Talari CTO and co-founder John Dickey joins Ethan Banks and Greg Ferro, along with four IT leaders from various organizations, in a sponsored podcast about real-world SD-WAN deployments and use cases.
The post Show 261: Lessons Learned From SD-WAN Deployments (Sponsored) appeared first on Packet Pushers.
Earlier this week, an article in New York Times captured the world’s imagination with the prospect of secret Russian submarines possessing the ability to sabotage undersea communication cables (with perhaps Marko Ramius at the helm, pictured above). While it is a bit of a Hollywood scenario, it is still an interesting one to consider, although, as we’ll see, perhaps an unrealistic one, despite the temptation to exaggerate the risk.
Submarine cable cuts occur with regularity and the cable repair industry has considerable experience dealing with these incidents. However, the vast majority of these failures are the result of accidents occurring in relatively shallow water, and not due to a deliberate actor intending to maximize downtime. There is enormous capacity and resiliency among the cables crossing the Atlantic (the subject of the New York Times article), so to even make a dent, a saboteur would need to take out numerous cables in short order.
A mass telecom sabotage event involving the severing of many submarine cables (perhaps at multiple hard-to-reach deep-water locations to complicate repairs) would be profoundly disruptive to international communications — Internet or otherwise. For countries like the U.S. with extensive local hosting, the impact Continue reading
Sertillanges, The Intellectual Life
The post QOTW: The Occupation of the Wise appeared first on 'net work.
After passing the CCIE Lab Exam in Routing & Switching v5 on August 27th 2015 my CCIE Plaque has finally arrived. After all the late nights and weekends of studying and the cost of the training, bootcamps, travel and the lab exam fee, what do you get for passing? Well apart from your digits which […]
The post CCIE Plaque has finally arrived! appeared first on Roger Perkin - Networking Articles.
We’re back again with a quick update to Galaxy. In the last release we did some cool things to make searching roles much easier. This release is a mini release focused on fixing a few bugs and adding minor enhancements we couldn’t squeeze into the last cycle.
Galaxy issues are tracked publicly at https://github.com/ansible/galaxy-issues. Here are the issues addressed in release 1.1.1:
#88 Role Data Should Show Last Modified Instead of Created Date
#86 `ansible-galaxy -r roles.txt` - Incorrect Example
#84 README.md Fails to Render When it Contains a Variable String Like
#82 "Sign in" Option Should Appear on Home Page Header
#81 Better Filter for RHEL/Centos -> EL in Platform Search
#53 Adding a Role Called "Ansible" Results in Un-named Role
#14 Add Galaxy support for Debian Jessie
#9 Periods in Role Names Cause Installs to Fail
As part of fixing issue #81, Better Filter for RHEL/Centos -> EL in Platform Search, we changed the way the new role filtering works. A lot of times you know what you’re looking for, and don’t want to wait for autocomplete suggestions. For example, you might be looking for a Platform value of ‘centos’. Typing Continue reading
Content providers were using centralized traffic flow optimization together with MPLS TE for at least 15 years (some of them immediately after Cisco launched the early MPLS-TE implementation in their 12.0(5)T release), but it was always hard to push the results into the network devices.
PCEP and BGP-LS all changed that – they give you a standard mechanism to extract network topology and install end-to-end paths across the network, as Julian Lucek of Juniper Networks explained in Episode 43 of Software Gone Wild.
Read more ... Bright days ahead, CEO Ed Meyercord says.
Hi, I'm Filippo and today I managed to surprise myself! (And not in a good way.)
I'm developing a new module ("filter" as we call them) for RRDNS, CloudFlare's Go DNS server. It's a rewrite of the authoritative module, the one that adds the IP addresses to DNS answers.
It has a table of CloudFlare IPs that looks like this:
type IPMap struct {
sync.RWMutex
M map[string][]net.IP
}
It's a global filter attribute:
type V2Filter struct {
name string
IPTable *IPMap
// [...]
}
CC-BY-NC-ND image by Martin SoulStealer
The table changes often, so a background goroutine periodically reloads it from our distributed key-value store, acquires the lock (f.IPTable.Lock()
), updates it and releases the lock (f.IPTable.Unlock()
). This happens every 5 minutes.
Everything worked in tests, including multiple and concurrent requests.
Today we deployed to an off-production test machine and everything worked. For a few minutes. Then RRDNS stopped answering queries for the beta domains served by the new code.
What. That worked on my laptop™.
Here's the IPTable consumer function. You can probably spot the bug.
func (f *V2Filter) getCFAddr(...) (result []dns.RR) {
f. Continue reading
Texas company joins the fray in providing service assurance in virtual environments.
The post Worth Reading: Cloud Access Security Brokers appeared first on 'net work.