VMware's Guido Appenzeller joins Ethan and Greg on this sponsored Priority Queue podcast to talk about NSX's capabilities beyond the data center, including containers, the cloud, mobile devices, and more.
The post PQ Show 67: VMware NSX Everywhere With Guido Appenzeller (Sponsored) appeared first on Packet Pushers.
VMware's Guido Appenzeller joins Ethan and Greg on this sponsored Priority Queue podcast to talk about NSX's capabilities beyond the data center, including containers, the cloud, mobile devices, and more.
The post PQ Show 67: VMware NSX Everywhere With Guido Appenzeller (Sponsored) appeared first on Packet Pushers.
ONOS has done a ton of coding in just one year.
Why choose, if you can have both? Today CloudFlare is introducing HTTP/2 support for all customers using SSL/TLS connections, while still supporting SPDY. There is no need to make a decision between SPDY or HTTP/2. Both are automatically there for you and your customers.
If you are a customer on the Free or Pro plan, there is no need to do anything at all. Both SPDY and HTTP/2 are already enabled for you. With this improvement, your website’s audience will always use the fastest protocol version when accessing your site over TLS/SSL.
Customers on Business and Enterprise plans may enable HTTP/2 within the "Network" application of the CloudFlare Dashboard.
In February of 2015, the IETF’s steering group for publication as standards-track RFCs approved the HTTP/2 and associated HPACK specifications.
After more than 15 years, the Hypertext Transfer Protocol (HTTP) received a long-overdue upgrade. HTTP/2 is largely based on Google's experimental SPDY protocol, which was first announced in November 2009 as an internal project to increase the speed of the web.
The main focus of both SPDY and HTTP/2 is on performance, especially latency as perceived by the end-user while using Continue reading
ACI plays nice with VMware and Microsoft virtual switches.
I am searching in a series of large Redback config files for certain things, and I’m beginning to find Regex and Atom really powerful for this. The files are sometimes 20,000 lines long, and there are over 100 of them.
Of course I should script this, and someone more script savvy than me would do that in a trice, but I’ve come up with a part manual solution. Perhaps I will build it into a script later.
What I need to do is search each file for any ‘ip route’ commands that have a named interface as a next-hop rather than an IP address. So to do this, I am doing inverse-matching on four sets of numbers separated by dots.
I also need to exclude the keyword ‘context’ and the interface ‘null0’. This took me a while to figure out.
Here’s my pattern match:
ip route [0-9]+.[0-9]+.[0-9]+.[0-9]+/[0-9]+ (?![0-9]+.[0-9]+.[0-9]+.[0-9]+|context|null0)
This matches the string:
ip route 172.21.0.0/16 MADEUPINTERFACE
But not:
ip route 172.16.4.0/24 10.0.0.1
The expression is not very accurate, since it could match IP addresses like 999.999.999.999, but that does not matter in Continue reading
Marek Majkowski published an awesome real-life story on CloudFlare blog: users experienced occasional short-term sluggish performance and while everything pointed to a network problem, it turned out to be a garbage collection problem in Linux kernel.
Takeaway: It might not be the network's fault.
Also: How many people would be able to troubleshoot that problem and fix it? Technology is becoming way too complex, and I don’t think software-defined-whatever is the answer.
On this week's show we're chatting with Kevin Finisterre about Silverpush -- the creepy ultrasonic audio-beaconing technology used by advertising companies that was in the press a couple of weeks ago. Kevin was all over it and he joins me to discuss the growing overlap between the techniques used by marketers and blackhats.