Container-based web applications built on microservices architecture, whether public-facing or internal, are critical to businesses. This new class of applications is commonly referred to as cloud-native applications. Read on to find out why traditional WAFs are no longer enough to protect cloud-native applications and how Calico’s new workload-centric WAF solves this problem.
HTTP is the lingua franca for modern, RESTful APIs and microservices communication. Traditionally, organizations have deployed WAF at the perimeter level to protect web applications against external attacks. A WAF provides visibility and enforces security controls on external traffic that passes through it. However, for cloud-native applications, where the concept of a perimeter does not exist, the same visibility and control need to be provided at the workload level inside the cluster.
In a survey conducted by information security research center Ponemon Institute to probe the state of the WAF market, more than 600 respondents noted the following:
Source: Ponemon Institute – “The State of Web Application Continue reading
Welcome to Ansible For Networking! There are ten video lessons in this course. This course provides a detailed overview of how Ansible works, how to create playbooks and modules, the importance of idempotency, and a walk-through using Ansible to automate tasks in a Meraki WLAN. It’s intended for network administrators and engineers who want to […]
The post Ansible For Network Automation Lesson 1: Why Ansible? – Video appeared first on Packet Pushers.


You've got big plans for your ecommerce strategy in the form of online events — seasonal sales, open registration periods, product drops, ticket sales, and more. With all the hype you've generated, you'll get a lot of site traffic, and that's a good thing! With Waiting Room Event Scheduling, you can protect your servers from being overloaded during your event while delivering a user experience that is unique to the occasion and consistent with your brand. Available now to enterprise customers with an advanced Waiting Room subscription, Event Scheduling allows you to plan changes to your waiting room’s settings and custom queueing page ahead of time, ensuring flawless execution of your online event.
We launched Waiting Room to protect our customers' servers during traffic spikes. Waiting Room sends excess visitors to a virtual queue during traffic surges, letting visitors in dynamically as spots become available on your site. By automatically queuing traffic that exceeds your site's capacity, Waiting Room protects your origin servers and your customer experience. Additionally, the Waiting Room's queuing page can be customized to match the look and feel of your site so that your users never feel as though they have left Continue reading
The acquisitions last year of Nimbix, Visual BI, and Ideal GRP by Atos signaled a more aggressive push by the European HPC vendor into the cloud and tech services space and coincided with a plan to expand beyond its legacy business and into such new growth areas. …
Pulling All the Levers For HPC In The Cloud was written by Jeffrey Burt at The Next Platform.
This video series introduces essential Kubernetes concepts for network engineers who want to learn more about containers and Kubernetes and how to support the networking requirements of Kubernetes-based applications. The series will cover the Kubernetes architecture; services, node ports, and load balancers; ingress and service mesh; and other topics that network engineers should be familiar […]
The post Kubernetes For Network Engineers: Lesson 1 – A Brief Overview Of The Kubernetes Architecture – Video appeared first on Packet Pushers.
In lesson 3, instructor Michael Levan explores the basics of connecting Kubernetes pods via kube-proxy. Michael Levan brings his background in system administration, software development, and DevOps to this video series. He has Kubernetes experience as both a developer and infrastructure engineer. He’s also a consultant and Pluralsight author, and host of the “Kubernetes Unpacked” […]
The post Kubernetes For Network Engineers: Lesson 3 – Pod-To-Pod Networking – Video appeared first on Packet Pushers.
Dynamic allocation of resources inside of a system, within a cluster, and across clusters is a bin-packing nightmare for hyperscalers and cloud builders. …
Microsoft Azure Blazes The Disaggregated Memory Trail With zNUMA was written by Timothy Prickett Morgan at The Next Platform.
While this talk is titled privacy for providers, it really applies to just about every network operator. This is meant to open a conversation on the topic, rather than providing definitive answers. I start by looking at some of the kinds of information network operators work with, and whether this information can or should be considered “private.” In the second part of the talk, I work through some of the various ways network operators might want to consider when handling private information.
Never fear, HighScalability is here!
Every cell a universe. Most detailed image of a human cell to date. @microscopicture
Other images considered: one byte of RAM in 1946; visual guide on troubleshooting Kubernetes; Cloudflare using lava lamps to generate cryptographic keys; 5MB of data looked like in 1966

This post originally appeared on the Packet Pushers’ Ignition site on March 24, 2020. In both OSPFv2 (IPv4) and OSPFv3 (IPv6), the router ID (RID) is a 32-bit number assigned to the router. The RID must be unique within the OSPF network, as a RID provides a point of origin for link state advertisements (LSAs). […]
The post Understanding OSPF Router ID (RID) Assignment appeared first on Packet Pushers.