What you can expect: AnsibleFest 2021 for IT Leaders

This year, we are adapting our signature automation event, AnsibleFest, into a free virtual experience. Seasoned pros and new Ansible enthusiasts alike can find answers and learn more about Red Hat Ansible Automation Platform, the platform for building and operating automation at scale and creating an enterprise automation strategy. We are excited to offer a track designed specifically for IT leaders

Let’s take a closer look at this track for AnsibleFest 2021.

 

IT Leaders at AnsibleFest

The role of automation for IT leaders has certainly evolved in recent years. Automation that used to be contained to domain-specific, task-bound practices has evolved to encompass full enterprises -- connecting teams and areas that were not connected before. The prospect of beginning an automation practice, or even unifying separate automation efforts, can often seem daunting. No matter where you are on your automation journey, we have a session for you.

Attendees will hear from like-minded companies about their targeted use cases and experiences with automation, sharing how they navigated their digital transformation journeys and lessons learned. We are also excited to be joined by several analysts who will share their insights and perspectives.

If you are experienced with the Ansible Automation Continue reading

Bringing OAuth 2.0 to Wrangler

Bringing OAuth 2.0 to Wrangler

Over the course of this summer, I had the incredible opportunity to join the Workers Developer Productivity team and help improve the developer experience of Workers. Today, I’ll talk about my project to implement the OAuth 2.0 login protocol for Wrangler, the Workers command line interface (CLI).

Wrangler needs to be authorized in order to carry out its job. API tokens are one way to authorize Wrangler, but they do not provide the best user experience as the user needs to manually copy and paste their tokens. This is where the OAuth 2.0 protocol comes into play.

Bringing OAuth 2.0 to Wrangler

Wrangler login and OAuth 2.0

Previously, the wrangler login command used API tokens to authenticate Wrangler. However, managing API tokens can sometimes be cumbersome, since you need to go to the Cloudflare dashboard to create or modify a token. By using OAuth 2.0, we can allow users to directly choose permissions or scopes from Wrangler. OAuth 2.0 helps simplify the login process while making it more secure.

OAuth 2.0 is an industry-standard protocol for allowing users to authorize applications without having to share a password. In order to understand this protocol, we need to define some Continue reading

What Are Mesh Routers For Wi-Fi

There may be many reasons as to why the Wi-Fi at your house does not work. Weakened Wi-Fi signals could be a result of any physical obstruction or it can also be caused by dead spots. This is the reason as to why the Wi-Fi at your home does not work well. But what can we do to fix this problem? Is this even a problem? Yes definitely it is a problem. Weakened Wi-Fi means nothing but slow internet connectivity which means that you might not be able to join your online class on time, might miss the meeting, might not be able to send in the email to your boss or simply just experience a pause at life. In the rowing times people almost across the globe are highly dependent on Wi-Fi and internet connectivity. Having a slow internet can defiantly become a headache for many of us. The solution can be simple: a mesh router for Wi-Fi or full home Wi-Fi is the most ideal solution

How Does It Work?

Think of a scenario where you want to play music in the entire house, now ideally if you lay music in front porch the backyard will only get Continue reading

Building a Small Data Center Fabric with Four Switches

One of my subscribers has to build a small data center fabric that’s just a tad too big for two switch design.

For my datacenter I would need two 48 ports 10GBASE-T switches and two 48 port 10/25G fibber switches. So I was watching the Small Fabrics and Lower-Speed Interfaces part of Physical Fabric Design to make up my mind. There you talk about the possibility to do a leaf and spine with 4 switches and connect servers to the spine.

A picture is worth a thousand words, so here’s the diagram of what I had in mind:

Building a Small Data Center Fabric with Four Switches

One of my subscribers has to build a small data center fabric that’s just a tad too big for two switch design.

For my datacenter I would need two 48 ports 10GBASE-T switches and two 48 port 10/25G fibber switches. So I was watching the Small Fabrics and Lower-Speed Interfaces part of Physical Fabric Design to make up my mind. There you talk about the possibility to do a leaf and spine with 4 switches and connect servers to the spine.

A picture is worth a thousand words, so here’s the diagram of what I had in mind:

Guide to NSX Security at VMworld 2021

The world is changing and as a result, the ability to operationalize network security at scale is more important than ever. Organizations need the ability to monitor and protect both East-West and North-South traffic at scale without adding operational complexity or impacting the user experience. How do organizations do all this in the face of reduced budgets, increasing network complexity, radical changes throughout IT architectures and an increase in volume and sophistication of cybersecurity threats?

We’ll show you at VMworld 2021 with sessions dedicated to helping you operationalize network security at scale in today’s modern world.

To register or learn more about VMworld, visit the portal. Without further ado, check out our quick guide to NSX Security sessions at this year’s event.

Keynote

Multi-Cloud

Firewall

Threat Prevention

14 things you need to know about data storage management

When it comes to storing data, there is no ‘one-size-fits-all’ solution, so before you decide where or how to store your data, first understand the amount and type you have and why you need to store it.How to make sure data that should be backed up gets backed up So how do you formulate a sound data-storage management strategy? IDG asked dozens of storage and data management experts, which resulted in these top 14 suggestions regarding what steps you need to take to choose the right data storage solution(s) for your organization—and how you can better ensure your data is properly protected and retrievable.To read this article in full, please click here

14 things you need to know about data storage management

When it comes to storing data, there is no ‘one-size-fits-all’ solution, so before you decide where or how to store your data, first understand the amount and type you have and why you need to store it.How to make sure data that should be backed up gets backed up So how do you formulate a sound data-storage management strategy? IDG asked dozens of storage and data management experts, which resulted in these top 14 suggestions regarding what steps you need to take to choose the right data storage solution(s) for your organization—and how you can better ensure your data is properly protected and retrievable.To read this article in full, please click here

Why securing internet-facing applications is challenging in a Kubernetes environment

Internet-facing applications are some of the most targeted workloads by threat actors. Securing this type of application is a must in order to protect your network, but this task is more complex in Kubernetes than in traditional environments, and it poses some challenges. Not only are threats magnified in a Kubernetes environment, but internet-facing applications in Kubernetes are also more vulnerable than their counterparts in traditional environments. Let’s take a look at the reasons behind these challenges, and the steps you should take to protect your Kubernetes workloads.

 

Threats are magnified in a Kubernetes environment

One of the fundamental challenges in a Kubernetes environment is that there is no finite set of methods that exist in terms of how workloads can be attacked. This means there are a multitude of ways an internet-facing application could be compromised, and a multitude of ways that such an attack could propagate within the environment.

Kubernetes is designed in such a way that allows anything inside a cluster to communicate with anything else inside the cluster by default, essentially giving an attacker who manages to gain a foothold unlimited access and a large attack surface. Because of this design, any time you have Continue reading

Hedge 101: In Situ OAM

Understanding the flow of a packet is difficult in modern networks, particularly data center fabrics with their wide fanout and high ECMP counts. At the same time, solving this problem is becoming increasingly important as quality of experience becomes the dominant measure of the network. A number of vendor-specific solutions are being developed to solve this problem. In this episode of the Hedge, Frank Brockners and Shwetha Bhandari join Alvaro Retana and Russ White to discuss the in-situ OAM work currently in progress in the IPPM WG of the IETF.

download

Day Two Cloud 116: Emotional Intelligence, Hard Conversations, And Other Essential Management Skills

Guest Shelley Benhoff stops by the Day Two Cloud podcast to discuss essential skills for moving into tech management, and how to decide if management is the right career path for you. Shelley has twenty years' experience in IT as a developer and manager, runs a tech training company, and is a Pluralsight instructor.

The post Day Two Cloud 116: Emotional Intelligence, Hard Conversations, And Other Essential Management Skills appeared first on Packet Pushers.

IS-IS Flooding Details

Last week I published an unrolled version of Peter Paluch’s explanation of flooding differences between OSPF and IS-IS. Here’s the second part of the saga: IS-IS flooding details (yet again, reposted in a more traditional format with Peter’s permission).


In IS-IS, DIS1 is best described as a “baseline benchmark” – a reference point that other routers compare themselves to, but it does not sit in the middle of the flow of updates (Link State PDUs, LSPs).

A quick and simplified refresher on packet types in IS-IS: A LSP carries topological information about its originating router – its System ID, its links to other routers and its attached prefixes. It is similar to an OSPF LSU containing one or more LSAs of different types.

IS-IS Flooding Details

Last week I published an unrolled version of Peter Paluch’s explanation of flooding differences between OSPF and IS-IS. Here’s the second part of the saga: IS-IS flooding details (yet again, reposted in a more traditional format with Peter’s permission).


In IS-IS, DIS1 is best described as a “baseline benchmark” – a reference point that other routers compare themselves to, but it does not sit in the middle of the flow of updates (Link State PDUs, LSPs).

A quick and simplified refresher on packet types in IS-IS: A LSP carries topological information about its originating router – its System ID, its links to other routers and its attached prefixes. It is similar to an OSPF LSU containing one or more LSAs of different types.

Enter the NSX Giveaway – Tune In on LinkedIn

?  Do you remember the 21st night of September? ?

At VMware NSX, we sure do – and you can bet we’ll be dancing to Earth, Wind & Fire all September long. Whether or not this is your September song of choice, there’s no better way to listen to your favorite tunes than on a top-notch speaker. VMware NSX wants to help by giving away new portable Sonos Roam Speakers that you can bring wherever your grooving takes you.

Yep, you heard us – we’re hosting a giveaway! Entering for a chance to win is easy, too: just follow our new Networking & Security LinkedIn.

For an extra entry, tag a friend or colleague who would enjoy NSX content in the comments of the announcement post.

We’ll select winners from our new followers after the giveaway closes on Oct. 14, 2021. In the meantime, we’ll be listening to “September” on repeat. ?

This giveaway is limited to those living in the US. If you live somewhere else you can still participate, but we may not be able to deliver your prize. See full Terms and Conditions below. If you have questions, reach out to us on LinkedIn or Twitter. 

 

Continue reading

Lenovo extends TruScale as-a-service model to its entire portfolio

Lenovo is expanding its TruScale pay-per-use model to cover all its data-center products—servers, storage—and client-side devices—laptops, tablets.This transition to a fully integrated, end-to-end, as-a-service model is part of the company’s “One Lenovo” strategy of providing its entire portfolio of clients and servers as a fully managed, on-premises cloud environment through TruScale leasing.One Lenovo simply means laptops and desktops will be sold along with data-center products together all under one sales program. Lenovo will launch a new channel program in 2022 to encompass the One Lenovo strategy.The everything-as-a-service announcement came at the company’s virtual Lenovo Tech World 2021 eventTo read this article in full, please click here