Twilight Zone: File Transfer Never Completes

Ages ago when we were building networks using super-expensive 64kbps WAN links, a customer sent us a weird bug report:

Everything works fine, but we cannot transfer one particular file between two locations – the file transfer stalls and eventually times out. At the same time, we’re seeing increased number of CRC errors on the WAN link.

My chat with the engineer handling the ticket went along these lines:

Twilight Zone: File Transfer Never Completes

Ages ago when we were building networks using super-expensive 64kbps WAN links, a customer sent us a weird bug report:

Everything works fine, but we cannot transfer one particular file between two locations – the file transfer stalls and eventually times out. At the same time, we’re seeing increased number of CRC errors on the WAN link.

My chat with the engineer handling the ticket went along these lines:

IBM Uses Power10 CPU As An I/O Switch

Back in early July, we covered the launch of IBM’s entry and midrange Power10 systems and mused about how Big Blue could use these systems to reinvigorate an HPC business rather than just satisfy the needs of the enterprise customers who run transaction processing systems and are looking to add AI inference to their applications through matrix math units on the Power10 chip.

IBM Uses Power10 CPU As An I/O Switch was written by Timothy Prickett Morgan at The Next Platform.

Getting started with container security

A couple of days ago, I was checking my Twitter feed and saw a tweet from someone saying how frustrated he was that DockerHub (a renowned container registry) was down. Someone else replied to the tweet, recommending the tweet’s author to check out Google’s repository, where they have DockerHub mirrors in Google Cloud.

My first reaction was “Nice! How clever of this person (or Google) to have thought of this idea.” My next thought was, wait. This could lead to potential security risks for some developers who are not familiar with how these registries are updated and what images go into these mirrored sites. Imagine when application developers are busy scrambling to check-in their latest update to the CI/CD pipeline of the software they are building, and in that time crunch, their go-to container registry is down. Do developers really have the time to check if there are vulnerable images in every registry they use? Will there be an easy, streamlined way to automatically scan the images no matter which registry developers use to pull their images? The short answer is yes, and we will look into that in this blog.

Scan all your container assets with Calico Cloud

Continue reading

Aruba boosts AI capabilities to help enterprises manage, troubleshoot the edge

Aruba is adding AIOps features to its Edge Services Platform (ESP) to help customers automate everyday tasks, shrink the time needed to find and fix problems, and increase edge security controls.Rolled out in 2020, Aruba ESP analyzes telemetry data generated from Aruba Wi-Fi or network switching gear and uses it to automatically optimize connectivity, discover network problems, and secure the overall edge environment. ESP builds a data lake of a customer’s data center, campus, and SD-WAN switch information, and it combines that data with statistics from billions of data points generated daily by Aruba devices worldwide.To read this article in full, please click here

Aruba boosts AI capabilities to help enterprises manage, troubleshoot the edge

Aruba is adding AIOps features to its Edge Services Platform (ESP) to help customers automate everyday tasks, shrink the time needed to find and fix problems, and increase edge security controls.Rolled out in 2020, Aruba ESP analyzes telemetry data generated from Aruba Wi-Fi or network switching gear and uses it to automatically optimize connectivity, discover network problems, and secure the overall edge environment. ESP builds a data lake of a customer’s data center, campus, and SD-WAN switch information, and it combines that data with statistics from billions of data points generated daily by Aruba devices worldwide.To read this article in full, please click here

Full Stack Journey 068: An Introduction To Pixie For Open-Source Kubernetes Observability

Today's Full Stack Journey podcast is all about Pixie, an "open source observability tool for Kubernetes applications." Pixie takes advantage of eBPF to capture telemetry data. Joining Scott to provide a beginner-level overview of Pixie is Fabian Ngala.

The post Full Stack Journey 068: An Introduction To Pixie For Open-Source Kubernetes Observability appeared first on Packet Pushers.

LiveAction Unifies Flow, Packets For Deep Network Visibility

LiveAction provides network and application monitoring that integrates flow records and packets. This integration gives network management teams a clear, clean view of network topology and applications traffic–even for the most complex, multi-vendor networks. LiveAction can also capture and analyze packets to help engineers troubleshoot problems and investigate incidents.

The post LiveAction Unifies Flow, Packets For Deep Network Visibility appeared first on Packet Pushers.

When the window is not fully open, your TCP stack is doing more than you think

When the window is not fully open, your TCP stack is doing more than you think

Over the years I've been lurking around the Linux kernel and have investigated the TCP code many times. But when recently we were working on Optimizing TCP for high WAN throughput while preserving low latency, I realized I have gaps in my knowledge about how Linux manages TCP receive buffers and windows. As I dug deeper I found the subject complex and certainly non-obvious.

In this blog post I'll share my journey deep into the Linux networking stack, trying to understand the memory and window management of the receiving side of a TCP connection. Specifically, looking for answers to seemingly trivial questions:

  • How much data can be stored in the TCP receive buffer? (it's not what you think)
  • How fast can it be filled? (it's not what you think either!)

Our exploration focuses on the receiving side of the TCP connection. We'll try to understand how to tune it for the best speed, without wasting precious memory.

A case of a rapid upload

To best illustrate the receive side buffer management we need pretty charts! But to grasp all the numbers, we need a bit of theory.

We'll draw charts from a receive side of a TCP flow, Continue reading

Enterprise SSD prices are in for a drop

CPU prices may be headed north, but thanks to an oversupply of NAND flash, SSD prices across the board are declining.The cause is an oversupply combined with the threat of a recession, according to Taiwanese market research firm TrendForce. The firm said a combination of slowing demand across all segments of the NAND memory business, along with a reluctance to invest in additional capacity, has led to the glut. Related: Intel, other chipmakers warn of price hikes As a result, TrendForce predicts consumer product prices will decline 8% to 13% in the third quarter of 2022, while enterprise SSDs will drop 5% to 10% in Q3, and the trend may continue into the fourth quarter if demand doesn’t improve.To read this article in full, please click here

Enterprise SSD prices are in for a drop

CPU prices may be headed north, but thanks to an oversupply of NAND flash, SSD prices across the board are declining.The cause is an oversupply combined with the threat of a recession, according to Taiwanese market research firm TrendForce. The firm said a combination of slowing demand across all segments of the NAND memory business, along with a reluctance to invest in additional capacity, has led to the glut. Related: Intel, other chipmakers warn of price hikes As a result, TrendForce predicts consumer product prices will decline 8% to 13% in the third quarter of 2022, while enterprise SSDs will drop 5% to 10% in Q3, and the trend may continue into the fourth quarter if demand doesn’t improve.To read this article in full, please click here

Ansible For Network Automation Lesson 8: Ansible And Idempotency – Video

This lesson covers the concept of idempotency and why it’s essential to Ansible. You can find the full playlist with all 8 videos on the Packet Pushers’ YouTube channel. You can subscribe to the Packet Pushers’ YouTube channel for more videos as they are published. It’s a diverse a mix of content from Ethan and […]

The post Ansible For Network Automation Lesson 8: Ansible And Idempotency – Video appeared first on Packet Pushers.

Tech Bytes: Nokia Fabric Services System Streamlines Network Automation For Application Stacks (Sponsored)

Today on the Tech Bytes podcast we welcome back sponsor Nokia to talk about a compelling feature in Nokia’s Fabric Services System. This feature, called Connect, lets Fabric Services System integrate with platforms such as VMware, OpenStack, and Kubernetes to streamline the provisioning of network services in Top Of Rack switches when new workloads or services are instantiated.

Tech Bytes: Nokia Fabric Services System Streamlines Network Automation For Application Stacks (Sponsored)

Today on the Tech Bytes podcast we welcome back sponsor Nokia to talk about a compelling feature in Nokia’s Fabric Services System. This feature, called Connect, lets Fabric Services System integrate with platforms such as VMware, OpenStack, and Kubernetes to streamline the provisioning of network services in Top Of Rack switches when new workloads or services are instantiated.

The post Tech Bytes: Nokia Fabric Services System Streamlines Network Automation For Application Stacks (Sponsored) appeared first on Packet Pushers.