Today's Heavy Networking looks at the impact of Covid-19 on Internet usage and capacity with two guests who have front-row views: Neil McRae, Senior Leader at British Telecom; and Dave Temkin, VP of Infrastructure at Netflix.
The post Heavy Networking 513: How The Internet Is Handling The Covid-19 Load appeared first on Packet Pushers.
Normally, supercomputers installed at academic and national laboratories get configured once, acquired as quickly as possible before the money runs out, installed and tested, qualified for use, and put to work for a four or five or possibly longer tour of duty. …
One Supercomputer’s HPC And AI Battle Against The Coronavirus was written by Timothy Prickett Morgan at The Next Platform.
Despite pandemic related challenges, Intel reported revenues of $19.8 billion for the quarter, up...
Verizon’s 5G network was live in 34 U.S. cities at the end of the quarter, and CEO Hans Vestberg...
The move comes on the heels of AT&T’s most recent quarterly earnings release that was...
This article was first published in Packet Pushers Human Infrastructure Magazine. An email newsletter that talks about being a human in technology. You can subscribe, for free here. I struggle with the concept of ‘corporate evangelism’. So here are some thoughts on the topic. Religious Roots Evangelism is a religious principle that your belief is […]
The post Blessay: Coin-Operated Evangelism appeared first on EtherealMind.
I have a Disney+ account. I have kids and I like Star Wars, so it made sense. I got it all set up the day it came out and started binge watching the Mandalorian. However, in my haste to get things up and running I reused an old password instead of practicing good hygiene. As the titular character might scold me, “This is not the way.” I didn’t think anything about it until I got a notification that someone from New Jersey logged into my account.
I panicked and reset my password like a good security person should have done in the first place. I waited for the usual complaints that people had been logged out of the app and prepared to log everyone in again and figure out how to remove my New Jersey interloper. Imagine my surprise when no one came to ask me to turn Phineas and Ferb back on. Imagine my further surprise when I looked in the app and on the Disney+ website and couldn’t find a way to see which devices were logged in to this account. Nor could I find a way to disconnect a rogue device as I could with Netflix Continue reading
The right order for Apple Dictionaries in the app
The post Apple Dictionary Order appeared first on EtherealMind.
The highest trafficked sites using Cloudflare receive billions of requests per day. But only about 5% of those requests typically trigger security rules, whether they be “managed” rules such as our WAF and DDoS protections, or custom rules such as those configured by customers using our powerful Firewall Rules and Rate Limiting engines.
When enforcement is taken on a request that interrupts the flow of malicious traffic, a Firewall Event is logged with detail about the request including which rule triggered us to take action and what action we took, e.g., challenged or blocked outright.
Previously, if you wanted to ingest all of these events into your SIEM or logging platform, you had to take the whole firehose of requests—good and bad—and then filter them client side. If you’re paying by the log line or scaling your own storage solution, this cost can add up quickly. And if you have a security team monitoring logs, they’re being sent a lot of extraneous data to sift through before determining what needs their attention most.
As of today, customers using Cloudflare Logs can create Logpush jobs that send only Firewall Events. These events arrive much faster than our existing HTTP Continue reading
This podcast introduction was written by Nick Buraglio, the host of today’s podcast.
As private overlays are becoming more and more prevalent and as SD-WAN systems and technologies advance, it remains critical that we continue to investigate how we think about internetworking. Even with platforms such as Slack Nebula, Zerotier, or the wireguard based TailScale becoming a mainstream staple of many businesses, the question of “what is next” is being asked by an ambitious group of researchers.
The first half of last year was relatively weak for Intel’s Data Center Group last year, but despite the coronavirus pandemic – and in some cases, we think because of it – the world’s largest datacenter chip manufacturer is looking to not only have a good first quarter, as it just turned in, but could see growth across its various data-centric businesses well into the second half of the year. …
Pandemic Compute Needs Drive Intel’s Data Center Group was written by Timothy Prickett Morgan at The Next Platform.
I’ve written a few different posts on setting up etcd. There’s this one on bootstrapping a TLS-secured etcd cluster with kubeadm
, and there’s this one about using kubeadm
to run an etcd cluster as static Pods. There’s also this one about using kubeadm
to run etcd with containerd. In this article, I’ll provide yet another way of setting up a “best practices” etcd cluster, this time using a tool named etcdadm
.
etcdadm
is an open source project, originally started by Platform9 (here’s the blog post announcing the project being open sourced). As the README in the GitHub repository mentions, the user experience for etcdadm
“is inspired by kubeadm
.”
etcdadm
The instructions in the repository indicate that you can use go get -u sigs.k8s.io/etcdadm
, but I ran into problems with that approach (using Go 1.14). At the suggestion of the one of the maintainers, I also tried Go 1.12, but it failed both on my main Ubuntu laptop as well as on a clean Ubuntu VM. However, running make etcdadm
in a clone of the repository worked, and one of the maintainers indicated the documentation will be updated to reflect this approach Continue reading
After receiving many excellent CFP submissions, we are thrilled to finally announce the first round of speakers for DockerCon LIVE on May 28th starting at 9am PT / GMT-7. Check out the agenda here.
In order to maximize the opportunity to connect with speakers and learn from their experience, talks are pre-recorded and speakers are available for live Q&A for their whole session. From best practices and how tos to new product features and use cases; from technical deep dives to open source projects in action, there are a lot of great sessions to choose from, like:
Simon Ferquel, Docker
Julie Lerman, The Data Farm
Lukonde Mwila, Entelect
Clemente Biondo, Engineering Ingegneria Informatica
Erika Heidi, Digital Ocean
Elton Stoneman, Container Consultant and Trainer
Brandon Mitchell, Boxboat
Deutsche Telekom, Vodafone Germany embraced 5G DSS; Edgewise Networks CEO shared security-related...
Security has always been important for datacenter operators, but the days of putting a ring of protection around the datacenter and then walking away satisfied in the knowledge that the data and applications therein were protected from outside forces are long over. …
Locking Down Linux For The Enterprise was written by Jeffrey Burt at The Next Platform.
CenturyLink experienced the single largest gain in billable installations in 2019, according to...
Edgewise Networks CEO Peter Smith discusses the rapid shift to remote work because of COVID-19 and...
If you’ve used Cluster API (CAPI), you may have noticed that workload clusters created by CAPI use, by default, a “stacked master” configuration—that is, the etcd cluster is running co-located on the control plane node(s) alongside the Kubernetes control plane components. This is a very common configuration and is well-suited for most deployments, so it makes perfect sense that this is the default. There may be cases, however, where you’ll want to use a dedicated, external etcd cluster for your Kubernetes clusters. In this post, I’ll show you how to use an external etcd cluster with CAPI on AWS.
The information in this blog post is based on this upstream document. I’ll be adding a little bit of AWS-specific information, since I primarily use the AWS provider for CAPI. This post is written with CAPI v1alpha3 in mind.
The key to this solution is building upon the fact that CAPI leverages kubeadm
for bootstrapping cluster nodes. This puts the full power of the kubeadm
API at your fingertips—which in turn means you have a great deal of flexibility. This is the mechanism whereby you can tell CAPI to use an external etcd cluster instead of creating a co-located etcd Continue reading