article thumbnail

Creating a Talos Linux Cluster on Azure with Pulumi

Scott Lowe

The Pulumi program follows this overall flow: First, the program creates the base infrastructure objects that are required—a resource group, a virtual network, some subnets, and a network security group. This load balancer is used only for Kubernetes API traffic.) The last step is to bootstrap the cluster.

Linux 74
article thumbnail

Technology Short Take 149

Scott Lowe

Networking. Ivan tackles the topic of CI/CD and testing in network automation. Baptiste Collard has a post on Kubernetes controllers for AWS load balancers. One takeaway from this post for me was that the new AWS load balancer controller uses a ton of annotations. Dan Lorenc dives deep into Fulcio.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

IDF 2013: Future of SDN with the Intel ONP Switch Reference Design

Scott Lowe

This is session COMS002, titled “The Future of Software-Defined Networking with the Intel Open Network Platform Switch Reference Design.” The Intel Open Network Platform (ONP) Switch is the official name for Seacliff Trail, which I talked about last year at IDF 2012. So how does this work?

Intel 61
article thumbnail

On Network Virtualization and SDN

Scott Lowe

Is there a difference between network virtualization and Software-Defined Networking (SDN)? So, in a similar fashion to my post on network overlays vs. network virtualization , I thought I’d weigh in with some thoughts. With this definition in hand, let’s compare network virtualization to SDN.

article thumbnail

HTTP/2 Rapid Reset Zero-Day Largest DDoS Attack in Internet History

SecureWorld News

Google also added this reference point: "For a sense of scale, this two minute attack generated more requests than the total number of article views reported by Wikipedia during the entire month of September 2023."

article thumbnail

Introduction to Networking: Part 2, A Few More Basics

Scott Lowe

In part 1 of this series, I covered some networking basics (OSI and DoD models; layer 2 vs. layer 3; bridging, switching, and routing; Spanning Tree Protocol; and ARP and flooding). A connection that carries multiple VLANs is often referred to as a VLAN trunk (although some might say that this is a very Cisco-centric term).

Network 61
article thumbnail

How to Address Software Reliability, Security, and Quality Requirements with Fuzz Testing

ForAllSecure

Confidentiality refers to measures that prevent sensitive information from reaching the wrong people, while still reaching the right people. Integrity refers to the measures taken to ensure consistency, accuracy, and trustworthiness of data over its entire lifecycle. Examples include: Load balancing. Fault tolerance.