Today the Magento Security Team created a new ModSecurity rule and added it to our WAF rules to mitigate an important RCE (remote code execution) vulnerability in the Magento web e-commerce platform. Any customer using the WAF needs to click the ON button next to the “CloudFlare Magento” Group in the WAF Settings to enable protection immediately.
Both Magento version 1.9.1.0 CE and 1.14.1.0 EE are compromised by this vulnerability. CloudFlare WAF protection can help mitigate vulnerabilities like this, but it is vital that Magento users patch Magento immediately. Select and download the patch for SUPEE-5344.
What would it take to watch every frickin' packet on the network?
By now you’ve probably seen or heard the news about Ravello Systems launching Inception—the ability to run nested VMware ESXi on AWS or GCE, including the ability to run VMs on these nested ESXi instances. (Here’s Ravello’s press release.)
In my opinion, this is pretty cool, and it opens the door to a lot of different possibilities: upgrade testing, automation testing, new feature testing, hosted home labs (aka “Lab as a Service”). Lots of folks are interested in using this new Ravello functionality for “Lab as a Service.” Here’s Andrea Mauro’s take on this topic.
As part of the pre-launch activities, a number of bloggers and community advocates were able to work with Ravello on some very interesting projects:
I was also engaged with Ravello on a project: building a (reasonably) large-scale vSphere environment on Ravello. The original goal was to Continue reading
Winner gets a pair of SDxCentral socks. We're not kidding.
Miss anything this week? Don't worry -- the SDxCentral Weekly Roundup is here!
Please join us in congratulating the following iPexpert client’s who have passed their CCIE lab!
Have you passed your CCIE lab exam and used any of iPexpert’s self-study products, or attended a CCIE Bootcamp? If so, we’d like to add you to our CCIE Wall of Fame!
I’ve been working over the last couple of weeks in integrating OpenContrail as a networking implementation for Kubernetes and got to the point where i ‘ve a prototype working with a multi-tier application example.
Kubernetes provides 3 basic constructs used in deploying applications:
A Pod is a container environment that can execute one or more applications; each Pod executes on a host as one (typically) or more Docker processes sharing the same environment (including networking). A Replication Controller (RC) is a collection of Pods with the same execution characteristics. RCs ensure that the specified number of replicas are executing for a given Pod template.
Services are collections of Pods that are consumable as a service. Through a single IP end point, typically load-balanced to multiple backends.
Kubernetes comes with several application deployment examples. For the purpose of prototyping, I decided to use the K8PetStore example. It creates a 4-tier example: load-generator, frontend, redis-master and redis-slave. Each of these tiers, except for the redis-master) can be deployed as multiple instances.
With OpenContrail, we decided to create a new daemon that listens to the kubernetes API using the kubernetes controller framework. This daemon creates virtual networks on demand, for each Continue reading
API management company Apigee went public at $17 per share this morning.
Most networks today (including Plexxi solutions) are built as distributed networks. This type of infrastructure reduces complexity and significantly increases network capabilities. Our own Marten Terpstra took a deep dive into the future of distributed networks this week on the Plexxi blog. He identifies and breaks down the “central command” system of today’s distributed networks, and its impact on the functionality of network solutions as a whole. Give it a read before you head out for the weekend.
Below please find a few of our top picks for our favorite news articles of the week. Have a great weekend!
CIO: Declare Your Independence – Virtualize that Network!
By Paul Gillan
Although a relative newcomer to virtualization compared to its server and storage brethren, virtualized networks – and their companion, software-defined networking (SDN) technology – are a no-brainer for any company that’s virtualizing other parts of its IT infrastructure. Once you move platforms to an internal cloud, you’ll want the underlying transport layer to deliver the same flexibility as the virtual resource. Storage, servers, desktops and software all benefit from a more flexible network.
Re/code: The Third Phase of Big Data
By Sumit Sadana
Back in the pre-Internet era of the Continue reading
Welcome to Technology Short Take #50, the latest in my series of posts sharing various links and articles pertaining to key data center technologies. I hope that you find something useful here!
This is the first in a series we’re calling “Design & Build,” where we talk through some common network challenges you might face in your network career. Today, we talk about corporate mergers, where the network you know and love needs to work with a network that you don’t.
The post Show 234 – Design & Build #1 – Network Mergers appeared first on Packet Pushers Podcast and was written by Ethan Banks.
Automated security policies can help you roll out apps faster, get more granular with your security, and reduce over provisioning.
Google is set to make QUIC the default protocol for web browsing to improve performance by using HTTP over UDP.
The post Response: A QUIC update on Google’s experimental transport – Chromium.org appeared first on EtherealMind.