kubernetes + opencontrail install

In this post we walk through the steps required to install a 2 node cluster running kubernetes that uses opencontrail as the network provider. In addition to the 2 compute nodes, we use a master and a gateway node. The master runs both the kubernetes api server and scheduler as well as the opencontrail configuration management and control plane.

OpenContrail implements an overlay network using standards based network protocols:

This means that, in production environments, it is possible to use existing network appliances from multiple vendors that can serve as the gateway between the un-encapsulated network (a.k.a. underlay) and the network overlay. However for the purposes of a test cluster we will use an extra node (the gateway) whose job is to provide access between the underlay and overlay networks.

For this exercise, I decided to use my MacBookPro which has 16G of RAM. However all the tools used are supported on Linux also; it should be relativly simple to reproduce the same steps on a Linux machine or on a cloud such as AWS or GCE.

The first step Continue reading

What’s up with Google Fiber?

Let’s face it: when it comes to Internet connectivity, there’s no such thing as “too fast.” And optical fiber is the only choice for connectivity that exceed 1,000 Mbps, aka Gigabit Internet. Optical fiber provides higher bandwidths – download speeds 40 times faster and upload speeds more than 300 times faster than garden variety broadband – and spans much longer distances than electrical cabling. And some companies, such as Bell Labs, Cisco and Comcast are claiming that their new "fiber optic" services (when eventually installed) will be 10 times faster than Google. In the meantime, Google Fiber is the hottest ticket in town, and it's popping up in municipalities all over America. It started in Kansas City during the summer of 2012 -- followed by Austin, Texas and Provo, Utah in 2014. And on the official Google Fiber team blog, director of Fiber Expansion Jill Szuchmacher noted that Google is in the process of designing the San Antonio network, and construction has started in Atlanta, Nashville, Charlotte and Raleigh-Durham, N.C., and Salt Lake City. To read this article in full or to leave a comment, please click here

How to recognize an online fraudster

What makes an online fraudster? Can you tell by looking at their age? Gender? Billing address? When they shop? The answer is both yes and no, according to a recent report called "The United States of Fraud," produced Sift Science, a fraud detection and prevention software company. They identified factors including age, billing address, shipping address and purchase value that are more likely to signal fraud. This is especially important given the U.S.'s ongoing shift to EMV credit cards. With cards being harder to clone to then use in-store, fraudsters are predicted to shift their efforts online. "EMV technology makes it so much more difficult to duplicate a physical credit card," says Jason Tan, CEO and co-founder of Sift Science. "They're still looking to make their money, and doing their business online is a lucrative channel because it's scalable and anonymous."  To read this article in full or to leave a comment, please click here

Vizio tracks what 10 million smart TV owners’ watch, sells data to advertisers

If you are looking for a good deal, then Black Friday is generally a smart time to buy a TV. For example, Vizio is one of the most popular brands and there are dozens of Vizio TVs showing up in leaked Black Friday ads; but good luck finding one that isn’t “smart.”In the case of Vizio, smart equals spying. So before you jump on a steal of a deal – or if you already own a Vizio smart TV – then you need to know that Vizio is tracking your viewing habits and sharing it with advertisers so you can be tracked across your phone and other devices.Samsung and LG have previously been involved in smart TV spying scandals, but the companies now track users’ viewing habits if customers turn on the feature. “Vizio’s actions,” according to a ProPublica investigation, “appear to go beyond what others are doing in the emerging interactive television industry…. Vizio appears “to provide the information in a form that allows advertisers to reach users on other devices.”To read this article in full or to leave a comment, please click here

$400K award at stake as Japan Prize Foundation hunts for Electronics, Information and Communication stars

Japan Prize Foundation The Japan Prize medal The Japan Prize Foundation announced this week that it has begun the process of finding nominees for its 2017 awards, which will honor outstanding achievements in the fields of “Electronics, Information and Communication” and “Life Science.” Winners receive a certificate of merit and medal, plus a none-too-shabby monetary award of 50 million yen ($407K US dollars).To read this article in full or to leave a comment, please click here

Internet Returns to Aleppo, Syria

Syria_Blobby_Control_Map_22_MAY_15_HIGH-01.0

In the past week, we have detected the first signs of the Internet returning to Syria’s largest city, Aleppo.  Internet service in this part of the country was knocked out on March 24 — over seven months ago.  Internet connectivity, and the lack of it, has been a continuing subplot to this bloody civil war well into its fifth year.

178.253.99.0_24-2

A notable difference with the restored service is that it is no longer routed via Turkey (as it had been) — likely due to the fact that the Syrian government no longer controls the ground between Aleppo (in the northern part of the country) and Turkey.  The restoration of Internet service in Aleppo may be an outcome of Russia’s recent engagement (with assistance from Iran) in the battle for Aleppo — and perhaps an indicator of the scales tipping towards government forces in this protracted battle.

Background

The first Syrian Internet shutdown occurred in June 2011 during ‘Arab Spring’ protests as two thirds of the country’s routed networks were taken down for over 48 hours.  As the conflict has continued over the years, Syria has suffered numerous Internet blackouts including a multi-day outage in November Continue reading

Microsoft sets up data centers in Germany amid US surveillance concerns

Microsoft is delivering its cloud services, including Azure, Office 365 and Dynamics CRM Online from two new datacenter regions in Germany, in a move that aims to deflect customer concerns about access to their data by U.S. surveillance.The data centers, located in Magdeburg and Frankfurt am Main, will be unusual in that control over the data will not be with Microsoft but with Deutsche Telekom subsidiary T-Systems, which will be acting as a data trustee for Microsoft's customers' data.Access to customer data stored in these new datacenters will be under the control of T-Systems and Microsoft will not be able to access the data without the permission of customers or the data trustee, Microsoft said in a statement Wednesday. If permission is granted by the data trustee, Microsoft will access the data only under its supervision.To read this article in full or to leave a comment, please click here

Microsoft sets up data centers in Germany amid US surveillance concerns

Microsoft is delivering its cloud services, including Azure, Office 365 and Dynamics CRM Online from two new datacenter regions in Germany, in a move that aims to deflect customer concerns about access to their data by U.S. surveillance.The data centers, located in Magdeburg and Frankfurt am Main, will be unusual in that control over the data will not be with Microsoft but with Deutsche Telekom subsidiary T-Systems, which will be acting as a data trustee for Microsoft's customers' data.Access to customer data stored in these new datacenters will be under the control of T-Systems and Microsoft will not be able to access the data without the permission of customers or the data trustee, Microsoft said in a statement Wednesday. If permission is granted by the data trustee, Microsoft will access the data only under its supervision.To read this article in full or to leave a comment, please click here

Review: Cisco ACI shakes up SDN

The concept of object health is present throughout ACI. When problems are detected, an object’s health score drops from 100, with lower scores indicating greater severity. This is hierarchical, so while a port that is disconnected on a single endpoint will show a health score of 0, the fabric node containing that port may show a health score of 50, and the application containing the down endpoint may show a score of 80. This can be traced visually through the Web UI by selecting the Health view on the affected application. This makes it extremely easy to pinpoint problems on a vast fabric.To read this article in full or to leave a comment, please click here(Insider Story)

Review: Cisco ACI shakes up SDN

The concept of object health is present throughout ACI. When problems are detected, an object’s health score drops from 100, with lower scores indicating greater severity. This is hierarchical, so while a port that is disconnected on a single endpoint will show a health score of 0, the fabric node containing that port may show a health score of 50, and the application containing the down endpoint may show a score of 80. This can be traced visually through the Web UI by selecting the Health view on the affected application. This makes it extremely easy to pinpoint problems on a vast fabric.To read this article in full or to leave a comment, please click here(Insider Story)

Hack to cost UK’s TalkTalk up to $53 million

TalkTalk Telecom Group in the U.K. expects the one-off cost of a recent cyberattack to be up to £35 million (US$53 million) but said the number of customers affected may have been far less than had been earlier expected.The company said, while presenting its half-year results Wednesday, that forensic analysis had found that 4 percent of its  customers have any personal data at risk.Giving a breakdown, TalkTalk disclosed that  the total number of customers whose personal details were accessed were 156,959, and of these customers 15,656 bank account numbers and sort codes were accessed. 28,000 obscured credit and debit card numbers were also accessed by the hackers but cannot be used for financial transactions, as they were were 'orphaned', and cannot be identified by the stolen data, the company said.To read this article in full or to leave a comment, please click here