Cisco’s Project Contiv Specifies Policy for Containerized Applications
Take part in Cisco’s Project Contiv, an open source project to optimize shared infrastructure for containerized applications.
Take part in Cisco’s Project Contiv, an open source project to optimize shared infrastructure for containerized applications.
This is a guest repost from Christophe Limpalair of his interview with Max Schnur, Web Developer at Wistia.
Wistia is video hosting for business. They offer video analytics like heatmaps, and they give you the ability to add calls to action, for example. I was really interested in learning how all the different components work and how they’re able to stream so much video content, so that’s what this episode focuses on.
As you will see, Wistia is made up of different parts. Here are some of the technologies powering these different parts:
With the Linux Foundation’s patronage, ONS is extending its reach across the open-source community.

“If I haven’t done anything wrong, then I don’t have anything to hide.” This is one of those bits of nonsense that never seems to lose it’s power regardless of how many times it’s been proven wrong in history. Privacy is one of the most important freedoms we enjoy — the privacy to try, the privacy to work things out among friends, and even the privacy to fail.
So what does the ‘net say about privacy this week?
One of the most disturbing things is the growing tendency to engineer people for greater efficiency. This trend started more than a hundred years ago — remember this?
But there is something fundamentally dehumanizing about people like machines out of whom you can squeeze infinite amounts of bandwidth — but it seems to be something we’re pushing towards almost as fast as we can, in both the corporate world and in government.
Many countries are in the throes of a debate about the amount of surveillance a government Continue reading
Define "Skull Glitter"
The post Network Dictionary: Skull Glitter appeared first on EtherealMind.
I love listening to the Datanauts podcast (Ethan and Chris are fantastic hosts), starting from the very first episode (hyper-converged infrastructure) in which Chris made a very valid comment along the lines of “with the hyper-converged infrastructure it’s possible to get so many things done without knowing too much about any individual thing…” and I immediately thought “… and what happens when it fails?”
Read more ...IWAN (Intelligent Wide Area Network) and Why EIGRP or BGP over the DMVPN Tunnel.
In this YouTube “playing in the lab” IWAN fun we are going to drill down between 2 sites – Branch 3 and the Hub site. Branch 3 will be in “hybrid” mode (1 MPLS link and 1 Internet Link) – in the past using the MPLS link as a primary and the internet link as backup only. Now, however, taking advantage of IWAN’s Intelligent Path Control.
We will design the implementation such that should we need to fall back from Intelligent Path Control to normal routing… we fallback to what is (for many customers’) today’s norm in this situation – MPLS as the Primary and Internet as the backup. For this to happen….there will only be 1 entry in the RIB (via the MPLS) How, then you ask, would you ever send any traffic at all out of the Internet link (tunnel 20) if that path is not in the routing table? 
PfRv3 can read the EIGRP topo table and the BGP table…. we can still do intelligent decision making at the WAN edge and only send out the Internet path Continue reading
A while ago, I wrote an article about bootstrapping servers into Ansible—in other words, how to prepare servers to be managed via Ansible. In order for a server to be managed via Ansible, you usually must first create a user account for Ansible, populate the appropriate SSH keys, and grant the new Ansible user sudo permissions. The process I described in my earlier blog post works great for manually-built servers (physical or virtual), but I recently needed to revisit this process for cloud instances. Was it possible to use the process I’d found to bootstrap cloud instances into Ansible?
Cloud instances are a slightly different beast than manually-built servers primarily because password authentication isn’t an option—generally speaking, you’re required to use SSH keys when working with cloud instances. Ansible is SSH-based, as you probably already know, so this shouldn’t be an issue, but it was still something I hadn’t tested or verified. After a bit of testing, I found the bootstrap process I described in my earlier post can be easily adapted for cloud instances.
For reference, here’s the command I use when bootstrapping manually-built servers into Ansible:
ansible-playbook bootstrap.yml -k -K --extra-vars
"hosts=newhost.domain.com user=admin"
In this post we’ll have a look at the process of configuring a FlexVPN network (unofficially known as DMVPN phase 4). I’ll show what components are involved in configuration and how they all tie together. For most patient readers there’s a bonus at the end of this post. FlexVPN network topology The network we’ll be looking at is […]
The post FlexVPN configuration appeared first on Packet Pushers.