving blind spots and challenges for organizations seeking to control and optimize experience and security,” said Sanjay Beri, CEO and co-founder of Netskope said in a statement. “We already share some very large global customers and seeing the appetite for integration—bringing together the capabilities of both companies—really proved to use the rationale for this acquisition.”To read this article in full, please click here
Netskope this week acquired digital experience monitoring firm Kadiska in a move that the SASE provider says will expand Netskope’s DEM capabilities for networking and infrastructure professionals who need greater visibility across their SD-WAN, secure service edge, and cloud environments.“The founding vision of Kadiska matches uncannily well with the Netskope platform vision. Both technologies have been built to recognize the new world where data, users, cloud infrastructure, and applications are all dispersed, leaving blind spots and challenges for organizations seeking to control and optimize experience and security,” said Sanjay Beri, CEO and co-founder of Netskope said in a statement. “We already share some very large global customers and seeing the appetite for integration—bringing together the capabilities of both companies—really proved to use the rationale for this acquisition.”To read this article in full, please click here
In August, I attended VMware Explore Las Vegas. I always enjoy interacting with our customers and partners, and this year was no exception. The show was fantastic, energy was high, and excitement was rampant with a wide range of innovations that brought enhanced simplicity, security and agility for our customer IT environments.
Explore 2023 was a whirlwind of activity. I spoke to hundreds of attendees throughout my four days! Now that I’m back, I’ve had some time to reflect on all things Explore. Here are my top observations from the week:
1. VMware has simplified the adoption of the cloud, strengthening the private cloud stack and expanding our multi-cloud offering
It was gratifying to hear customer commentary on the richness of the VMware private cloud stack and the innovations we’ve brought about to create consistency across a multi-cloud deployment. The broad array of innovations across multiple business units reflected the deep customer focus we have coupled with reducing the friction for consumption.That’s
This has made it simpler for customers to engage with VMware solutions than dealing with 4-5 other vendors to stitch together their stack for the cloud, which leads to complexity and cost escalations and prolongs proof of Continue reading
In this Linux tip, we’re going to look at an easy way to avoid saving commands in your command history. The first thing you need to do is set your HISTCONTROL variable to ignore commands that you enter followed by a space by using the “ignorespace” setting.
In today's IPv6 Buzz podcast, Ed, Scott, and Tom bring Nick Buraglio back on to the show to discuss IPv6 Unique Local Addressing and the latest activity at the IETF to attempt to address both protocol and operational challenges associated with RFC 6724.
In today's IPv6 Buzz podcast, Ed, Scott, and Tom bring Nick Buraglio back on to the show to discuss IPv6 Unique Local Addressing and the latest activity at the IETF to attempt to address both protocol and operational challenges associated with RFC 6724.
Data continues to explode in volume, variety, and velocity, and security teams at organizations of all sizes are challenged to keep up. Businesses face escalating risks posed by varied SaaS environments, the emergence of generative artificial intelligence (AI) tools, and the exposure and theft of valuable source code continues to keep CISOs and Data Officers up at night.
Over the past few years, Cloudflare has launched capabilities to help organizations navigate these risks and gain visibility and controls over their data — including the launches of our data loss prevention (DLP) and cloud access security broker (CASB) services in the fall of 2022.
Announcing Cloudflare One’s data protection suite
Today, we are building on that momentum and announcing Cloudflare One for Data Protection — our unified suite to protect data everywhere across web, SaaS, and private applications. Built on and delivered across our entire global network, Cloudflare One’s data protection suite is architected for the risks of modern coding and increased usage of AI.
In the announcement post, we focused on how the data protection suite helps customers navigate modern data risks, with recommended use cases and real-world customer examples.
In this companion blog post, we recap the capabilities built into the Cloudflare One suite over the past year and preview new functionality that customers can look forward to. This blog is best for practitioners interested in protecting data and SaaS environments using Cloudflare One.
DLP & CASB capabilities launched in the past year
Cloudflare launched both DLP and CASB services in September 2022, and since then have rapidly built functionality to meet the growing needs of our organizations of all sizes. Before previewing how these services will evolve, it is worth recapping the many enhancements added Continue reading
Talking about BGP routing policy mechanisms is nice, but it’s even better to see how real Internet Service Providers use those tools to implement real-life BGP routing policy.
Getting that information is incredibly hard as everyone considers their setup a secret sauce. Fortunately, there are a few exceptions; Pim van Pelt described the BGP Routing Policy of IPng Networks in great details. The article is even more interesting as he’s using Bird2 configuration language that looks almost like a programming language (as compared to the ancient route-maps used by vendors focused on “industry-standard” CLI).
Talking about BGP routing policy mechanisms is nice, but it’s even better to see how real Internet Service Providers use those tools to implement real-life BGP routing policy.
Getting that information is incredibly hard as everyone considers their setup a secret sauce. Fortunately, there are a few exceptions; Pim van Pelt described the BGP Routing Policy of IPng Networks in great details. The article is even more interesting as he’s using Bird2 configuration language that looks almost like a programming language (as compared to the ancient route-maps used by vendors focused on “industry-standard” CLI).