Is Container Networking Holding On To The Past?

There has been a plethora of docker-related info on the internet this week, thanks in no small part to DockerCon, and I was motivated to finish this blog post about container networking.

In short, it seems like most if not all container networking projects are going out of their way to give devs the feeling of a “flat” network. My question is - who cares?

For this post, I am not talking about IaaS (which is arguably a declining use case). I am talking about an application cloud provider (i.e. SaaS, and maybe PaaS) where all IP addresses are assigned by the provider and under their control, within the context of the data center.

The way that most of these projects are being marketed to developers is that they provide one big flat network upon which to communicate. Why this choice of terminology? Why does “cloud-native” application design not by default include things like IPv6, or application nodes that are agnostic of what broadcast domain they are participating in?

I have Continue reading

Qualcomm partners with large Chinese foundry on chips

China’s largest chip foundry is entering into a joint venture with Qualcomm to develop chips, at a time when the country is looking for technology to emerge as a semiconductor producing powerhouse.The foundry, Semiconductor Manufacturing International Corporation (SMIC), has partnered with Qualcomm, Huawei Technologies and Belgian firm Imec to establish the joint venture, the companies said Tuesday.In terms of chip technology, SMIC is still two generations behind its rivals including Intel, Samsung and Taiwan Semiconductor Manufacturing Company (TSMC). But the new joint venture hopes to help the Chinese foundry streamline its research operations.To read this article in full or to leave a comment, please click here

More Leaky Routes

Most of the time, mostly everywhere, most of the Internet appears to work just fine. Indeed, it seems to work just fine enough to the point that that when it goes wrong in a significant way then it seems to be fodder for headlines in the industry press. But there are some valuable lessons to be learned from these route leaks about approaches to routing security.

Announcing DockerCon 2015 Europe

Today at DockerCon 2015, we are very happy to announce DockerCon Europe 2015, the second official Docker conference in Europe organized by both Docker, Inc. and members of the community. The conference will take place in Barcelona, at CCIB on November 16th and 17th. … Continued

Swedish man sentenced for powerful Blackshades malware

The creator of a tool that was used to steal data from a half-million computers will go to prison for close to five years, the U.S. Department of Justice said Tuesday.Alex Yucel, 25, of Sweden, pleaded guilty in February in a New York federal court to one count of distributing malicious software. He was sentenced to four and three-quarter years in prison and must forfeit $200,000, according to a news release.To read this article in full or to leave a comment, please click here

Is Container Networking Holding On To The Past?

There has been a plethora of docker-related info on the internet this week, thanks in no small part to DockerCon, and I was motivated to finish this blog post about container networking. In short, it seems like most if not all container networking projects are going out of their way to give devs the feeling of a “flat” network. My question is - who cares? Seems to me that "cloud-native" applications should be okay if two of the cattle are not on the same broadcast domain.

Is Container Networking Holding On To The Past?

There has been a plethora of docker-related info on the internet this week, thanks in no small part to DockerCon, and I was motivated to finish this blog post about container networking. In short, it seems like most if not all container networking projects are going out of their way to give devs the feeling of a “flat” network. My question is - who cares? Seems to me that "cloud-native" applications should be okay if two of the cattle are not on the same broadcast domain.

The Cloud Is Now A Thing

In the networking world, we’re starting to see the term “cloud” more and more. When I teach classes, if I so much as mention the word cloud, I start to see some eyes roll. That’s completely understandable, as the term cloud was such an overused buzzword, only having been recently supplanted only by “software defined”.

Here’s real-life supervillain (dude owns an MiG 29 and an island with a volcano on it… seriously) Larry Ellison freaking out about the term cloud.

“It’s not water vapor! All it is, is a computer attached to a network!”

But here’s the thing, it’s actually a thing now. Rather than a catch-all buzzword, it’s being used more and more to define a particular type of operational model. And it’s defined by NIST, the National Institute of Standards and Technology, part of the US Department of Commerce. With the term cloud, we now get a higher degree of specificity.

The NIST definition of cloud is as follows:

  • On-demand self service
  • Broad network access
  • Resource pooling (multi-tenant)
  • Rapid Elasticity
  • Measured service

That first item on the list, the on-demand self service, is a huge change in how we will be doing networking. Right now network Continue reading

Liveblog: Scaling New Services

This is a liveblog for the DockerCon 2015 session titled “Scaling New Services: From Container Creation to Automated Deployments”. This session is being led by the Disney Systems Engineering team and will feature a discussion/demo involving Docker, Mesos, Chef, Consul, and HAProxy.

The session starts with an introduction by Alex Williams, founder of The New Stack, who quickly turns it over to the Disney staff—Brian Scott and Patrick O’Connor. Brian starts with an overview of all the various companies within Disney, and the challenges that breadth creates. He then discusses the role of Disney’s Systems Engineering team, and the responsibilities of the team. That includes managing infrastructure, both on-premises as well as cloud-based infrastructure.

So, why Docker? To improve the guest experience, Disney needs to be able to move fast. They want to get away from managing VMs and cattle to managing containers and micro-bots. Brian talks about issues with onboarding developers, battling configuration drifts, and similar challenges. Disney started on their Docker journey 6-10 months ago, and lots of teams are still exploring the use cases for Docker. Some teams are already using it in the CI pipeline, and other teams are evaluating production use cases. CI is a Continue reading

Designing A Multi-Region, Multi-Hub Phase 3 DMVPN With BGP

This network design uses global/regional MPLS backbone as primary WAN connectivity method, with Cisco DMVPN backup. DMVPN spokes should have a regional primary hub with secondary hubs also based on location.

Author information

Matt Love

Matt Love

Matt is a network engineer in Greenville, SC, USA, working in the enterprise space. He enjoys solving complex routing, data center, and security (ish) problems, and writes about those when he can. When not at work, Matt can be found traipsing around Greenville on a road bike, or at home with his wife and two study-preventing kids.

The post Designing A Multi-Region, Multi-Hub Phase 3 DMVPN With BGP appeared first on Packet Pushers Podcast and was written by Matt Love.

Snowflake Computing opens data warehouse to the masses

Snowflake Computing announced Tuesday that its cloud-based data warehouse service is available to all users.Called the Snowflake Elastic Data Warehouse, the service allows companies to pool all their data and workloads in a single warehouse that can be accessed by all their users. The warehouse is designed to handle administrative tasks for many of its users, like automatically scaling to match a company’s demands and handling hardware provisioning by itself so that administrators don’t need to spend as much time managing it.In addition, Snowflake’s service is capable of taking in both structured and semi-structured data, without requiring users to ensure that it’s all in one format before uploading to the warehouse. The data warehouse will also automatically optimize itself based on data usage.To read this article in full or to leave a comment, please click here

How More Services Providers Are Thinking ‘Outside In’

June usually signals two things in my household: the end of the school year, and the beginning of the trips to the multiplex for the latest family-friendly animated movie. This year is no different, and from everything we’ve heard, Disney / Pixar’s latest entrant, Inside Out, is a winner.

While animated and emotion-based avatars are cute and funny, it’s the reverse concept that’s driving a lot of service provider thinking. And that is, thinking from the ‘Outside In’.

What do I mean by this? It all depends on the point of view. For a service provider that’s managing a network, be it global, regional, or metro, there’s a natural tendency to think about starting from the core and extending it out to edge. For this network, it’s important to have a reliable, super fast core – big fast iron that can process packets and bandwidth at really fast rates.

This is certainly important, but in order to differentiate and add value to their customers, service providers are investing more at the edge. They are thinking about how to wrap up and package network functionality, offer these up as monetized services, and distribute these all the way to the customer premises. Continue reading

Linux Network Interface Configuration With udev

I’m recently been running down (or is it through) the Linux, systemd, networkd, udevd rabbit hole at full pelt and thought perhaps now was a good time to come up for some air and to share what I’ve learned so far. I could (and have elsewhere) written long essays on why Linux makes an excellent network […]

Author information

Steven Iveson

Steven Iveson

Steven Iveson, the last of four children of the seventies, was born in London and has never been too far from a shooting, bombing or riot. He's now grateful to live in a small town in East Yorkshire in the north east of England with his wife Sam and their four children.

He's worked in the IT industry for over 20 years in a variety of roles, predominantly in data centre environments. Working with switches and routers pretty much from the start he now also has a thirst for application delivery, automation, SDN, virtualisation and related products and technologies. He's published a number of F5 Networks related books, is a regular contributor at DevCentral and was an F5 DevCentral MVP for 2014.

The post Linux Network Interface Configuration With udev appeared first on Packet Pushers Podcast and Continue reading

Legacy telcos make peace with Internet services in Africa

Companies providing audiovisual content and apps over the Internet are becoming increasingly influential in Africa, to the point where traditional telecom operators are essentially being forced to accommodate them.A growing number of telecom company executives themselves believe that so-called over-the-top (OTT) service providers, delivering apps and multimedia content over the Web, will only increase in influence, according to an Ovum survey.The Digital Africa survey, presented at Ovum’s recent Connecting West Africa conference in Dakar, found that 35 percent of telecom company executives polled believed that OTT service providers will be very important in five years, compared to only 18 percent who think that they are very influential today.To read this article in full or to leave a comment, please click here

Some users will ‘kick and scream’ at paying with slower chip cards

Major U.S. banks have been rolling out new, secure smart chip debit and credit cards for months, but the real end-user impact hasn't yet been felt.Some experts say typical consumers will get confused and may even balk when first attempting to use these new "pin and chip" smart cards. As a result, customers may choose to rely on the less-secure magnetic stripe also on the new cards for in-store purchases.MORE: 10 mobile startups to watch Or, customers could even turn to mobile wallet alternatives, like Apple Pay or the coming Android Pay, and skip the credit and debit card experience altogether.To read this article in full or to leave a comment, please click here

Solving the “jabber-config.xml” File Mystery

The jabber-config.xml file is an essential piece of configuration for the Jabber client. Sure, the client has the ability to operate just fine without this file. Video calling, deskphone control, instant messaging, etc. all work flawlessly. However, if you need to add any additional options, policies, or directory integrations, the jabber-config.xml file becomes necessary. Within the realm of the CCIE Collaboration certification, we are specifically concerned about two different configurations: UDS Directory Integration and SIP URI Dialing.

User Data Service (UDS) simply put, is the name for the End User database within Cisco Unified Communications Manager (CUCM). It contains all relevant information about that user, as would any other directory. UDS, however, is not enabled by default on the Jabber client. In fact, Jabber is geared towards integration with an LDAP source “out of the box”. This means that we must instruct the Jabber client to use UDS if we would like to be able to search the CUCM database to communicate with other users. Since this will have to be done by using the jabber-config.xml file, we must first determine how to create it. Thankfully, the Cisco documentation does not disappoint in this regard. From the Continue reading

Juniper, Ruckus join hands with an eye on mobile growth

The alliance between Juniper Networks and Ruckus Wireless announced on Tuesday underscores the importance of Wi-Fi in enterprises, where employees increasingly work and access cloud applications on mobile devices.Juniper and Ruckus say they’re joining forces to build integrated wired and wireless infrastructures while keeping their technologies open and standards-based. The companies focused on enterprises in announcing the partnership, but they will also integrate technologies for service-provider networks, Ruckus Vice President of Corporate Marketing David Callisch said.As Wi-Fi gets faster and more workers use laptops and other portable devices, more enterprises see wireless as a real alternative to traditional ethernet LANs, said Gartner analyst Tim Zimmerman. Some networks based on IEEE 802.11ac theoretically can deliver more speed than Gigabit ethernet, and the second wave of that technology now emerging will offer more than 6Gbps on the top end.To read this article in full or to leave a comment, please click here