Multi-Cloud: Myths and Reality

I keep hearing numerous variations of the following argument from people believing in the unlimited powers of multi-cloud1 (deploying your workloads in multiple public cloud providers):

We don’t install all our servers in the same DC. But would you trust one Cloud Server Provider with all your applications? That’s why you should use multi-cloud.

I’ve been hearing similar arguments for at least 30 years, including:

IBM launches fourth-gen LinuxONE servers

IBM has unveiled the next generation of its LinuxONE server, which uses the Telum processor found in the System Z mainframe, promising both scale-out and scale-up performance and much lower power use.Officially dubbed IBM LinuxONE Emperor 4, even though it uses the System Z processor, it only runs Linux-based workloads. The system is tailored to meet the needs of Linux workloads in the data center, according to Marcel Mitran, IBM Fellow, CTO of Cloud Platform, IBM LinuxONE.He says that if a customer has Linux-based workloads running on a Z series, they will be portable to the Emperor server. The server can run Red Hat, SuSe, and Canonical Linux distros.To read this article in full, please click here

IBM launches fourth-gen LinuxONE servers

IBM has unveiled the next generation of its LinuxONE server, which uses the Telum processor found in the System Z mainframe, promising both scale-out and scale-up performance and much lower power use.Officially dubbed IBM LinuxONE Emperor 4, even though it uses the System Z processor, it only runs Linux-based workloads. The system is tailored to meet the needs of Linux workloads in the data center, according to Marcel Mitran, IBM Fellow, CTO of Cloud Platform, IBM LinuxONE.He says that if a customer has Linux-based workloads running on a Z series, they will be portable to the Emperor server. The server can run Red Hat, SuSe, and Canonical Linux distros.To read this article in full, please click here

Arista extends security of EOS, doubles R3 router portfolio

Arista Networks has added security, cloud and mobile connectivity to its flagship operating system and doubled its portfolio of routing products giving enterprises new network configuration options.Arista’s Extensible Operating system (EOS) now includes encryption options called TunnelSec, a new ethernet VPN (EVPN) MPLS gateway for data center-connectivity, and improved timing-protocol support aimed at improving the handlng of mobile communications.To read this article in full, please click here

IBM, Bharti Airtel partner on edge cloud offerings in India

IBM will work with telecom provider Bharti Airtel to offer edge cloud services to organizations in India, providing a new option for companies looking to leverage edge services and keep their data in-country.The partnership, announced Wednesday, will extend across 20 of India’s largest cities, with a grand total of 120 network data centers included in the system. The idea is to offer business customers the ability to use cutting-edge new capabilities—for example, automated inspection for manufacturing, or high-level analytics for healthcare providers—without using global cloud services that might take data out of the country or having to implement that type of system completely in-house.To read this article in full, please click here

IBM, Bharti Airtel partner on edge cloud offerings in India

IBM will work with telecom provider Bharti Airtel to offer edge cloud services to organizations in India, providing a new option for companies looking to leverage edge services and keep their data in-country.The partnership, announced Wednesday, will extend across 20 of India’s largest cities, with a grand total of 120 network data centers included in the system. The idea is to offer business customers the ability to use cutting-edge new capabilities—for example, automated inspection for manufacturing, or high-level analytics for healthcare providers—without using global cloud services that might take data out of the country or having to implement that type of system completely in-house.To read this article in full, please click here

Service Mesh And Ingress In Kubernetes: Lesson 4 – Ingress With Nginx Ingress – Video

Video four in this series provides a hands-n view of deploying NGINX Ingress running on AKS. Michael Levan brings his background in system administration, software development, and DevOps to this video series. He has Kubernetes experience as both a developer and infrastructure engineer. He’s also a consultant and Pluralsight author, and host of the “Kubernetes […]

The post Service Mesh And Ingress In Kubernetes: Lesson 4 – Ingress With Nginx Ingress – Video appeared first on Packet Pushers.

Hedge 147: The SRE with Niall Murphy (part 1)

It seems like only yesterday we started talking about the Site Reliability Engineer, and their place in the IT ecosystem. Over the last several years, the role of the SRE has changed—and it’s bound to continue changing. On this episode of the Hedge, Niall Murphy joins Tom Ammon and Russ White to discuss the changing role of the SRE, and what the SRE could be.

download

If you want to read more on this topic, check out Niall’s article over a USENIX.

Day Two Cloud 163: Is The Tech Market Too Focused On Developers?

Today on the Day Two Cloud podcast we have a frank discussion about tech marketing. Why? Because engineers are a target of marketing, so it's helpful to know how marketing works, what's trying to be communicated, and how it could be better. We also discuss whether the tech industry has over-committed on chasing developers while ignoring operations and sysadmins, why ops and sysadmins shouldn't be ignored, and more. Our guest is Gina Rosenthal, founder of Digital Sunshine Solutions.

Day Two Cloud 163: Is The Tech Market Too Focused On Developers?

Today on the Day Two Cloud podcast we have a frank discussion about tech marketing. Why? Because engineers are a target of marketing, so it's helpful to know how marketing works, what's trying to be communicated, and how it could be better. We also discuss whether the tech industry has over-committed on chasing developers while ignoring operations and sysadmins, why ops and sysadmins shouldn't be ignored, and more. Our guest is Gina Rosenthal, founder of Digital Sunshine Solutions.

The post Day Two Cloud 163: Is The Tech Market Too Focused On Developers? appeared first on Packet Pushers.

Why You Should Read Intent-Based Networking for Dummies

When it comes to networking, there’s no shortage of technical jargon and complicated concepts. In order to fully understand the inner workings of modern networking systems, you need to have a solid foundation in basic networking principles and a clear understanding of how new advances and developments are changing the face of the industry.

The Intent-Based Networking for Dummies by Jeff Doyle and Cisco is the perfect resource for anyone looking to learn more about the principles of modern networking.

Why You Should Read Intent-Based Networking for Dummies

The following are just a few of the reasons why Intent-Based Networking for Dummies is essential reading for anyone looking to understand and master the intricacies of modern networking systems:

It provides a comprehensive overview of the principles and practices that lie at the heart of modern networking systems.

The book breaks down the key concepts of networking in simple, easy-to-understand language so that anyone can grasp them. This is perfect for people who want to learn more about the basics of networking without having to wade through dense technical jargon.

It offers practical insights and advice on how to effectively apply these principles in real-world scenarios.

It explains the concepts of Continue reading

How to work on Linux with filenames that contain blanks

Personally, I always try to avoid filenames with blanks, usually by filling those places where less blank-phobic people would use them with underscores or hyphens. The filenames are still easy to decipher, and I don’t have to trouble myself with enclosing them in quotes when I want to use them. As a result, some of my files look like this:locking-accts Lost_World I also rarely add .txt file extensions to the end of text files unless I plan to share them with my Windows system.Use quotes When blanks in file names are preferable for any reason, however, there are several easy ways to work with them. To reference existing files, you can enclose the filenames in single or double quotes. In fact, you can make this easier by starting with a quote mark, typing as much of the filename as needed to differentiate it from other files and then pressing the tab key to initiate filename completion. For example, typing the portion of a filename as shown in the example below and then pressing tab should add the rest of the filename to the “file n” beginning:To read this article in full, please click here

How to work on Linux with filenames that contain blanks

Personally, I always try to avoid filenames with blanks, usually by filling those places where less blank-phobic people would use them with underscores or hyphens. The filenames are still easy to decipher, and I don’t have to trouble myself with enclosing them in quotes when I want to use them. As a result, some of my files look like this:locking-accts Lost_World I also rarely add .txt file extensions to the end of text files unless I plan to share them with my Windows system.Use quotes When blanks in file names are preferable for any reason, however, there are several easy ways to work with them. To reference existing files, you can enclose the filenames in single or double quotes. In fact, you can make this easier by starting with a quote mark, typing as much of the filename as needed to differentiate it from other files and then pressing the tab key to initiate filename completion. For example, typing the portion of a filename as shown in the example below and then pressing tab should add the rest of the filename to the “file n” beginning:To read this article in full, please click here

How we built Pingora, the proxy that connects Cloudflare to the Internet

How we built Pingora, the proxy that connects Cloudflare to the Internet

Introduction

How we built Pingora, the proxy that connects Cloudflare to the Internet

Today we are excited to talk about Pingora, a new HTTP proxy we’ve built in-house using Rust that serves over 1 trillion requests a day, boosts our performance, and enables many new features for Cloudflare customers, all while requiring only a third of the CPU and memory resources of our previous proxy infrastructure.

As Cloudflare has scaled we’ve outgrown NGINX. It was great for many years, but over time its limitations at our scale meant building something new made sense. We could no longer get the performance we needed nor did NGINX have the features we needed for our very complex environment.

Many Cloudflare customers and users use the Cloudflare global network as a proxy between HTTP clients (such as web browsers, apps, IoT devices and more) and servers. In the past, we’ve talked a lot about how browsers and other user agents connect to our network, and we’ve developed a lot of technology and implemented new protocols (see QUIC and optimizations for http2) to make this leg of the connection more efficient.

Today, we’re focusing on a different part of the equation: the service that proxies traffic between our network and servers on the Internet. This proxy Continue reading

VLAN Interfaces and Subinterfaces

Early bridges implemented a single bridging domain across all ports. Within a few years, we got multiple bridging domains within a single device (including bridging implementation in Cisco IOS). The capability to have multiple bridging domains stretched across several devices was still missing… until the modern-day Pandora opened the VLAN box and forever swamped us in the complexities of large-scale bridging.

VLAN Interfaces and Subinterfaces

Early bridges implemented a single bridging domain across all ports. Within a few years, we got multiple bridging domains within a single device (including bridging implementation in Cisco IOS). The capability to have multiple bridging domains stretched across several devices was still missing… until the modern-day Pandora opened the VLAN box and forever swamped us in the complexities of large-scale bridging.