Introduction To gRPC

As the world of network automation continues to evolve, we are seeing different options emerge in how we programmatically interface with our devices. In this episode we take a look at one of the newest and more interesting methods, gRPC. gRPC was developed by Google as a way to execute remote procedure calls in the orchestration of their system and includes such concepts as Protocol Buffers, authentication, bidirectional streaming, and flow control. Join us as we dive into how gRPC works, why it’s different than what you may already know, and why you may want to look into using it to orchestrate your infrastructure.

Nick Russo
Guest
Darren O'Connor
Guest
Tony Efantis
Host
Jordan Martin
Host

Outro Music:
Danger Storm Kevin MacLeod (incompetech.com)
Licensed under Creative Commons: By Attribution 3.0 License
http://creativecommons.org/licenses/by/3.0/

The post Introduction To gRPC appeared first on Network Collective.

The History of Identity with Pamela Dingle

While identity is not directly a networking technology, it is closely adjacent to networking, and a critical part of the Internet’s architecture. In this episode of the History of Networking, Pamela Dingle joins Donald Sharpe and Russ White to discuss the humble beginnings of modern identity systems, including NDS and Streettalk.

download

Docker Series B: More Fuel To Help Dev Teams Get Ship Done

Today we’re excited and humbled to announce Docker’s Series B raise of $23 million to accelerate our mission of delivering tools development teams love to quickly take their ideas from code to cloud. The round was led by Tribe Capital with participation from our existing investors, Benchmark and Insight Partners. Arjun Sethi, Tribe co-founder and partner, will join the Docker board. 

This would not have been possible without the Docker team: Thank you for giving each other your best, every day, despite the disruptions of the refocusing, the pandemic, the overnight switch to work-from-home, and so much more. We also thank our developer community of users, contributors, customers, partners, and Docker Captains – your enthusiastic engagement throughout this past year was invaluable.

Hit Refresh

Tribe sees in Docker what we saw in November 2019 when we refocused the company: the opportunity to build on the bottoms-up developer love of the Docker experience and provide a collaborative app development platform for development teams to accelerate getting their ideas from code to cloud. And that’s just what we did.

Key inputs to Tribe’s investment decision were our results this last year, which included attracting 80,000 developer participants to DockerCon 2020, adding Continue reading

Full Stack Journey 052: Scaling Infrastructure As Code Beyond A Single Engineer

Infrastructure as Code (IaC) can work great for a single user, but what happens when lots of people are pushing changes? Scott Lowe and guest Tim Davis talk about the challenges of scaling IaC beyond a single engineer and provide practical insight into ways to address these challenges. Tim is Developer Advocate at Env0.

The post Full Stack Journey 052: Scaling Infrastructure As Code Beyond A Single Engineer appeared first on Packet Pushers.

Automatic Platform Optimization post-launch report

Automatic Platform Optimization post-launch report

Last year during Birthday Week, we announced Automatic Platform Optimization for WordPress (APO): smart HTML caching for WordPress sites using Cloudflare. Initial testing across various WordPress sites demonstrated significant improvements in performance metrics like Time to First Byte (TTFB), First Contentful Paint (FCP), and Speed Index. We wanted to measure how APO impacted web performance for our customers since the launch.

In the blog post, we answer the following questions:

  • How fast is Automatic Platform Optimization? Can you demonstrate it with data?

We will show real-world improvements for several performance metrics.

  • Is Automatic Platform Optimization flexible enough to integrate smoothly with my WordPress site?

We have added and improved lots of features since the initial launch.

  • Will Automatic Platform Optimization work when used with other plugins?

We will cover the most common use cases and explain how Automatic Platform Optimization could be fined-tuned.

Measuring performance with WebPageTest

We use WebPageTest as a go-to tool for synthetic testing at Cloudflare. It measures web performance metrics in real browsers, is highly programmable, and could scale to test millions of sites per day. Among the benefits of synthetic testing are easy to produce results and their relatively high reproducibility.

Automatic Platform Optimization Continue reading

Ransomware: How to make sure backups are ready for a real attack

The best way to avoid paying ransom to attackers who have infected your systems with ransomware is to have those systems adequately backed up so you can wipe them and restore them from safe backups. Here are several options for making sure those backups are up to the task.In this article, backup refers to any system that you're going to use to respond to a ransomware attack, including old-school backup systems, replication systems, and modern hybrid systems that support backup and disaster recover. For simplicity’s sake, they’ll all be referred to as backup here. More about backup and recovery:To read this article in full, please click here

Ransomware: How to make sure backups are ready for a real attack

The best way to avoid paying ransom to attackers who have infected your systems with ransomware is to have those systems adequately backed up so you can wipe them and restore them from safe backups. Here are several options for making sure those backups are up to the task.In this article, backup refers to any system that you're going to use to respond to a ransomware attack, including old-school backup systems, replication systems, and modern hybrid systems that support backup and disaster recover. For simplicity’s sake, they’ll all be referred to as backup here. More about backup and recovery:To read this article in full, please click here

Ransomware: How to make sure backups are ready for a real attack

The best way to avoid paying ransom to attackers who have infected your systems with ransomware is to have those systems adequately backed up so you can wipe them and restore them from safe backups. Here are several options for making sure those backups are up to the task.In this article, backup refers to any system that you're going to use to respond to a ransomware attack, including old-school backup systems, replication systems, and modern hybrid systems that support backup and disaster recover. For simplicity’s sake, they’ll all be referred to as backup here. More about backup and recovery:To read this article in full, please click here

Using YAML Instead of Excel in Network Automation Solutions

One of the attendees of our network automation course asked a question along these lines:

In a previous Ansible-based project I used Excel sheet to contain all relevant customer data. I converted this spreadsheet using python (xls_to_fact) and pushed the configurations to network devices accordingly. I know some people use YAML to define the variables in Git. What would be the advantages of doing that over Excel/xsl_to_fact?

Whenever you’re choosing a data store for your network automation solution you have to consider a number of aspects including:

Using YAML Instead of Excel in Network Automation Solutions

One of the attendees of our network automation course asked a question along these lines:

In a previous Ansible-based project I used Excel sheet to contain all relevant customer data. I converted this spreadsheet using python (xls_to_fact) and pushed the configurations to network devices accordingly. I know some people use YAML to define the variables in Git. What would be the advantages of doing that over Excel/xsl_to_fact?

Whenever you’re choosing a data store for your network automation solution you have to consider a number of aspects including:

Network Validation

What does Network Validation mean practically? Of course, there’s no official description of what it means, but we can talk about what we would like it to mean so that it can be useful. What we are trying to get to is a network that is trustworthy. If the business...

Docker Compose: From Local to Amazon ECS

By using cloud platforms, we can take advantage of different resource configurations and compute capacities. However, deploying containerized applications on cloud platforms is proving to be quite challenging, especially for new users who have no expertise on how to use that platform. As each platform may provide specific APIs, orchestrating the deployment of a containerized application can become a hassle.

Docker Compose is a very popular tool used to manage containerized applications deployed on Docker hosts. Its popularity is maybe due to the simplicity on how to define an application and its components in a Compose file and the compact commands to manage its deployment.

Since cloud platforms for containers have emerged, being able to deploy a Compose application on them is a most-wanted feature by many developers that use Docker Compose for their local development.

In this blog post, we discuss how to use Docker Compose to deploy containerized applications to Amazon ECS. We aim to show how the transition from deploying to a local Docker environment to deploying to Amazon ECS is effortless, the application being managed in the same way for both environments.

Requirements

In order to exercise the examples in this blogpost, the following tools need Continue reading

Cisco SD-WAN: vManage, vBond, and vMSmart On-Prem Installation Process.

 



Introduction

This section explains the process how to build an on-prem Cisco Viptela based SD-WAN control plane system. It starts by setting up an enterprise Certificate Server using the Cisco CSR1000V cloud router. Next, it goes through the process of root certificate generation. The rest of the chapter explains the initial configuration and certification installation processes from vManage, vBond, and vSmart viewpoints.

Figure 1-1: Control-Plane Components Topology.

Continue reading

Cisco grows UCS server family with high-powered AMD processor

Cisco has bulked-up its rack server offering with new models that promise to deliver low latency and high-speed computing needed for hybrid-cloud and financial workloads.The new servers are part of Cisco’s Unified Computing System (UCS) family and are built with AMD’s new EPYC 7003 processors, which feature up to 64 Zen 3 cores per processor and a variety of performance and security features.Still not dead: The mainframe hangs on sustained by Linux and hybrid cloud Cisco and AMD have worked together on server offerings since 2018 when Cisco first  partnered with AMD to better contend with competitors such as Dell and HP. To read this article in full, please click here

Cisco grows UCS server family with high-powered AMD processor

Cisco has bulked-up its rack server offering with new models that promise to deliver low latency and high-speed computing needed for hybrid-cloud and financial workloads.The new servers are part of Cisco’s Unified Computing System (UCS) family and are built with AMD’s new EPYC 7003 processors, which feature up to 64 Zen 3 cores per processor and a variety of performance and security features.Still not dead: The mainframe hangs on sustained by Linux and hybrid cloud Cisco and AMD have worked together on server offerings since 2018 when Cisco first  partnered with AMD to better contend with competitors such as Dell and HP. To read this article in full, please click here