Lenovo Spreads The AI Message Far And Wide

Artificial intelligence and machine learning are foundational to many of the modernization efforts that enterprises are embracing, from leveraging them to more quickly analyze the mountains of data they’re generating and automating operational processes to running the advanced applications – like natural language processing, speech and image recognition, and machine vision – needed by a broad array of industries, from financial services, agriculture, healthcare and automotive.

Lenovo Spreads The AI Message Far And Wide was written by Jeffrey Burt at The Next Platform.

What developers need to know about Docker, Docker Engine, and Kubernetes v1.20

The latest version of Kubernetes Kubernetes v1.20.0-rc.0 is now available. The Kubernetes project plans to deprecate Docker Engine support in the kubelet and support for dockershim will be removed in a future release, probably late next year. The net/net is support for your container images built with Docker tools is not being deprecated and will still work as before.

Even better news however, is that Mirantis and Docker have agreed to partner to maintain the shim code standalone outside Kubernetes, as a conformant CRI interface for Docker Engine. We will start with the great initial prototype from Dims, at https://github.com/dims/cri-dockerd and continuing to make it available as an open source project, at https://github.com/Mirantis/cri-dockerd. This means that you can continue to build Kubernetes based on Docker Engine as before, just switching from the built in dockershim to the external one. Docker and Mirantis will work together on making sure it continues to work as well as before and that it passes all the conformance tests and works just like the built in version did. Docker will continue to ship this shim in Docker Desktop as this gives a great developer experience, and Mirantis will be Continue reading

MANRS Welcomes 500th Network Operator

Today, we are glad to share a milestone for the Mutually Agreed Norms for Routing Security (MANRS) initiative: the number of participants in the network operator program has reached 500.

By joining the community-driven initiative, these network operators, big and small, from around the world have taken specific, concrete actions to improve the resilience and security of the Internet’s inherently insecure routing infrastructure.

Systemic security issues about how traffic is routed on the Internet make it a relatively easy target for criminals. MANRS helps reduce the most common routing threats and increase efficiency and transparency among Internet service providers (ISPs) on peering relationships.

The growth of the network operator program – the oldest among three today – has been accelerating in recent years. Launched in 2014 with a group of nine operators, the number of participants in the program took four years to reach 100 in 2018 and has risen sharply in the last two years, with 156 joining in 2019 and 244 so far in 2020.

The 500 network operators manage 651 autonomous systems in total, as some of them manage multiple networks.

Meanwhile, the Internet Exchange Point (IXP) program, which we launched in 2018, now has 60 Continue reading

Isovalent Harnesses eBPF for Cloud Native Security, Visibility

Veteran networking pros at Extended Berkeley Packet Filter (eBPF) technology, which makes the Linux kernel programmable, to address the ephemeral challenges of Kubernetes and microservices. “If you think about the Linux kernel, traditionally, it’s a static set of functionality that some Linux kernel developer over the course of the last 20 or 30 years decided to build and they compiled it into the Linux kernel. And it works the way that kernel developer thought about, but may not be applicable to the use case that we need to do today,” said Isovalent CEO

Fast Failover: Techniques and Technologies

Continuing our Fast Failover saga, let’s focus on techniques and technologies available to implement it (assuming you still think it’s worth the effort).

The following text is heavily based on comments Jeff Tantsura wrote on one of my LinkedIn posts as well as the original blog post. Thank you!

There are numerous technologies you can use to implement fast reroute, from the most complex to the easiest one:

Fast Failover: Techniques and Technologies

Continuing our Fast Failover saga, let’s focus on techniques and technologies available to implement it (assuming you still think it’s worth the effort).

The following text is heavily based on comments Jeff Tantsura wrote on one of my LinkedIn posts as well as the original blog post. Thank you!

There are numerous technologies you can use to implement fast reroute, from the most complex to the easiest one:

Rails Generators Cheat Sheet

As I am digging into Rails again I find myself constantly having to look the naming and syntax of generators up so I am documenting them in this post. Rails utilizes convention over configuration to speed up development and increase developer happiness. If you embrace this fact you will...

Bypassing safety check for an obviously safe change

This is less concrete technical than my usual blog post.

For every 100 changes we’re 99% sure won’t cause an outage, one will

It’s actually hard to be 99% sure of anything. I’m not 99% sure today’s Thursday. I say that because more often than one day in a hundred, I’ll think “hmm… feels like Wednesday” when it’s not.

I just closed my eyes and tried to remember what time it is. I don’t think I can guess with 99% accuracy what hour I’m in. (but to be fair, it’s de-facto Friday afternoon today, as I’m off tomorrow).

Anyway… the reason I say this is that this should be kept in mind every time someone comes and says they want to circumvent some process for a change that they are absolutely sure won’t cause an outage, that can actually be put into numbers. And those numbers are “you are not 100% sure of anything”.

By saying you are 99% sure this won’t cause an outage (and are you right about that?) you are saying that for every 100 requests like yours that will bypass normal checks, there will be an outage. You are taking on an amortized 1% of Continue reading

Broadcom Widens And Smartens Switch Chip Lineup

Cisco Systems may still be the biggest supplier of switches and routers in general, but it has long since been surpassed by Broadcom when it comes to suppling the silicon that does the switching itself and sometimes even a little bit of routing in the datacenter in particular.

Broadcom Widens And Smartens Switch Chip Lineup was written by Timothy Prickett Morgan at The Next Platform.

SUSE’s Rancher acquisition brings containerization support

SUSE’s acquisition of Rancher Labs puts the Germany-based open-source software company in a much stronger position to offer flexible, edge-based services to its customers, according to an analyst at IDC.The deal—which was originally announced this summer—essentially makes Rancher Labs into SUSE’s containerization “innovation center,” said IDC research director Gary Chen. Any customer working on digital transformation and rapid development is likely to appreciate the improved support for containerization—letting workloads function on whatever hardware is handy, and communicate across different arrangements of edge, cloud and local computing.Terms of the deal were not publicly disclosed, but a CNBC report published after the initial announcement quoted sources familiar with the deal as saying that SUSE is paying between $600 million and $700 million.To read this article in full, please click here

SUSE’s Rancher acquisition brings containerization support

SUSE’s acquisition of Rancher Labs puts the Germany-based open-source software company in a much stronger position to offer flexible, edge-based services to its customers, according to an analyst at IDC.The deal—which was originally announced this summer—essentially makes Rancher Labs into SUSE’s containerization “innovation center,” said IDC research director Gary Chen. Any customer working on digital transformation and rapid development is likely to appreciate the improved support for containerization—letting workloads function on whatever hardware is handy, and communicate across different arrangements of edge, cloud and local computing.Terms of the deal were not publicly disclosed, but a CNBC report published after the initial announcement quoted sources familiar with the deal as saying that SUSE is paying between $600 million and $700 million.To read this article in full, please click here

What is a WAN? Wide-area network definition and examples

People want to connect to all of their apps all of the time from all of their devices no matter where they are. And they pretty much can, thanks to wide-area networks (WANs).At its core, a WAN is a network of networks. The Internet itself is a giant WAN, and how you connect to it can be as diverse as through an Ethernet cable, coaxial cable, or a cellular radio signal.Your office network, home Wi-Fi, cellphone, smartwatch, doorbell camera and vehicle-based Internet connection are just endpoints on a vast global WAN that is constantly evolving to carry more traffic, and to carrt that traffic faster as the demands for near-instantaneous access to resources increase.To read this article in full, please click here

Join Docker’s Community All-Hands

Openness and transparency are key pillars of a healthy open source community. We’re constantly exploring ways to better engage the Docker community, to better incorporate feedback and to better foster participation.

To this end, we’re very excited to host our first Community All-Hands on Thursday December 10th at 8am PST / 5pm CET. This one-hour event will be a unique opportunity for Docker staff and the broader Docker community to come together for company and product updates, live demos, community shout-outs and a Q&A. 

The All-Hands will include updates from:

  • Scott Johnston (CEO, Docker) who will go over Docker’s strategic vision and where the company is heading in 2021 and beyond
  • Donnie Berkholz (VP of Products, Docker) who will walk us through our product roadmap  
  • Jean-Laurent de Morlhon (VP of Engineering, Docker) who will provide an inside peek on engineering.

We’ll then dive into specific product updates around Docker Desktop, Hub and Developer Tooling, followed by two awesome live demos where we’ll show cool new features and integrations. 

A Community All-Hands is not complete without a community update. We will announce new community initiatives and recognize outstanding contributors who have gone above and beyond to help push Docker Continue reading

BGP Training on Ignition

The first hour of material in my new BGP course over at Ignition dropped this week. I’m not going to talk about configuration and other operational things—this is all about understanding how BGP works, why it works that way, and thinking about design. This course will apply to cloud, Internet edge, DC fabric, and other uses of BGP. From the official site:

BGP is one of the fundamental protocols for routing traffic across the Internet. This course, taught by networking expert and network architect Russ White, is designed to take you from BGP basics to understanding BGP at scale. The 6-hour course will be divided into several modules. Each module will contain multiple video courses of approximately 15 minutes each that drill into key concepts. The first module contains four videos that describe how BGP works. They cover basics including reachability, building loop-free paths, BGP convergence, intra-AS models, and route reflectors.

Available here.

Insights Platform Now Live! A Deeper, Data-Driven View of the Internet

There are many people, projects, and organizations that are collecting data on various facets of the Internet, but there’s no single site that provides a curated set of insights.

To help address this gap, we’ve launched the Internet Society Insights platform to help everyone gain deeper, data-driven insight into the Internet.

One of the key deliverables of the Measuring the Internet project, we have spent the last few months building the Insights platform together with our valued development partner, Frontwerks AG.

Data and Focus Areas

We’re collating data from several trusted organizations – our data partners – and will examine Internet trends, generate reports, and tell data-driven stories about how the Internet is evolving. Insights launched with two initial focus areas, Internet Shutdowns and Enabling Technologies.

Work is continuing on three additional focus areas – Internet Resilience, the Internet Way of Networking, and Keeping Traffic Local. We aim to add data and insights on these focus areas throughout 2021 and beyond.

TLS Version adoption

Use and Share

Everyone is encouraged to use and share the text, images, and charts presented on Insights under our creative commons license.

If you would like to submit an idea for a guest post for the Continue reading

The Hedge Podcast #62: Jacob Hess and the Importance of History

At first glance, it would seem like the history of a technology would have little to do with teaching that technology. Jacob Hess of NexGenT joins us in this episode of the Hedge to help us understand why he always includes the history of a technology when teaching it—a conversation that broadened out into why learning history is important for all network engineers.

download

You can find the history of networking here.

Bootstrapping a Cluster API Management Cluster

Cluster API is, if you’re not already familiar, an effort to bring declarative Kubernetes-style APIs to Kubernetes cluster lifecycle management. (I encourage you to check out my introduction to Cluster API post if you’re new to Cluster API.) Given that it is using Kubernetes-style APIs to manage Kubernetes clusters, there must be a management cluster with the Cluster API components installed. But how does one establish that management cluster? This is a question I’ve seen pop up several times in the Kubernetes Slack community. In this post, I’ll walk you through one way of bootstrapping a Cluster API management cluster.

The process I’ll describe in this post is also described in the upstream Cluster API documentation (see the “Bootstrap & Pivot” section of this page).

At a high level, the process looks like this:

  1. Create a temporary bootstrap cluster.
  2. Make the bootstrap cluster into a temporary management cluster.
  3. Use the temporary management cluster to establish a workload cluster (through Cluster API).
  4. Convert the workload cluster into a permanent management cluster.
  5. Remove the temporary bootstrap cluster.

The following sections describe each of these steps in a bit more detail.

Create a Temporary Bootstrap Cluster

The first step is Continue reading