Packet Pushers - Fat Pipe

By Packet Pushers Team

About this podcast   English    United States

All our established podcasts.
Today on the Priority Queue, some practical Python for network engineers. My guest is Billy Downing, and we walk through an example of how to use Python to deploy BFD, or Bidirectional Forwarding Detection. We start by describing BFD and how it works, and then explore how to use Python to make it go in your network. Billy is a data center engineer who works for the Department of Defense. Check out his blog at Show Links: – Billy Downing’s blog Learning Python from a Network Engineer’s Perspective – Bidirectional Forwarding Detection (BFD) – IETF The post PQ 146: Practical Python For Deploying BFD appeared first on Packet Pushers.
April 18, 2018
If you work for a Value Added Reseller (VAR) as an engineer, the value being added is YOU. What is VAR life? Projects, customer meetings, deadlines, bills of materials, RFP responses, and trying to turn the promises of sales unicorns into an actual design you can install for the customer. We’ve worked for VARs at one time or another, as has our guest Eric Gullickson, who is now Enterprise Architect at Vortex Optics. We thought we d run down the good, the bad, and the ugly of the VAR life on this episode of the Datanauts podcast. We start the show by distinguishing the different roles a VAR can have. Then we dive into the good, which includes access to new technology, paid certifications, a flexible work schedule, and exposure to a wide variety of businesses and operating environments. For the bad, the Datanauts and Eric discuss the blunt reality that you have to generate profit, and you may find yourself having to navigate the competing interests of manufacturers, sales, distributors, and customers. On the ugly side, we swap stories about greasy salespeople, bad project management, and other nightmares. Show Links: Eric Eric Gullickson on Twitter The post Datanauts 130: The Good, Bad And Ugly Of The VAR Life appeared first on Packet Pushers.
April 16, 2018
Take a Network Break! Cisco puts its Tetration workload protection product into the cloud by announcing a SaaS version, and attackers target Cisco’s Smart Install feature on the IOS and IOS XE operating systems. Juniper aims to entice service providers by integrating telemetry, AppFormix, and its NorthStar WAN SDN controller for improved remediation, HPE acquires a cloud consultancy, and Riverbed CEO and cofounder Jerry Kennelly retires. Cradlepoint partners with Webroot for secure SD-WAN, an activist investor target MicroFocus to go private, and cryptomining attacks increasingly target the enterprise. Last but not least, Gartner predicts explosive cloud growth, and IDC says lines of business will outspend IT departments on technology. Sponsor: ThousandEyes ThousandEyes gives you performance visibility from every user to every app over any network, both internal and external, so you can smoothly migrate to the cloud, transform your WAN, troubleshoot faster and deliver exceptional user experiences. Sign up for a free account at and choose a free ThousandEyes t-shirt. Show Links: Cisco Tetration Now Available As A Cloud Service And Virtual Appliance – Packet Pushers Cyber-Espionage Groups Are Increasingly Leveraging Routers in Their Attacks – Bleeping Computer Attackers Exploit Cisco Switch Issue as Vendor Warns of Yet Another Critical Flaw – Dark Reading Iran hit by global cyber attack that left U.S. flag on screens – Reuters Critical Infrastructure at Risk: Advanced Actors Target Smart Install Client – Cisco Talos Juniper Spotlights Integration Efforts As Service Providers Chase Disaggregation – Packet Pushers HPE Scoops Up Second Cloud Consulting Firm RedPixie – SDX Central Riverbed Announces Retirement of Co-Founder and CEO Jerry M. Kennelly; Appoints Paul Mountford as CEO to Drive Next Phase of Growth in $30 Billion+ Market – Riverbed Cradlepoint Showcases Webroot Partnership for Securing WAN Edge at RSA 2018 – Cradlepoint CNBC: Elliott wants Micro Focus to go private – Micro Focus International plc ADR – Seeking Alpha Cryptomining is here to stay in the enterprise – Zscaler Gartner Forecasts Worldwide Public Cloud Revenue to Grow 21.4 Percent in 2018 – Gartner Technology Purchases Funded by Line of Business Forecast to Overtake Purchases Funded by the IT Organization in 2019, According to IDC – IDC The post Network Break 180: Tetration In The Cloud; Attackers Target Cisco Switches appeared first on Packet Pushers.
April 13, 2018
In the ten or so years I ve been blogging, Ivan Pepelnjak has been constant figure in the tech industry. His prolific blogging and sharing of knowledge is one of the inspirations for my own entry into blogging. Over the years, we have usually agreed violently on most things and disagreed on others. His ipSpace website has grown from a blog into a membership and more recently into a consulting service. On today’s Priority Queue, Ivan and I talk about automation, intent, product quality and what can be done to improve it, the direction private clouds might take, and whatever else catches our fancy. Sponsor: Paessler AG Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your whole IT infrastructure 24/7 and alerts you to problems before users even notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better. Visit today. Show Links: Ivan Pepelnjak on Twitter The post PQ 145: Greg And Ivan Have A Chat appeared first on Packet Pushers.
April 13, 2018
If you d heard of Cisco Tetration when it was first announced, you might have a vague memory of it being this huge rack of hardware at an eye-watering price that did some sort of analytics for massive data centers. Tetration has evolved into a platform that meets needs for organizations of many sizes. Tetration also has a bunch of genuinely interesting use cases, as Cisco has become increasingly clever about what they can do with all of that data Tetration gathers. For example, you can auto-implement a whitelist policy for application workloads. You can detect when your apps are deviating from their normal traffic patterns. You can detect software vulnerabilities. And depending on where you run Tetration, you can still get deep network performance insights, what I think of as the original Tetration value proposition. Today on this sponsored episode, we delve into what Tetration does, explore use cases, and dive into how it fits into compute environments. Our guests from Cisco are Jason Gmitter, Principal Systems Engineer; and Yogesh Kaushik, Senior Director of Product Management for Tetration. Show Links Cisco Tetration – Cisco Systems Cisco Tetration Workload Protection Extended with new Options: SaaS and Virtual Appliance – Cisco Systems Cisco Tetration Platform for Workload Protection Data Sheet – Cisco Systems The post Show 385: Getting Inside Cisco Tetration (Sponsored) appeared first on Packet Pushers.
April 11, 2018
Today the Datanauts explore three key concepts to make cloud management and operations more bearable: automation, understanding new services and capabilities, and security. Our guest is Kenneth Hui, Technical Marketing Engineer at Rubrik. Ken blogs at Cloud Architect Musings. While our conversation focuses primarily on AWS, many of the principles discussed will apply to any cloud platform. In part one we parse automation, infrastructure-as-code, and DevOps to understand how these concepts are related, how they differ, and why culture and human behavior matter more than labels. Part two explores the latest offerings in AWS including serverless, container support, and machine learning. Part three tackles cloud security essentials including encryption, not exposing S3 buckets, and best practices. Show Links: Infrastructure as Code: A Reason to Smile – DevOps Culture (Part 1) – IT Revolution The AWS Love/Hate Relationship with Data Gravity – Cloud Architect Musings Data Encryption in the Cloud, Part 1: Why You Should Care – Cloud Architect Musings Last Week In AWS – Newsletter Unsecured server exposed thousands of FedEx customer records – ZDNet Vault Project – AWS Blogs – Amazon AWS Security – Amazon AWS Security Best Practices – Amazon AWS Faragate – Amazon AWS Lightsail – Amazon The post Datanauts 129: Automation And Security In AWS appeared first on Packet Pushers.
April 9, 2018
Take a Network Break! Edge computing is the new hotness for traditional IT vendors as Microsoft and HPE, via its Aruba business unit, target edge computing infrastructure and software for new growth. Meanwhile, Intel sells embedded software developer Wind River to a private equity firm, and we review the potential financial impact to legacy networking vendors as AT&T plans a massive whitebox rollout. HCI revenues skyrocket in 2017; Delta, Sears, and Sacks Fifth Avenue get hacked; and Panera Bread picks a security fight with the wrong person. We’ve got links to all the stories we cover just after our sponsor messages. Sponsor: InterOptic InterOptic offers high-performance, high-quality optics at a fraction of the cost. Find out more at, and if you re attending Interop 2018 in Vegas, stop by the InterOptic booth to learn how they can help you spec the right optics for your network. Coffee Talk: Kentik Stay tuned after the news for a Coffee Talk conversation with sponsor Kentik. Kentik makes a big data platform to provide actionable insight from network data. Our guest is co-founder and CEO Avi Freedman, and we talk about how to use network data for fun and packets! Show Links: Microsoft will invest $5 billion in IoT. Here s why. – Microsoft Cisco Jasper – Wikipedia Why GE Digital Failed – Aruba Networks Leads HPE To The Edge – The Next Platform Edgeline Converged Edge Systems for Secure Edge Computing – HPE United Kingdom Wind River to be Acquired by TPG – Wind River Intel to sell Wind River unit to private equity firm – Silicon Valley Business Journal The Linux Foundation Announces Expanded Industry Commitment to Akraino Edge Stack – Akraino Edge Stack Cisco Faces a Dangerous New Rival: AT&T – Motley Fool Cisco Receives 2018 AT&T Supplier Award – The Network Worldwide Converged Systems Revenue Increased 9.1% During the Fourth Quarter of 2017 with Vendor Revenue Reaching $3.6 Billion, According to IDC – IDC HPE shines in IDC Converged Systems tracker, Cisco does not – The Register Delta, Sears Breaches Blamed on Malware Attack Against a Third-Party Chat Service – Threatpost Data breach hits Saks Fifth Avenue, Lord & Taylor stores – Washington Post Leaks Millions of Customer Records – Krebs on Security The post Network Break 179: Microsoft Targets Edge Computing; HCI Revenues Boom appeared first on Packet Pushers.
April 6, 2018
On today’s show Greg and Ethan talk about a few things that have been on their minds, including updates on the forthcoming Packet Pushers subscription site and a post-mortem of the recent Virtual Design Clinic. They also hash out some tech conversations, including Cloudflare’s new DNS resolver, peak open networking, a review of the Aruba Atmosphere wireless conference, and more nerdy topics. Sponsor: ThousandEyes ThousandEyes gives you visibility, insights, and actionable intelligence into user experience from every user to every application over any network, so you transform your WAN, troubleshoot faster and deliver exceptional user experiences in the cloud and on premises. Try ThousandEyes for free at and grab a fun t-shirt! Sponsor: Cumulus Networks The Cumulus Linux network OS is simple, open, untethered Linux that can run on more than 70 hardware platforms and help you transition from your legacy infrastructure. Cumulus Networks is Web-scale networking for the digital age. Go to to find out more. Show Links: Introducing DNS Resolver, (not a joke) – Cloudflare Announcing the fastest, privacy-first consumer DNS service – Cloudflare jedisct1/dnsblast: A simple and stupid load testing tool for DNS resolvers – GitHub He thought a book would stop a bullet. Now his girlfriend is going to jail for killing him. – The Washington Post Peak DNSSEC? – APNIC Blog The Open Enterprise Foundation Linux Foundation Announces Further Harmonization Efforts, Celebrates New Members and Project Deployments – The Linux Foundation Network Harmonization 2.0: Evolving Linux Foundation Networking – The Linux Foundation The post Show 384: The Packet Pushers Unleashed appeared first on Packet Pushers.
April 5, 2018
Today on the Priority Queue we have a roundtable show. We’ve gathered a few engineers around the microphone to talk about their experiences and what’s on their minds. We often hear this format is an audience favorite, so we plan to record more of these in the Priority Queue and Weekly channels, so keep an eye out. Today we welcome Alex Clipper, Eric Gullickson, Matt Elliott, and Stafford Rau to the podcast. We discuss encryption, code styles to ensure that code written by networkers is up to snuff, and what it’s like to work in technology after a certain age. Sponsor: Paessler AG Paessler AG is the maker of PRTG Network Monitor. PRTG monitors your entire IT infrastructure 24/7 and alerts you to problems before users notice. Find out more about the monitoring software that helps system administrators work smarter, faster, better by visiting today. Show Links: Understanding Media Access Control Security (MACsec) – Technical Documentation – Support – Juniper Networks Layer 2-Encryptors For Metro And Carrier Ethernet WANs And MANs – Inside-IT (PDF) Thales L2 Encryption – Thales Senetas – What Is Optical Encryption? – Ciena Certes Networks Google Style Guides – GitHub Python PEP 8 Style Guide – PEP 8 The Style Guide for Python Code – Online PEP 8 Compliance Checker – PEP8 Sublime Text Editor – Text Editor – VSCode – Cutting Old Heads at IBM – Pro Publica Go Past The Resume, Build a Portfolio Of Your IT Career – Packet Pushers (YouTube) The post PQ 144: Engineer Roundtable: Encryption, Code Style, Tech Over 40 appeared first on Packet Pushers.
April 4, 2018
Today, the Datanauts revisit the world of Kubernetes and container scheduling, but we also loop in Serverless or Functions as a Service (FaaS) along with building an incredibly famous project that has literally no code. Our guest is Kelsey Hightower, a Google employee as well as a Kubernetes advocate and expert. We talk with Kelsey about the latest evolution of Kubernetes, whether the notion of Kubernetes lock-in is a concern, and how it’s being used in production. We also delve into serverless computing or Functions as a Service (FaaS) and discuss the technology’s development and adoption. We also explore Kelsey’s latest project, No Code. Last but not least, we look at how containers and orchestration affects the interaction between Devs and Ops, and how to embrace the new world of application design. Show Links: Kelsey Hightower on GitHub Kelsey Hightower on Twitter Kubernetes Up And Running – Amazon Kubernetes The Hard Way – GitHub Datanauts 058: Kubernetes A Deep-Dive Introduction Datanauts 042: Understanding Serverless Architecture Datanauts 047: A Serverless Architecture Follow-Up Cloud Native Computing Foundation Announces Kubernetes as First Graduated Project – CNCF Serverless Ops: What do we do when the server goes away? – Serverless Ops Security Center Playbooks and Azure Functions Integration with Firewalls – Microsoft Azure The post Datanauts 128: Kubernetes, Serverless And No Code With Kelsey Hightower appeared first on Packet Pushers.
Disclaimer: The podcast and artwork embedded on this page are from Packet Pushers Team, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.