ACI Fabric Access Policies Part 1: VLAN Pool

 

Introduction

 

Everything in ACI is managed as an Object. Each object belongs to a certain Class. As an example, when we create a VLAN Pool, we create an object that belongs to Class VlanInstP. Classes, in turn, are organized in Packages, Class VlanInstP belongs to Package fvns (fv = fabric virtualization, ns namespace). Figure 1-1 illustrates the classes that we are using in this chapter when we create Fabric Access Policies. Lines with an arrow represent Parent-Child structure and dotted lines represent a relationship (Rs) between classes. We will get back to Rs in becoming sections.



Figure 1-1: ACI Fabric Access Policies.

Continue reading

Docker and Snyk Extend Partnership to Docker Official and Certified Images

Today we are pleased to announce that Docker and Snyk have extended our existing partnership to bring vulnerability scanning to Docker Official and certified images. As the exclusive scanning partner for these two image categories, Snyk will work with Docker to provide developers with insights into our most popular images. It builds on our previous announcement earlier this year where Snyk scanning was integrated into the Docker Desktop and Docker Hub. This means that developers can now incorporate vulnerability assessment along each step of the container development and deployment process.

Docker Official images represent approximately 25% of all of the pull activity on Docker Hub. Docker Official images are used extensively by millions of developers and developer world wide teams to build and run tens of millions of containerized applications. By integrating vulnerability scanning from Snyk users are now able to get more visibility into the images and have a higher level of confidence that their applications are secure and ready for production.

Docker Official images that have been scanned by Snyk will be available early next year.

You can read more about it from Snyk here and you can catch Docker CEO Scott Johnson and Snyk CEO Peter McKay Continue reading

Gartner: COVID-era infrastructure trends you should know about

COVID-19 has turned the world inside out, and the impact on infrastructure and operations teams is significant.That's the conclusion of Gartner research vice president Jeffrey Hewitt, who detailed the core infrastructure trends that IT executives can expect to see in the next 12-18 months. Hewitt shared the research at Gartner's IT Symposium/Xpo 2020 Americas event, which is being held virtually this week. (Related story: Gartner's top 9 strategic technology trends for 2021)"The situations created by COVID-19 have had a significant impact on the world," Hewitt said. "This impact is having an influence on almost all of the trends that infrastructure and operations leaders will be facing going forward."To read this article in full, please click here

Gartner: COVID-era infrastructure trends you should know about

COVID-19 has turned the world inside out, and the impact on infrastructure and operations teams is significant.That's the conclusion of Gartner research vice president Jeffrey Hewitt, who detailed the core infrastructure trends that IT executives can expect to see in the next 12-18 months. Hewitt shared the research at Gartner's IT Symposium/Xpo 2020 Americas event, which is being held virtually this week. (Related story: Gartner's top 9 strategic technology trends for 2021)"The situations created by COVID-19 have had a significant impact on the world," Hewitt said. "This impact is having an influence on almost all of the trends that infrastructure and operations leaders will be facing going forward."To read this article in full, please click here

Day Two Cloud 071: It’s Not Too Late To Make DevOps Work

Technology is accelerating like crazy, with new tools, services, open-source projects, and processes. If you're trying to make DevOps work in your organization, you might feel like you're perpetually behind. This Day Two Cloud episode is here to say: You're going to be OK. You can still engage with DevOps to move your career and your organization forward. Our guest to tell you how is April Edwards, a Senior Software Engineer at Microsoft.

Day Two Cloud 071: It’s Not Too Late To Make DevOps Work

Technology is accelerating like crazy, with new tools, services, open-source projects, and processes. If you're trying to make DevOps work in your organization, you might feel like you're perpetually behind. This Day Two Cloud episode is here to say: You're going to be OK. You can still engage with DevOps to move your career and your organization forward. Our guest to tell you how is April Edwards, a Senior Software Engineer at Microsoft.

The post Day Two Cloud 071: It’s Not Too Late To Make DevOps Work appeared first on Packet Pushers.

Dell launches Apex, a per-use hardware-leasing program

All of the major IT hardware suppliers to one degree or other have adopted a consumption model, which is a fancy word for leasing. Rather than the outright purchase of hardware, customers lease it, usage is monitored, and the customer pays a monthly use fee.Now Dell Technologies has announced it is expanding its as-a-service capabilities with Project APEX, to simplify how customers and partners access Dell technology on-demand.APEX will cover an array of Dell products —storage, servers, networking, hyperconverged infrastructure, PCs, and broader solutions. Project APEX will unify the company’s as-a-service and cloud strategies, technology offerings, and go-to-market efforts previously sold under the On Demand monicker.To read this article in full, please click here

Dell launches Apex, a per-use hardware-leasing program

All of the major IT hardware suppliers to one degree or other have adopted a consumption model, which is a fancy word for leasing. Rather than the outright purchase of hardware, customers lease it, usage is monitored, and the customer pays a monthly use fee.Now Dell Technologies has announced it is expanding its as-a-service capabilities with Project APEX, to simplify how customers and partners access Dell technology on-demand.APEX will cover an array of Dell products —storage, servers, networking, hyperconverged infrastructure, PCs, and broader solutions. Project APEX will unify the company’s as-a-service and cloud strategies, technology offerings, and go-to-market efforts previously sold under the On Demand monicker.To read this article in full, please click here

The Cloudflare Radar 2020 Elections Dashboard

The Cloudflare Radar 2020 Elections Dashboard
The Cloudflare Radar 2020 Elections Dashboard

There is significant global attention around the upcoming United States election. Through the Athenian Project and Cloudflare for Campaigns, Cloudflare is providing free protection from cyber attacks to a significant number of state and local elections' websites, as well as those of federal campaigns.

One of the bedrocks of a democracy is that people need to be able to get access to relevant information to make a choice about the future of their country. This includes information about the candidates up for election; learning about how to register, and how to cast a vote; and obtaining accurate information on the results.

A question that I’ve been increasingly asked these past few months: are cyberattacks going to impact these resources leading up to and on election day?

Internally, we have been closely monitoring attacks on the broader elections and campaign websites and have a team standing by 24x7 to help our current customers as well as state and local governments and eligible political campaigns to protect them at no cost from any cyberattacks they may see.

The good news is that, so far, cyberattacks have not been impacting the websites of campaigns and elections officials we are monitoring and protecting. Continue reading

Validate Ansible YAML Data with JSON Schema

When I published the Optimize Network Data Models series a long while ago, someone made an interesting comment along the lines of “You should use JSON Schema to validate the data model.

It took me ages to gather the willpower to tame that particular beast, but I finally got there. In the next installment of the Data Models saga I described how you can use JSON Schema to validate Ansible inventory data and your own YAML- or JSON-based data structures.

To learn more about data validation, error handling, unit- and system testing, and CI/CD pipelines in network automation, join our automation course.

Validate Ansible YAML Data with JSON Schema

When I published the Optimize Network Data Models series a long while ago, someone made an interesting comment along the lines of “You should use JSON Schema to validate the data model.

It took me ages to gather the willpower to tame that particular beast, but I finally got there. In the next installment of the Data Models saga I described how you can use JSON Schema to validate Ansible inventory data and your own YAML- or JSON-based data structures.

To learn more about data validation, error handling, unit- and system testing, and CI/CD pipelines in network automation, join our automation course.

Docker DDoS testbed


Docker testbed describes how to use Docker Desktop to build a test network to experiment with real-time sFlow streaming telemetry and analytics. This article extends the testbed to experiment with distributed denial of service (DDoS) detection and mitigation techniques described in Real-time DDoS mitigation using BGP RTBH and FlowSpec.

Start a Host sFlow agent using the pre-built sflow/host-sflow image:
docker run --rm -d -e "COLLECTOR=host.docker.internal" -e "SAMPLING=10" \
--net=host -v /var/run/docker.sock:/var/run/docker.sock:ro \
--name=host-sflow sflow/host-sflow
Start ExaBGP using the pre-built sflow/exabgp image. ExaBGP connects to the sFlow-RT analytics software and displays BGP RTBH / Flowspec controls sent by sFlow-RT:
docker run --rm sflow/exabgp
In a second terminal window, start an instance of the sFlow-RT analytics software using the pre-built sflow/ddos-protect image:
GW=`docker network inspect bridge -f '{{range .IPAM.Config}}{{.Gateway}}{{end}}'`

SUBNET=`docker network inspect bridge -f '{{range .IPAM.Config}}{{.Subnet}}{{end}}'`

docker run --rm -p 6343:6343/udp -p 8008:8008 -p 1179:1179 --name=sflow-rt \
sflow/ddos-protect -Dddos_protect.router=$GW -Dddos_protect.as=65001 \
-Dddos_protect.enable.flowspec=yes -Dddos_protect.group.local=$SUBNET \
-Dddos_protect.mode=automatic \
-Dddos_protect.udp_amplification.action=filter \
-Dddos_protect.udp_amplification.threshold=5000
Open the sFlow-RT dashboard at http://localhost:8008/
The sFlow Agents gauge confirms that sFlow is being received from the Host sFlow agent. Now access the Continue reading

How the Gap embraced the edge

One of the best-known clothing retailers in the world has embraced edge computing technology and realized significant operational advantages as a consequence, one of its senior technical staff said in a presentation at the recent Edge Computing World conference.The Gap operates more than 2,500 stores in North America and handles about $10 billion in transactions per year. The company has switched from traditional point-of-sale technology to a system based almost entirely on Apple’s iOS products, as iPads replace cash registers and scanner guns across sales floors.To read this article in full, please click here