Home Blog Page 789

Ciena Intros Blue Planet DevOps Toolkit for SDN/NFV

Ciena introduced its Blue Planet DevOps Toolkit to help network operators speed up the creation and delivery of new on-demand, virtualized services within their SDN and NFV enabled networks.

The kit consists of a set of software development tools and community resources that allow operators to integrate network resources such as devices, functions, or domains (physical or virtual), as well as customize service templates, with the Blue Planet Network and Service Orchestration software.

Ciena said the kit could be used in the creation and on-boarding of new virtual network functions (VNFs) such as virtual firewalls, physical network domains such as Layer 2 metro networks, and virtual domains such as a third party cloud, and ultimately deploy these resources as components of new service offerings.

Read more at Converge Digest.

Rise of Open Cloud Architecture and Over-the-Top (OTT) Network Services

To meet greater traffic demands and lower operating costs, some of the world’s largest service providers today are looking at open source software to deliver new network services using OpenStack and Linux containers.

In a panel on ‘Rise of Open Cloud Architectures and Over-the-Top Network Services’ at Open Networking Summit 2016, speakers from Arista, Metro Ethernet Forum (MEF) and Akanda shared OpenStack implementations for over the top (OTT) network services.

OTT services allow companies to manage multivendor cloud environments and mix and match the network functions as needed. The panel discussed how network functions are abstracted from network hardware and delivered as an open source network service providing examples of dynamic north/south routing, load balancing and security-as-a-service.

Rami Yaron, Co-Chair of Global Marketing Committee at MEF introduced the primary focus of MEF as a standards body accelerating adoption of carrier ethernet in telcos and presented the three major areas of work at MEF:

•    Dynamic Network Services
•    Lifecycle Service Orchestration
•    Open Source Initiatives

Yaron discussed management and control layered reference architecture and the framework that characterizes the domains and management entities required to enable cooperative LSO (Lifecycle Service Orchestration) capabilities for connectivity services.

Fred Hsu, Technical Marketing Engineer, Arista outlined how Arista works with different network controllers using OpenStack Astara as an example. Arista’s approach emphasizes on being agnostic and open for different ways to communicate with and provision the network. As a result, network changes like provisioning or changing switches will not need manual updates, but will be managed through the controller abstraction. This enables configuring and managing Arista switches using standard OpenStack interface.

Mark McClain, CTO of Akanda, outlined the fundamental shift to open source software for over-the-top (OTT) network infrastructure; highlighted that running virtual network functions in the cloud can be 70% cheaper than traditional network hardware and discussed OpenStack Astara features, architectures and how it enables network operation across multiple clouds. He explained how OpenStack Astara can setup and manage virtualized network services from multiple vendors as well as manage bare metal servers and other types of physical infrastructure not traditionally part of an OpenStack solution.

Watch the full talk below:

linux-com_cta_ons.png?itok=2Fnu27xm

 

https://www.youtube.com/watch?v=62srvLdMXxQ

Turn Your Old Laptop into a Chromebook

The year of Linux is here. According to reports, Google sold more Chromebooks in the first quarter of 2016 than Apple sold Macbooks. And, Chromebooks are about to get even more exciting. During the Google I/O Summit, the company announced that the Google Play store for Android is coming to Chromebooks in mid June, which will allow users to run Android apps on their Chrome OS devices.

But, you don’t have to buy a brand new laptop to use Chrome OS; you can now easily convert your old laptop or PC into a powerful Chromebook. I did this for a Dell Mini and a Dell laptop that I bought in 2009. Those two devices were collecting dust and were destined for freecycling, because modern operating systems and desktop environments like Unity, Plasma, and Gnome won’t run on them.

If you have an old system lying around, you can easily convert it into a Chromebook. You can also dual-boot your laptop with Chrome OS, so you get the best of both worlds.

Thanks to the open source base of Chrome OS, many solutions out there enable you to install the operating system on your device. I have tried several, but the solution I like most is CloudReady by Neverware. The company offers a free, community-supported version of the OS along with a commercially supported version for $49 per year, per device. The good part is that all licenses are transferable, so if you sell or donate the device, you can also transfer the Neverware license to the new user.

What You’ll Need

Before you can get started installing CloudReady on your laptop, you will need some preparation:

  • A USB drive with 4GB or more storage

  • Open Chrome browser, go to Google Chrome Store and install Chromebook Recovery Utility.

  • Change BIOS settings of your target PC so it can boot from the USB

Get Started

Neverware offers two images for CloudReady: 32 bit and 64 bit. Download the appropriate OS for your hardware from the download page.

Extract the content of the downloaded zip file, and you will get a chromiumos_image.bin file. Now plug in the USB device and open the Chromebook recovery utility. Click on the gear at the top right corner of the tool and select erase recovery media (Figure 1).

Figure 1: Select erase recovery media. [image:cloudready-erase]

Next, choose the target USB drive and format it. Once formatted, go to the gear again, and this time select the use local image option. Now browse the extracted bin file, select the USB drive, click on continue, and then on the create button (Figure 2). It will start writing the image to the drive.

Figure 2: Create CloudReady image. [Image:cloudready-create]

Once the drive is ready with bootable CloudReady, plug it into the target PC and boot the system. It may take a while for the system to boot into Chromium OS. Once booted, you will see the screen shown in Figure 3.

Figure 3: Ready to install CloudReady.

Figure 4: Single-boot option.

Go to the taskbar and click on Install CloudReady.

You can dual boot your system between Chromium OS and another operating system, but the other OS should already be installed.

To single boot (Figure 4) or dual boot (Figure 5) your system, choose the option in the next window.

Just follow the click-next instructions.

Figure 5: Dual-boot option.

The entire process will take up to 20 minutes, depending on the storage media and the processing power. Once installed, the PC will shut down and reboot.

After you reboot, you will be greeted with the network settings page (Figure 6). The exciting thing is that, although I had to install wireless drivers for Linux distributions on the same hardware, everything worked out of the box with Chromium OS.

Once you connect to the wireless network, the system will look for updates and also offer to install Adobe Flash. Once the installation is finished, you will see the Chromium OS login screen. Now you can just log into your Gmail account and start using your “Chromebook” right away.

Figure 6: Network settings.

Get Netflix to Work

If you want to play Netflix and other DRM protection-streaming sites, you do need to do some extra work. Go to settings and click on the Install Widevine plugin (Figure 7).

Figure 7: Install Widevine.

Figure 8: Install User Agent Switcher.

Now you need the good old trick of using a user agent switcher (Figure 8).

Go to Chrome Webstore and install User Agent Switcher. Once the plugin is installed, it will be added to the bookmark bar of the browser.

Right-click on the agent switcher icon and create a new entry (Figure 9):

Name: “CloudReady Widevine”

String: “Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/535.11 (KHTML, like Gecko) Ubuntu/16.10 Chrome/49.0.1453.93”

Group: “Chrome” (should be filled automatically)

Append: “Replace”

Indicator Flag: “IE”

Click “Add”

Figure 9: Create entry for CloudReady.

Then, go to the “permanent spoof list” option and add CloudReady Widevine as the permanent string for www.netflix.com.

Now, reboot your system, and you can watch Netflix and many other services.

 

This Week in Linux News: Torvalds Monitoring Year 2038 Problem, Open Source Jobs Still in High Demand, & More

1) Linus Torvalds is keeping a close eye on Y2K-like “2038 problem,” which is already causing problems.
Torvalds Unhappy with Sloppy Unix Millennium Bug Patches for Linux Kernel– Neowin
 
2) The Linux Foundation’s 2016 Open Source Jobs Report shows that demand for open source talent in the workforce is higher than ever.
 
3) Chris Aniszczyk, interim executive director of The Linux Foundation’s Cloud Native Computing Foundation, explains how CNCF is helping define the cloud era.
 
4) “Linux drives the entrepreneurial wheel with complete control” writes Richard Smith in this article on the growth of Linux.
 
5) PlayStation 4 modder gets Valve’s Steam client running on the console by using firmware version 1.76 and a jailbreak, installing Arch Linux.
Steam Can Run on the PlayStation 4 Thanks to Arch Linux, a Jailbreak, and Old Firmware.– Digital Trends
 
 

How Blockchain Technology Could Change The World

There’s a lot of hype in the air about blockchain technology at the moment. A recent World Economic Forum report predicts that by 2025 10% of GDP will be stored on blockchains or blockchain related technology. This means it’s probably something which everyone involved in business should take notice of. However, there’s still a lack of understanding about what it is, and what it does. 

One way people describe blockchain technology is the “internet of value”. I like this term but it deserves closer inspection….

Worldwide, the financial services market is the largest sector of industry by market capitalization. If blockchain technology can replace just a fraction of that by enabling peer-to-peer transactions in other sectors then it clearly has the potential to create huge efficiencies.

Read more at Forbes

Amazon Debuts Flourish, a Runtime Application Model for Serverless Computing

Amazon Web Services has started to build out support tooling for its Lambda-based serverless infrastructure. At ServerlessConf in Brooklyn Thursday, Tim Wagner, general manager of AWS Serverless Compute (which includes AWS Lambda, and Amazon API Gateway) announced Flourish, a new open source project aimed at creating a full serverless runtime application environment.

One of the key components of the serverless paradigm is that functions are the unit of deployment and scaling. Wagner argues that Platform-as-a-Service is the wrong level of abstraction to make scalable applications as it hides the requests from the system. 

Read more at The New Stack

How to Use Incron to Monitor Important Files and Folders

I’ve seen it happen: a Linux server is taken over by a rootkit and no one was the wiser…at least not until some errant behavior occurred or something outside of the company reported an oddity. After some serious digging, you find out the rootkit has modified a few files or directories and the damage has been done.

What if you knew of a tool that could monitor files for change and then report the changes within /var/log/syslog or take some action when a file was modified? There is such a tool.

Incron is similar to cron, but instead of running a command based on time, it can trigger commands when a file/directory event occurs (e.g., a modification to a file or to a file’s permissions). This makes it an outstanding tool to use for monitoring folders like /etc/apache2 or /usr/bin.

I’ll walk you through the process of installing and using Incron to monitor such a directory, so that you can always keep tabs on those crucial files and folders.

Installation

I’ll be installing Incron on the Ubuntu 16.04 platform. With one quick command, you can have the tool ready to go. Here’s how:

  1. Open up a terminal window

  2. Issue the command sudo apt-get install incron

  3. Type your sudo password and hit Enter

  4. Type y when/if prompted

  5. Allow the installation to complete

Initial Setup

Incron is similar to cron, in that you’ll use the incrontab command to create jobs for watching files/folders. Unlike cron, however, you must first specify who can actually use the tool (smart thinking by the developers). To set this up, you must add users to the /etc/incron.allow file. Say you want to enable the root user to use Incron. For this, you would open up /etc/incron.allow and add the following line:

root

List all of the users you want to give access to Incron, one user per line, in this file. Close the file and those users can now execute the incrontab command without error.

Incrontab Configuration

As you may have surmised, using incrontab is similar to using crontab. You would edit your incrontab file with the command incrontab -e. This command will open up the incrontab file for editing. How you use Incron now starts to veer away slightly from Cron. let’s see how.

The format of the incrontab looks like:

<path> <mask> <command>

Let’s break that down.

  • <path> — This is the path to the directory you want to watch. Do note the Incron is not capable of watching subdirectories. Only files within the path will be monitored. If you need subdirectories monitored, you must give them their own entry.

  • <mask> — This is one of several options:

    • IN_ACCESS File was accessed (read)

    • IN_ATTRIB Metadata changed (permissions, timestamps, extended attributes, etc.)

    • IN_CLOSE_WRITE File opened for writing was closed

    • IN_CLOSE_NOWRITE File not opened for writing was closed

    • IN_CREATE File/directory created in watched directory

    • IN_DELETE File/directory deleted from watched directory

    • IN_DELETE_SELF Watched file/directory was itself deleted

    • IN_MODIFY File was modified

    • IN_MOVE_SELF Watched file/directory was itself moved

    • IN_MOVED_FROM File moved out of watched directory

    • IN_MOVED_TO File moved into watched directory

    • IN_OPEN File was opened

  • <command> — This is the command that will run should an event be triggered. In place of a command, you can always use wildcards. The wildcards will report basic information in syslog. The available wildcards are:

    • $$ Prints a dollar sign

    • $@  Add the watched filesystem path

    • $#   Add the event-related file name

    • $%  Add the event flags (textually)

    • $&  Add the  event flags (numerically)

Usage

Let’s set up a simple incrontab, using wildcards, and see how this works. First, let’s assume we’ve added the user olivia into the incron.allow file. We’ll create the folder /home/olivia/TEST and then run the command incrontab -e as user olivia. With the editor open, add the following line:

/home/olivia/TEST IN_MODIFY echo "$$ $@ $# $% $&"

Save the file and do the following:

  1. Open up a second terminal window and issue the command tail -f /var/log/syslog

  2. In the first terminal window, create the file /home/olivia/TEST/test

  3. Add some text to the file and save it

If you check the tail running on /var/log/syslog, you should see entries as shown in Figure 1.

Figure 1: Incron watching the /home/olivia/TEST folder.
Although that clearly indicates to you that the contents of the TEST folder were modified, we can make this a bit more useful. Say, for example, you want to have your web server automatically shut down if the contents of /etc/apache2/apache2.conf are modified (it’s drastic, but illustrates the tool perfectly). For this, you would need to edit the root user’s Incrontab file.

Here’s what you would want to do. Open up a terminal window and issue the command sudo su. Enter your sudo password and then issue the command incrontab -e. With the Incrontab editor open, add the following:

/etc/apache2/apache2.conf IN_MODIFY /usr/sbin/service apache2 stop

Save and close the file. You can test this by opening the /etc/apache2/apache2.conf file and making some minor change. Save the edited file and your web server should immediately stop.

You could also have Incron watch multiple folders/files and employ the same action. Suppose you want to watch both the /etc/apache2/apache2.conf file and the /var/www/html/index.html file for changes. You could create two incrontab entries like so:

/etc/apache2/apache2.conf IN_MODIFY /usr/sbin/service apache2 stop

/var/www/html/index.html IN_MODIFY /usr/sbin/service apache2 stop

Should either file be modified, the web server will stop.

This, of course, is only a simple example of how you can make use of Incron. Get creative and see just how far you can bend the will of Incron to meet your needs. This is Linux, after all…it is ready be used in ways other platforms only dream of.

 

Twitter Open-Sources Heron for Real-Time Stream Analytics

Heron, the real-time stream-processing system Twitter devised as a replacement for Apache Storm, is finally being open-sourced after powering Twitter for more than two years.

Twitter explained in a blog post that it created Heron because it needed more than speed and scale from its real-time stream processing framework. The company also needed easier debugging, easier deployment and management capabilities, and the ability to work well in a shared, multitenant cluster environment.

Read more at InfoWorld

 

 

ONF to Release Guidelines for Deploying Secure SDN Controllers

The Open Networking Foundation’s security working group is preparing to release guidelines for designing and deploying secure software-defined networking (SDN) controllers. The guidelines are currently in review and will be published in June, according to Sandra Scott-Hayward, vice chair of ONF’s security project.

The ONF report also will analyze open source SDN controllers and look at how they compare to other controllers, says Scott-Hayward.

The ONF’s security working group is also working on a guideline on security hardening. This guideline will help members figure out how to select and secure SDN components to configure SDN security. “We aren’t providing specific protocols but giving general guidelines,” Scott-Hayward says.

Read more at SDx Central

EMC Targets Cloud and IoT with UniK, an Open Source Unikernel Tool

EMC hopes to make unikernels a bigger part of the cloud and Internet of Things (IoT) landscape through its open source UniK orchestration tool, which it unveiled this week

Unikernels are application images that contain only the bare minimum amount of code necessary to make an application run. They’re similar to containers in that they pack applications into portable, standalone environments, but unikernels take things a step further by cutting out as much overhead as possible. They also generally contain a complete operating system, rather than relying on a host OS, as containers generally do.

EMC is pitching the product as an easy way for developers to leverage microservices in order to package software for the cloud or IoT environments.

Read more at The Var Guy