The hardworking folk at Docker, Inc. are proud to announce the release of version 1.2.0 of Docker. We’ve made improvements throughout the Docker platform, including updates to Docker Engine, Docker Hub, and our documentation.
Highlights include these new features:
restart policies
We added a --restart flag to docker run to specify a restart policy for your container. Currently, there are three policies available:
This deprecates the --restart flag on the Docker daemon.
docker run --restart=always redis
docker run --restart=on-failure:5 redis
–cap-add –cap-drop
Currently, Docker containers can either be given complete capabilities or they can all follow a whitelist of allowed capabilities while dropping all others. Further, previously, using --privileged would grant all capabilities inside a container, rather than applying a whitelist. This was not Continue reading
A while ago I explained why OpenFlow might be a wrong tool for some jobs, and why centralized control plane might not make sense, and quickly got misquoted as saying “controllers don’t scale”. Nothing could be further from the truth, properly architected controller-based architectures can reach enormous scale – Amazon VPC is the best possible example.
Read more ...![]() |
| Topology Continue reading |
Sure, there are other parties out there, but they usually don’t make the ballot for one reason or another. Even when you are not a “hardcore” supporter of either party, you feel stuck in one of those camps since you cannot partially “vote,” much less mix-and-match, as both parties are incompatible with each other.
What if this doesn’t have to be the case?
In this new world democracy, what if you could apportion your vote in a piecemeal fashion? In essence, taking the bits from one party combined with those of another party to create a new candidate tailored for your needs.
For the last 18 months or so, the Open Compute Project (OCP) Networking Group has been further validating and accelerating the adoption of this new reality of a disaggregated network design where the network device is separated from the network operating system (NOS) that powers the device. At the heart of this is a little piece of OCP software called ONIE (Open Network Install Environment), a key innovation by Cumulus Networks and released Continue reading
The Network Break returns with Show 15.
The post Network Break 15 appeared first on Packet Pushers Podcast and was written by Greg Ferro.
In Part 1 we discussed how to turn off ISATAP on Windows host—which is a great idea. Turning off unnecessary components of your network simplifies everything. But ISATAP can be useful in certain scenarios. For instance, if you want to test an application on IPv6 you clearly don’t want to turn on IPv6 everywhere and […]
The post Windows ISATAP Client, Part 2 appeared first on Packet Pushers Podcast and was written by Dan Massameno.
I've been reading the Cisco Application Centric Infrastructure Design Guide. Sometimes I see a product of genius and wondrous use of technology, other times I'm like 'did they do it the hard way or what' ?
The post Musing: First thoughts on how Cisco ACI Works appeared first on EtherealMind.
Here’s an interesting story illustrating the potential pitfalls of multi-DC deployments and the impact of data gravity on application performance.
Long long time ago on a cloudy planet far far away, a multinational organization decided to centralize their IT operations and move all workloads into a central private cloud.
Read more ...
@revolutionwifi @vall_wifi @KeithRParsons The negative effects on effective range with wider channels http://t.co/wyg3qtQjJl
— George Ou (@GeorgeOu) August 20, 2014
Today we are very happy to announce DockerCon Europe 2014, the first official Docker conference organized in Europe, by both Docker, Inc. and members of the community. The conference will take place in Amsterdam, at the NEMO science center, December 4th and 5th.
We will also have a full day or training prior to the conference, led by Jérôme Petazzoni on December 3rd.
The official website is still under construction as we are finalizing the last details, but today we can announce that the Docker team will be present as well as incredible speakers from the Docker community including:
Call for papers opens today, you can submit your talk here. If you are interested in our sponsorship options, please contact us at [email protected].
We also want to give a special thanks to Pini Reznik, Harm Boertien, Mark Coleman, Maarten Dirkse and the Docker Amsterdam community, who are working with us to bring the best of Docker to Europe.
Save the dates and stay tuned for more announcements!
In this post I will be showing you how its possible to use different paths between your PE routers on a per VRF basis.
This is very useful if you have customers you want to “steer” away from your normal traffic flow between PE routers.
For example, this could be due to certain SLA’s.
I will be using the following topology to demonstrate how this can be done:
A short walkthrough of the topology is in order.
In the service provider core we have 4 routers. R3, XRv-1, XRv-2 and R4. R3 and R4 are IOS-XE based routers and XRv-1 and XRv-2 are as the name implies, IOS-XR routers. There is no significance attached to the fact that im running two XR routers. Its simply how I could build the required topology.
The service provider is running OSPF as the IGP, with R3 and R4 being the PE routers for an MPLS L3 VPN service. On top of that, LDP is being used to build the required LSP’s. The IGP has been modified to prefer the northbound path (R3 -> XRv-1 -> R4) by increasing the cost of the R3, XRv-2 and R4 to 100.
So by default, traffic between Continue reading
SDN evangelists talking about centralized traffic engineering, flow steering or bandwidth calendaring sometimes tend to gloss over the first rule of successful traffic engineering: Know Thy Traffic.
In a world ruled by OpenFlow you’d expect the OpenFlow controller to know all the traffic; in more traditional networks we use technologies like NetFlow, sFlow or IPFIX to report the traffic statistics – but regardless of the underlying mechanism, you need a tool that will collect the statistics, aggregate them in a way that makes them usable to the network operators, report them, and potentially act on the deviations.
Read more ...
Tower 2.0 is our biggest release so far, and focuses on supercharging the day to day Ansible experience -- creating the best possible environment for a team using Ansible. It completely revolutionizes the way Ansible playbooks are experienced. New features in Ansible Tower’s 2.0 release include:
Continue reading| Typical Wi-Fi SNR to MCS Data Rate Mappings (Download for full resolution Continue reading |