In our deeper investigations of the IETF as a “sample standards body” in this (apparently forever running) series on how the Internet really works, let’s take a look at the IETF standards process. This is a rather sanitized, informal review — I may leave out some steps, or describe things in a way that doesn’t […]
The post HTIRW: The IETF Draft Process appeared first on Packet Pushers Podcast and was written by Russ White.
In our last post, we got our base lab up and running. In this post, I’d like to walk us through the four main constructs that Kubernetes uses. Kubernetes defines these constructs through configuration files which can be either YAML or JSON. Let’s walk through each construct so we can define it, show possible configurations, and lastly an example of how it works on our lab cluster.
Pods
Pods are the basic deployment unit in Kubernetes. A pod consists of one or more containers. Recall that Kubernetes is a container cluster management solution. It concerns itself with workload placement not individual container placement. Kubernetes defines a pod as a group of ‘closely related containers’. Some people would go as far as saying a pod is a single application. I’m hesitant of that definition since it it seems too broad. I think what it really boils down to is grouping containers together that make sense. From a network point of view, a pod has a single IP address. Multiple containers that run in a pod all share that common network name space. This also means that containers Continue reading
Last week I presented at the Wireless LAN Professionals Conference (#WLPC) in Dallas, TX. The topic of my presentation was putting the concepts of WLAN capacity planning into practice.
Agenda:
The video is now available online:
If you would like a review of capacity planning concepts prior to watching the hands-on example, my presentation from last year's WLPC 2014 is also available online.
Cheers,
Andrew von Nagy
Original content from Roger's CCIE Blog Tracking the journey towards getting the ultimate Cisco Certification. The Routing & Switching Lab Exam
EIGRP Named Mode or Multi-AF Mode is a new development in EIGRP starting in Version 15.x Its reason for being is to simplify the EIGRP configuration into one place, as previously with EIGRP classic version the configuration was between the interface and the global process which made it harder to see all the configuration relating... [Read More]
Post taken from CCIE Blog
Original post EIGRP Named Mode
Once you’ve setup your Cisco ASA, you will want to monitor it to ensure that it’s operating normally. The plugin nm_check_asa_connections for Nagios, and compatible products, can warn your if the number of current connections gets too high. A very high connection count might indicate that there’s an attack under way on one of your servers, you have some hosts on your inside which are part of a botnet and is attacking someone else, or perhaps you’re just about to grow out of your current firewall and need an upgrade to a more powerful box.
As the industry adoption of SDN gains rapid traction, the Wide Area Network is emerging as the leading use-case (read 2015 is all about SD-WAN). Aging architectures make the WAN the dinosaurs of enterprise infrastructure. While WAN optimization can address a short-term capacity problem, the bigger problems of high circuit costs, network rigidity and poor […]
The post Show 223 – Viptela and the Software Defined WAN appeared first on Packet Pushers Podcast and was written by Greg Ferro.
Once you’ve setup your Cisco ASA, you will want to monitor it to ensure that it’s operating normally. The plugin nm_check_asa_connections for Nagios, and compatible products, can warn your if the number of current connections gets too high. A very high connection count might indicate that there’s an attack under way on one of your servers, you have some hosts on your inside which are part of a botnet and is attacking someone else, or perhaps you’re just about to grow out of your current firewall and need an upgrade to a more powerful box.
Continue reading
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Hybrid cloud is the talk of IT, but to avoid costly, labor-intensive megaprojects you cannot escape, pay particular attention to minimizing implementation and management complexity. These questions will help you identify the best hybrid cloud architecture for your environment:
In the midmarket, the No. 1 answer is disaster recovery (DR). A secondary data center for DR is a luxury most companies can not afford. Now, public cloud services have put DR within reach of virtually all organizations. The key is to identify the enabling technology that minimizes complexity, maximizes automation and does not overtax the IT staff. Easy cloud DR solutions exist today for midsized shops; don’t be lead into a heavy professional services project.
To read this article in full or to leave a comment, please click here