Installing Cilium via a ClusterResourceSet

In this post, I’m going to walk you through how to install Cilium onto a Cluster API-managed workload cluster using a ClusterResourceSet. It’s reasonable to consider this post a follow-up to my earlier post that walked you through using a ClusterResourceSet to install Calico. There’s no need to read the earlier post, though, as this post includes all the information (or links to the information) you need. Ready? Let’s jump in!

Prerequisites

If you aren’t already familiar with Cluster API—hereafter just referred to as CAPI—then I would encourage you to read my introduction to Cluster API post. Although it is a bit dated (it was written in the very early days of the project, which recently released version 1.0). Some of the commands referenced in that post have changed, but the underlying concepts remain valid. If you’re not familiar with Cilium, check out their introduction to the project for more information. Finally, if you’re not familiar at all with the idea of ClusterResourceSets, you can read my earlier post or check out the ClusterResourceSet CAEP document.

Installing Cilium via a ClusterResourceSet

If you want to install Cilium via a ClusterResourceSet, the process looks something like this:

  1. Create Continue reading

The Advantages and Challenges of Going ‘Edge Native’

As the internet fills every nook and cranny of our lives, it runs into greater complexity for developers, operations engineers, and the organizations that employ them. How do you reduce latency? How do you comply with the regulations of each region or country where you have a virtual presence? How do you keep data near where it’s actually used? For a growing number of organizations, the answer is to use the edge. In this episode of the New Stack Makers podcast, Sheraline Barthelmy, head of product,  marketing and customer success for Cox Edge, were joined by The Advantages and Challenges of Going ‘Edge Native’ Also available on Google Podcasts, PlayerFM, Spotify, TuneIn The edge is composed of servers that are physically located close to the customers who will use them — the “last Continue reading

Waiting Room: Random Queueing and Custom Web/Mobile Apps

Waiting Room: Random Queueing and Custom Web/Mobile Apps
Waiting Room: Random Queueing and Custom Web/Mobile Apps

Today, we are announcing the general availability of Cloudflare Waiting Room to customers on our Enterprise plans, making it easier than ever to protect your website against traffic spikes. We are also excited to present several new features that have user experience in mind — an alternative queueing method and support for custom web/mobile applications.

First-In-First-Out (FIFO) Queueing

Waiting Room: Random Queueing and Custom Web/Mobile Apps

Whether you’ve waited to check out at a supermarket or stood in line at a bank, you’ve undoubtedly experienced FIFO queueing. FIFO stands for First-In-First-Out, which simply means that people are seen in the order they arrive — i.e., those who arrive first are processed before those who arrive later.

When Waiting Room was introduced earlier this year, it was first deployed to protect COVID-19 vaccine distributors from overwhelming demand — a service we offer free of charge under Project Fair Shot. At the time, FIFO queueing was the natural option due to its wide acceptance in day-to-day life and accurate estimated wait times. One problem with FIFO is that users who arrive later could see long estimated wait times and decide to abandon the website.

We take customer feedback seriously and improve products based on it. A frequent request Continue reading

From the Desk of the CEO: Pluribus Raises $20M from Morgan Stanley Expansion Capital to Fuel Growth

To the Pluribus Networks community:

Today, Pluribus Networks announced a funding round of $20 million led by Morgan Stanley Expansion Capital. This is an extremely exciting time for our company and for the industry, and the capital raised during this round will enable Pluribus to increase R&D and add sales and marketing capacity to accelerate its growth in the distributed cloud market, as well as expand into adjacent segments. In the coming months, we’ll be announcing a number of new product and partner initiatives that reflect the market’s increasing need for cost-effective and highly-automated data center networking fabric solutions.

The timing around this funding news is truly ideal. Industry analysts are consistently forecasting an increase in market opportunities around data center switching as digital transformation continues to accelerate globally – Dell ’Oro Group expects the market to surpass $20 billion by 2025. Furthermore, research completed this year by Enterprise Management Associates shows that the majority of enterprises are increasing their number of data center sites and over 80% intend to deploy active-active data centers to support availability zones. In that same research enterprises identify their top two challenges as network operational complexity and network architecture complexity. Pluribus Networks’ Netvisor® Continue reading

What’s new in Ansible Automation Platform 2: automation content navigator

AAP 2 gray sliding a

With the introduction of Red Hat Ansible Automation Platform 2, several new key components are being introduced as a part of the overall developer experience. This includes automation execution environments, introduced to provide predictable environments during automation runtime. All collection dependencies are contained within the execution environment to make sure that automation created in development environments runs the same as in production environments.

Building execution environments is now easier with the introduction of the execution environment builder (ansible-builder) tool included with Ansible Automation Platform, while the updates to automation controller help IT teams leverage execution environments.

Considering the shift towards containerized execution of automation, the automation development workflow and pre-existing tooling must be reimagined. In short, ansible-navigator replaces ansible-playbook and other ansible-*` command line utilities.

However, ansible-navigator serves a much greater purpose than just a drop in replacement or alias to ansible-playbook. With this release, ansible-navigator is introduced as an application exclusively for developing and executing automation. Ansible-playbook has long been one of the first utilities that is leveraged in an Ansible automated environment. Building on the ease of use, the automation content navigator exposes automation runs in greater detail. Apart from debugging Continue reading

Ananki startup tries to simplify private 5G

A startup using open-source components to offer software-defined private 5G as a service hopes to attract enterprises with an architecture that it says is as simple as Wi-Fi's. 5G resources How 5G frequency affects range and speed Private 5G can solve some problems that Wi-Fi can’t Private 5G keeps Whirlpool driverless vehicles rolling 5G can make for cost-effective private backhaul CBRS can bring private 5G to enterprises Called Ananki, the company requires little of enterprises in order to deploy the service: Customers set up small-cell 5G radios on-site, point them toward a cloud network running the Ananki software, install SIMs on the enterprise hardware that will tap into the service, and Ananki’s automation remotely configures the radios and provisions the SIMs.To read this article in full, please click here

Kioxia seeks to make the SSD more programmable

NAND flash maker Kioxia has expanded its Software-Enabled Flash technology to bring a greater degree of programmability to NAND storage. The move will benefit hyperscalers the most but will have benefits for enterprises and SMBs as well.Kioxia (formerly Toshiba) first introduced SEF last year. It’s an open-source API that operates as a new kind of hardware flash controller to offload some functions to a controller, thus freeing up the CPU, while allowing large data-center environments to manage at scale.Because the API is open source, competitors in the flash space can adopt the API and customize it for their hardware. Hyperscalers think about SSDs in terms of deploying and serving workloads at scale. Kioxia notes that cloud providers often have different types of drives they deploy for different use cases, like block storage versus file storage or ZNS.To read this article in full, please click here

Kioxia seeks to make the SSD more programmable

NAND flash maker Kioxia has expanded its Software-Enabled Flash technology to bring a greater degree of programmability to NAND storage. The move will benefit hyperscalers the most but will have benefits for enterprises and SMBs as well.Kioxia (formerly Toshiba) first introduced SEF last year. It’s an open-source API that operates as a new kind of hardware flash controller to offload some functions to a controller, thus freeing up the CPU, while allowing large data-center environments to manage at scale.Because the API is open source, competitors in the flash space can adopt the API and customize it for their hardware. Hyperscalers think about SSDs in terms of deploying and serving workloads at scale. Kioxia notes that cloud providers often have different types of drives they deploy for different use cases, like block storage versus file storage or ZNS.To read this article in full, please click here

Should You Build or Buy a Router?

Patrik Schindler sent me an interesting comment to my Open-Source DMVPN Alternatives blog post:

I’ve done searches myself some time ago about the readymade Linux distros supporting DMVPN and got exactly what I asked for.

Glancing over that page appalled me: Different stuff with different configuration languages, probably the need to restart things, thus generating service outages for configuration changes…

Your blog is heavily biased towards big deployments with good opportunities for automation, and the diversity of different components can be easily hidden behind automation scripts of choice. Smaller deployments are almost never being able to compensate the initial overhead of creating all the automation fuzz, and from that perspective, I must admit that configuring a Cisco router feels way more smooth to me.

Welcome to the build-or-buy dilemma, router edition.

Should You Build or Buy a Router?

Patrik Schindler sent me an interesting comment to my Open-Source DMVPN Alternatives blog post:

I’ve done searches myself some time ago about the readymade Linux distros supporting DMVPN and got exactly what I asked for.

Glancing over that page appalled me: Different stuff with different configuration languages, probably the need to restart things, thus generating service outages for configuration changes…

Your blog is heavily biased towards big deployments with good opportunities for automation, and the diversity of different components can be easily hidden behind automation scripts of choice. Smaller deployments are almost never being able to compensate the initial overhead of creating all the automation fuzz, and from that perspective, I must admit that configuring a Cisco router feels way more smooth to me.

Welcome to the build-or-buy dilemma, router edition.

Update on recent VoIP attacks: What should I do if I’m attacked?

Update on recent VoIP attacks: What should I do if I’m attacked?
Update on recent VoIP attacks: What should I do if I’m attacked?

Attackers continue targeting VoIP infrastructure around the world. In our blog from last week, May I ask who’s calling, please? A recent rise in VoIP DDoS attacks, we reviewed how the SIP protocol works, ways it can be abused, and how Cloudflare can help protect against attacks on VoIP infrastructure without impacting performance.

Cloudflare’s network stands in front of some of the largest, most performance-sensitive voice and video providers in the world, and is uniquely well suited to mitigating attacks on VoIP providers.

Because of the sustained attacks we are observing, we are sharing details on recent attack patterns, what steps they should take before an attack, and what to do after an attack has taken place.

Below are three of the most common questions we’ve received from companies concerned about attacks on their VoIP systems, and Cloudflare’s answers.

Question #1: How is VoIP infrastructure being attacked?

The attackers primarily use off-the-shelf booter services to launch attacks against VoIP infrastructure. The attack methods being used are not novel, but the persistence of the attacker and their attempts to understand the target’s infrastructure are.

Attackers have used various attack vectors to probe the existing defenses of targets and try to Continue reading

VMworld 2021: VMware to pack more security into NSX

When it comes to protecting data-center-based resources in the highly distributed world, traditional security hardware and software components just aren’t going to cut it.That’s the bottom line for enterprises as they move to distributed digital environments according to Tom Gillis, senior vice president and general manager of VMware’s networking & advanced security business group. The idea is that security needs to be put deep into the infrastructure fabric and protect workloads across their lifecycle, Gillis said during an interview with Network World at the company’s VMworld virtual conference.To read this article in full, please click here

VMworld 2021: VMware to pack more security into NSX

When it comes to protecting data-center-based resources in the highly distributed world, traditional security hardware and software components just aren’t going to cut it.That’s the bottom line for enterprises as they move to distributed digital environments according to Tom Gillis, senior vice president and general manager of VMware’s networking & advanced security business group. The idea is that security needs to be put deep into the infrastructure fabric and protect workloads across their lifecycle, Gillis said during an interview with Network World at the company’s VMworld virtual conference.To read this article in full, please click here

VMworld 2021: VMware to pack more security into NSX

When it comes to protecting data-center-based resources in the highly distributed world, traditional security hardware and software components just aren’t going to cut it.That’s the bottom line for enterprises as they move to distributed digital environments according to Tom Gillis, senior vice president and general manager of VMware’s networking & advanced security business group. The idea is that security needs to be put deep into the infrastructure fabric and protect workloads across their lifecycle, Gillis said during an interview with Network World at the company’s VMworld virtual conference.To read this article in full, please click here

Learning from Facebook’s Mistakes

On October 4th Facebook managed to achieve one of the more impactful of outages of the entire history of the Internet, assuming that the metric of "impact" is how many users one can annoy with a single outage. What can we as an industry learn from this outage to ensure that we can avoid a recurrence of such a widespread outage in other important and popular service platforms?

Hedge 103: BGP Security with Geoff Huston

Our community has been talking about BGP security for over 20 years. While MANRS and the RPKI have made some headway in securing BGP, the process of deciding on a method to provide at least the information providers need to make more rational decisions about the validity of individual routes is still ongoing. Geoff Huston joins Alvaro, Russ, and Tom to discuss how we got here and whether we will learn from our mistakes.

download