JUNIPER NORTHSTAR UPGRADE 2.1 TO 3.0

In this post, I’m quickly going to describe how to upgrade NorthStar 2.1 to 3.0. For a detailed installation and user guide refer to the 3.0 release notes here.

Firstly, let’s start off by verifying the current host OS and NorthStar versions. Note. NorthStar 3.0 requires a minimum of Centos 6.7 or above.

[root@northstar ~]# cat /etc/redhat-release
CentOS release 6.9 (Final)

To check the current version of NorthStar, navigate to the about section via the drop down menu located at the top right of the GUI

northstar-about

Download NorthStar, Extract & Copy:

Download the NorthStar 3.0 application from Juniper.net NorthStar download page. Once downloaded, extract the RPM and copy to your host machine. Below I have copied the NorthStar-Bundle-3.0.0-20170630_141113_70366_586.x86_64.rpm to the /root/rpms/ directory.

[root@northstar ~]# ls /root/rpms/ -l
total 3843976
-rw-r–r–. 1 root root 881371892 Mar 11 2016 NorthStar-Bundle-2.0.0-20160311_005355.x86_64.rpm
-rw-r–r– 1 root root 856402720 Jul 11 2016 NorthStar-Bundle-2.1.0-20160710_201437_67989_360.x86_64.rpm
-rw-r–r– 1 root root 2148942508 Jun 30 19:24 NorthStar-Bundle-3.0.0-20170630_141113_70366_586.x86_64.rpm
-rw-r–r– 1 root root 21878016 Dec 28 2016 NorthStar-Patch-2.1.0-sp1.x86_64.rpm
-rw-r–r–. 1 root root 27610536 Mar 11 Continue reading

Beware of companies claiming products have AI capabilities

Software companies are exploiting the current artificial intelligence (AI) craze by exaggerating the scope and capabilities of AI in their products, according to a report from Gartner. Gartner tracks product marketing hype with a tool it calls the Hype Cycle, measuring the growth and decline of products as they mature. It calls the process of overhyping AI "AI washing," similar to the way the term “greenwashing” was used to describe exaggerated claims of environmental-friendliness in various products or practices. Gartner said more than 1,000 vendors say their products employ AI, but many are "applying the AI label a little too indiscriminately." And it has happened fast.To read this article in full or to leave a comment, please click here

Context From The People

Are you ready for the flood of context-based networking solutions? If not, it’s time to invest in sandbags. After the launch of Cisco’s Intuitive Network solution set at Cisco Live, the rest of the context solutions are coming out to play. Granted, some of them are like Apstra and have been doing this for a while. Others are going to be jumping on the bandwagon of providing a solution that helps with context. But why are we here and why now?

Creating Context

The truth is that we’ve had context in the network for decades now. It’s not a part number that we can order from a vendor. It’s not a command that we type into the CLI to activate. In fact, it’s nothing that you can see at all right now, unless there’s a mirror handy.

The context in networks has been provided by people for as far back as anyone can remember. You do it every day without consciously realizing it. You interpret error messages and disregard those that aren’t important. People know how to program VLANs correctly to segment traffic in certain ways. Security context, application context, and more are delivered by breathing, thinking humans.

We have Continue reading

Stuff The Internet Says On Scalability For July 21st, 2017

Hey, it's HighScalability time:

Afraid of AI? Fire ants have sticky pads so they can form rafts, build towers, cross streams, & order takeout. We can CRISPR these guys to fight Skynet. (video, video, paper)

If you like this sort of Stuff then please support me on Patreon.

 

  • 222x: Bitcoin less efficient than a physical system of metal coins and paper/fabric/plastic; #1: Python use amongst Spectrum readers; 3x: time spent in apps that don't make us happy; 1 million: DigitalOcean users; 11.6 million: barrels of oil a day saved via tech and BigData; 200,000: cores on Cray super computer;$200B: games software/hardware revenue by 2021; $3K: for 50 Teraflops AMD Vega Deep Learning Box; 24.4 Gigawatts: China New Solar In First Half Of 2017; 

  • Quotable Quotes:
    • sidlls: I think instead there is a category error being made: that CS is an appropriate degree (on its own) to become a software engineer. It's like suggesting a BS in Physics qualifies somebody to work as an engineer building a satellite.
    • Elon Musk: AI is a fundamental existential risk for human civilization, and I don’t think people fully appreciate that

Docker Community Spotlight: Adina-Valentina Radulescu

Adina-Valentina Radulescu, a DevOps/Integration Engineer for Pentalog Romania, has been organizing meetups for not one but two meetup groups.

In February of last year, Adina founded Docker Brasov and Docker Timisoara, and has since done an amazing job creating and fostering a sense of belonging in her community. This month, we’re happy to shine the community spotlight on Adina to learn more about her Docker story.

Tell us about your first experience with Docker.

The first time I heard about Docker was back in 2014. I played around with Docker and I was impressed with the simplicity of integration so I wanted to learn more. I was able to attend DockerCon EU in 2015 in Barcelona where I completed some labs and attended the talks to learn as much as I could about Docker. It was a powerful feeling.

Why did you start Docker Brasov and Docker Timisoara?

I wanted to have a Docker sharing exchange experience when I get back in Romania. I relocated from Timisoara to a beautiful mountain city, Brasov. In Timisoara, I knew people and companies. In Brasov, I knew almost no one. This is why I decided to start the two groups so I Continue reading

OSPF Show Commands : Cisco, Juniper, Huawei, HP and Arista Networks

I am going to talk about the OSPF show commands in this article on different vendors which includes Cisco, Juniper, Huawei, HP and Arista Networks. These commands are working as per the device you have. Please let me know if you knew any other commands in general for OSPF in different platforms which includes Cisco, Juniper, Huawei, HP and Arista Networks.

Fig 1.1- Sample OSPF topology

Above is the sample topology and below are the sample OSPF show commands which will help you to troubleshoot OSPF in your network for the various platforms

Cisco OSPF show Commands
ttlbits@cisco#sh ip ospf
ttlbits@cisco#sh ip ospf data
ttlbits@cisco#sh ip ospf database database-summary
ttlbits@cisco#sh ip ospf neighbor
ttlbits@cisco#sh ip ospf nei det
ttlbits@cisco#sh ip ospf int
ttlbits@cisco#sh ip ospf virtual-links
ttlbits@cisco#sh ip ospf database self-originate
ttlbits@cisco#sh ip ospf adv-router X.X.X.X

ttlbits@cisco#sh ip ospf stat

Juniper OSPF show Commands
ttlbits@juniper> show ospf route
ttlbits@juniper> show ospf route detail
ttlbits@juniper> show ospf route extensive
ttlbits@juniper> show ospf3 route detail
ttlbits@juniper> show ospf route topology voice
ttlbits@juniper> show ospf database
ttlbits@juniper> show ospf database detail
ttlbits@juniper> show ospf database extensive
ttlbits@juniper> show ospf Continue reading

How to use Cloudflare for Service Discovery

Cloudflare runs 3,588 containers, making up 1,264 apps and services that all need to be able to find and discover each other in order to communicate -- a problem solved with service discovery.

You can use Cloudflare for service discovery. By deploying microservices behind Cloudflare, microservices’ origins are masked, secured from DDoS and L7 exploits and authenticated, and service discovery is natively built in. Cloudflare is also cloud platform agnostic, which means that if you have distributed infrastructure deployed across cloud platforms, you still get a holistic view of your services and the ability to manage your security and authentication policies in one place, independent of where services are actually deployed.

How it works

Service locations and metadata are stored in a distributed KV store deployed in all 100+ Cloudflare edge locations (the service registry).

Services register themselves to the service registry when they start up and deregister themselves when they spin down via a POST to Cloudflare’s API. Services provide data in the form of a DNS record, either by giving Cloudflare the address of the service in an A (IPv4) or AAAA (IPv6) record, or by providing more metadata like transport protocol and port in an SRV record.

Continue reading