The Serverlist: Workers Secrets, Serverless Supremacy, and more!

The Serverlist: Workers Secrets, Serverless Supremacy, and more!

Check out our thirteenth edition of The Serverlist below. Get the latest scoop on the serverless space, get your hands dirty with new developer tutorials, engage in conversations with other serverless developers, and find upcoming meetups and conferences to attend.

Sign up below to have The Serverlist sent directly to your mailbox.

Technology Short Take 125

Welcome to Technology Short Take #125, where I have a collection of articles about various data center and cloud technologies collected from around the Internet. I hope I have managed to find a few useful things for you! (If not, contact me on Twitter and tell me how I can make this more helpful for you.)

Networking

Servers/Hardware

Nothing this time around. I’ll try hard to find something useful for the next Technology Short Take.

Security

Weekly Wrap: Coronavirus No Match for Oracle’s Larry Ellison

SDxCentral Weekly Wrap for March 30, 2020: Oracle posts strong results despite virus concerns;...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

BGP+SPF for Hyperscale/Massively Scale Datacenter Deployment

BGP+SPF Imagine we replace BGP best path selection decision with SPF. BGP+SPF exactly does that. In this post, I will explain why we are looking for alternative protocols for Massively Scale Datacenter.

Although there is no exact answer how many devices should be in the datacenter so datacenter can be considered Massively Scale, but we know 10.000 Racks are not uncommon in these type of datacenter and each rack, when BGP is used as a transport, gets it’s own unique AS number.

Before I explain BGP+SPF, let’s understand why traditional , very well know, OSPF or IS-IS are not used in these type of datacenter.

Answer is scalability. OSPF and IS-IS are chatty protocols and flooding aspect of these protocols are just not suited to very densely meshed connectivities. Yes, these datacenter run on CLOS topology and CLOS is densely meshed topology.

Also, we want to have wide ECMP in these type of datacenter, meaning, between the TOR, Leaf and Spine devices, there are so many equal cost path and we want to utilize them all. OSPF and IS-IS will be limited to number of ways of ECMP.

BGP is very well suited protocol which provides very wide ECMP Continue reading

Remote Work Isn’t Just Video Conferencing: How We Built CloudflareTV

Remote Work Isn’t Just Video Conferencing: How We Built CloudflareTV
Remote Work Isn’t Just Video Conferencing: How We Built CloudflareTV

At Cloudflare, we produce all types of video content, ranging from recordings of our Weekly All-Hands to product demos. Being able to stream video on demand has two major advantages when compared to live video:

  1. It encourages asynchronous communication within the organization
  2. It extends the life time value of the shared knowledge

Historically, we haven’t had a central, secure repository of all video content that could be easily accessed from the browser. Various teams choose their own platform to share the content. If I wanted to find a recording of a product demo, for example, I’d need to search Google Drive, Gmail and Google Chat with creative keywords. Very often, I would need to reach out to individual teams to finally locate the content.

So we decided we wanted to build CloudflareTV, an internal Netflix-like application that can only be accessed by Cloudflare employees and has all of our videos neatly organized and immediately watchable from the browser.

We wanted to achieve the following when building CloudflareTV:

  • Security: make sure the videos are access controlled and not publicly accessible
  • Authentication: ensure the application can only be accessed by Cloudflare employees
  • Tagging: allow the videos to be categorized so they can Continue reading

Serverless in the wild: characterizing and optimising the serverless workload at a large cloud provider

Serverless in the wild: characterizing and optimising the serverless workload at a large cloud provider, Shahrad et al., arXiv 2020

This is a fresh-from-the-arXivs paper that Jonathan Mace (@mpi_jcmace) drew my attention to on Twitter last week, thank you Jonathan!

It’s a classic trade-off: the quality of service offered (better service presumably driving more volume at the same cost point), vs the cost to provide that service. It’s a trade-off at least, so long as a classic assumption holds, that a higher quality product costs more to produce/provide. This assumption seems to be deeply ingrained in many of us – explaining for example why higher cost goods are often implicitly associated with higher quality. Every once in a while though a point in the design space can be discovered where we don’t have to trade-off quality and cost, where we can have both a higher quality product and a lower unit cost.

Today’s paper analyses serverless workloads on Azure (the characterisation of those workloads is interesting in its own right), where users want fast function start times (avoiding cold starts), and the cloud provider wants to minimise resources consumed (costs). With fine-grained, usage based billing, resources used to Continue reading

Istio 1.5 Brings a Binary Installer, WASM-Based Extensibility for Envoy

The newest version of the open source version 1.5, comes with a fresh installer to simplify the deployment process, along with a new extension model, based on WebAssembly (WASM), to help proxy servers better filter traffic. The development team behind Istio mark the Envoy‘s, the data plane most frequently used with Istio. “WASM will give developers the ability to safely distribute and execute code in the Envoy proxy — to integrate with telemetry systems, policy systems, control routing and even transform the body of a message,” a web page Linkerd and HashiCorp’s istioctl configuration tool. Security has been enhanced through the support of Kyle Glenn on 

White Hat Hackers Fight COVID-19, Donate GPUs for a Cure

Security company Critical Start and its threat hunters are among the global contributors running...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Daily Roundup: Cisco Patches SD-WAN Bugs

Cisco patched SD-WAN bugs; HashiCorp bagged $175 million on a $5 billion valuation; and Comcast...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Using KinD with Docker Machine on macOS

I’ll admit right up front that this post is more “science experiment” than practical, everyday use case. It all started when I was trying some Cluster API-related stuff that leveraged KinD (Kubernetes in Docker). Obviously, given the name, KinD relies on Docker, and when running Docker on macOS you generally would use Docker Desktop. At the time, though, I was using Docker Machine, and as it turns out KinD doesn’t like Docker Machine. In this post, I’ll show you how to make KinD work with Docker Machine.

By the way, it’s worth noting that, per the KinD maintainers, this isn’t a tested configuration. Proceed at your own risk, and know that while this may work for some use cases it won’t necessarily work for all use cases.

Prerequisites/Assumptions

These instructions assume you’ve already installed both KinD and Docker Machine, along with an associated virtualization solution. I’ll be using VirtualBox, but this should be largely the same for VMware Fusion or Parallels (or even HyperKit, if you somehow manage to get that working). I’m also assuming that you have jq installed; if not, get it here.

Making KinD work with Docker Machine

Follow the steps below to make Continue reading

Cisco warns of five SD-WAN security weaknesses

Cisco has issued five  warnings about security weaknesses in its SD-WAN offerings, three of them on the high-end of the vulnerability scale.The worst problem is with the command-line interface (CLI) of its SD-WAN Solution software where a weakness could let a local attacker inject arbitrary commands that are executed with root privileges, Cisco wrote.To read this article in full, please click here

Storj Labs Tardigrade: Live for the Taking

"We can now confidently say that the network is resilient, performant, secure, and ready for broad...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Introducing the Internet Society’s 2019 Impact Report

In these uncertain times we know the Internet is so much more than a tool. It’s a way for people to stay connected, informed, and educated. It shortens distances, spurs innovation, and fosters social and economic development. It empowers us and frees us.

It is a lifeline.

Yet, nearly 50% of the world still remains unconnected – and globally the Internet faces threats, each with the power to undermine the core of its existence. Now more than ever we must ensure the Internet remains open, globally connected, and secure.

The world is counting on it.

As we looked back at our work in 2019, an inspiring theme emerged: a global society driven by the idea that the Internet should be a resource for all, and persevering against odds to make this vision a reality. This society recognizes the Internet’s power as a way to stay in touch, to empower, to enable, and to create. Collectively, we are not just helping to bridge the digital divide, we are taking action to ensure the Internet remains resilient and trusted – a force for good.

Our 2019 Impact Report highlights the work of the Internet Society – our Chapters, Organization Members, individual members, Continue reading

MEF Awards First Round of SD-WAN Service Provider Certifications

The certification was unveiled in November, and aimed at helping enterprises select an SD-WAN...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Cloud RAN on Pace to Surpass Traditional RAN by 2022

Traditional RAN site deployments have been dropping off since 2017 and will represent less than 15%...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.