DENOG14
Beginners crash course for monitoring networking components like switches or modbus gateways with Prometheus/Grafana as monitoring stack. We‘ll go through the basics of snmp and snmp_exporter, getting things into Prometheus and using Grafana as Visualization. Later on we'll also touch some modbus basics and utilize the modbus_exporter. The workshop is primarily aimed at newcomers who have not yet been able to take the time to deal with these and will be more superficial than too deep.
Every book about network automation I looked at had one
or more chapters introducing the reader to Linux in one
form or the other.
In this workshop we'll see how to move forward from there,
the focus will be on setting up your work environment,
some automation and (network) troubleshooting tools. Most
of these tools should also work on macOS or the Windows
Subsystem for Linux (WSL). Even if you don't use a particular
tool ($EDITOR comes to mind), I'll try to give you some ideas
how to make your life easier. And I'm happy to learn about more
tools and tricks from the audience.
The first part will be about setting up your work environment,
including shell, editor, ssh and git. This part will also cover
some very basic shell scripting and show how to access APIs from
the command line.
The second part will be about troubleshooting and cover some tools
for TLS, DNS and network testing.
The audience is invited to try some tools discussed so
bring you own Linux (or Mac or Windows with WSL). Note
that not all tools may be available for your system, and
you may need admin privileges to execute some of them.
Introduction to BGP workshop same as the last time at Hamburg for Sunday. Participants should be familiar with IP, IP prefixes and routing as such - we will not start from scratch. Prior knowledge of BGP is not required. Bring a laptop as there will be some lab-experiments!
In network engineering there are a lot of rules and best practices, some written and some not. In this workshop we condense the most important knowledge we have accumulated over many years of running different service provider networks.
We'll take a look at fundamental architecture decisions, traffic engineering and routing security for data and control plane.
There will be lots of real world config examples and plenty of time for questions and discussion.
Who is this for?
It is intended for people who (want to) run small to medium sized ISP networks. A basic understanding of routing concepts is going to be helpful. If you've configured a bgp session before, this workshop is for you.
Content Overview
Session 1:
-
Interconnection
-
Network Design
-
(BGP) Traffic Engineering
15 min break
Session 2:
-
RIPE, RPKI & PeeringDB
-
Route Filtering - Building Blocks
-
Route Filtering - Policy Building
15 min break
Session 3:
-
Protecting the Control Plane
-
Forwarding Plane Filtering
-
BCP 38
-
uRPF Filtering
-> Q&A Session
EPS Global along with Edgecore Networks, IP Infusion, Radisys, and RtBrick, will present an open solution for a fiber-to-the-home deployment (FTTH). The focus of the workshop will be on an open, disaggregated, XGS-PON network from the central office to the subscriber's home. Comprising of the ONT to OLT, aggregation of OLTs, vBNG, routing, and transport to the core.
Disaggregation has become a key driver for Tier 1 providers like Deutsche Telekom, AT&T, Orange, Telefonica, and more. With the help of the Telecom Infra Project (TIP), and the Open Networking Foundation (ONF), the benefits of building open and disaggregated networks are now realizable for all providers, regardless of scale.
You’re network engineers, so we don’t have to explain the countless names you can call a console server. Instead, let’s talk about capabilities, because that’s what you really want to know about at 3 AM when you have an issue to resolve. Are you going to be able to remediate a disruption from your home? Or are you getting connectivity on Day One, when you’re sending equipment to an unmanned location?
In this workshop, Klaus Gretencord Sales Engineer for Opengear North – an engineer with 20+ years of experience, will be using his LIVE Lab environment to show you how to ensure Network Resilience in your infrastructure whether that’s an edge site, datacentre, production site, campus network, or branch offices - wherever in the world it’s located – from wherever you are.
Maximum uptime, always-on access, along with enterprise-grade security, are the standards of all devices in the future-focused Network Resilience Platform. This includes the award-winning NetOps Console Servers.
Using Smart Out-of-Band, NetOps automation, Failover-to-cellular and centralised access – Klaus will showcase the following capabilities remotely LIVE:
• Configuring Serial Ports
• Provisioning new devices ‘Mars Lander’ style
• Accessing network devices
• Power Cycling
• Configuring Users
• System Services
• Authentication
• NetOps Automation: docker containers, ansible
• Centralised access and control: Lighthouse Centralized Management
• System Administration
If you are a network or IT administrator, this is a first-hand look at the wide range of capabilities that the Future-Focused Network Resilience Platform devices with Smart OOB™ provide to professionals like you.
From 0 to a full-blown EVPN/VXLAN leaf-spine datacenter deployment in <2h? Sounds like a fairy tale.
In this workshop, Michael will show you interactively (participants get their own environment) how to define and configure a datacenter design in YAML and Ansible based on the Arista Validated Design. It includes a set of Ansible roles and modules to help kick-start your automation.
Is this your first DENOG (since a long time)? Join us to learn everything about the community, association and more!
Ein Überblick über den Verein, die Arbeit des letzten Jahres und die Schwerpunkte der nächsten Jahre.
Ziel der Session ist es einen allgemeinen Überblick über die einzelnen Projekte des Vereins zu geben,
wo diese heute stehen und wie Mitglieder und nicht Mitglieder sich einbringen können.
Die Session ended mit einem Q&A Teil der als “Ask me Anything - zum Verein” verstanden werden kann.
Hilfe, ich werde befördert - was du von einer Karriere als Senior+ Engineer, Tech Lead oder (schluck!) Teamleiter erwarten kannst oder wie man sich darauf vorbereitet.
Und warum das manchmal gar nicht so doof ist. Nach einer kurzen Vorstellungsrunde wollen wir euch gerne in die Diskussion einbinden und über eure Erfahrungen nach einer Beförderung mit fachlicher oder gar disziplinarischer Führung quatschen.
Wir erhoffen uns dadurch einen Austausch in der Community, der das technische verläßt und sich auf die allzumenschlichen Seiten der Kommunikation konzentriert.
Annika ist Staff Engineer bei Github, Cedi Senior Engineer bei Microsoft und Falk macht seit über zehn Jahren Personalarbeit bei verschiedenen KMUs.
Welcome to DENOG14!
The life cycle of ICT hardware has a significant impact on the environment and the scarcity of raw materials. Resource extraction and processing are responsible for 50% of greenhouse gas emissions and 90% of biodiversity loss. Scaling up the circular economy is key to achieving climate neutrality by 2050, while decoupling economic growth from resource use and keeping resource use within planetary boundaries. Optimizing the lifetime of ICT hardware is necessary to be able to achieve the circular and environmental goals.
Network automation can greatly benefit from having a single source of truth (SSoT) for all of your data. In real environments however, the authoritative data sources are often spread out between different systems. The Nautobot SSoT plugin powered by its backend library diffsync has been built to address this use case by enabling continous data synchronization between different systems.
This talk will talk about the Euro-IX activities.
- The IXP{DB} project - I'll provide a brief history on when and why the project started, the progress through the years and where we are now and a road map to show the future plans.
- The Peering Toolbox - a tool for learning about peering for new entrants in the industry.
- The IXP Report - I'll show some statistics from the report to give some insight into IXP operations.
This talk gives an insight of 400G-ZR and 400G-ZR+ for wide-area links. Whilst most presentations are theoretical, this one is based on real-world deployments and the side effects you can observe.
The wave of 400GE IP routing satisfied the increased bandwidth demand observed during the global pandemic with many optical module variants emerging depending on use case, cost and technology. Technology has evolved since, and routers with 800GE interfaces are now available giving early adopters many benefits from power and density perspective.
This presentation provides a unique insight in what technology advancements were required to realize such capacity increase. It touches on considerations such as optical interface technologies (and interworking), power, cooling and system design necessary to interconnect your systems at 800GE interface capacity.
Following some discussion at RIPE84Fredy Kuenzler and I put forward an Internet Draft to define a well-known advisory BGP community to denote prefixes are used for Anycast.
To quote from the abstract of the ID:
In theory routing decisions on the Internet and by extension within ISP networks should always use hot-potato routing to reach any given destination. In reality operators sometimes choose to not use the
hot-potato paths to forward traffic due to a variety of reasons, mostly motivated by traffic engineering considerations. For prefixes carrying anycast traffic in virtually all situations it is advisable to stick to the hot-potato principle. As operators mostly don't know which prefixes are carrying unicast or anycast traffic, they can't differentiate between them in their routing policies.To allow operators to take well informed decisions on which prefixes are carrying anycast traffic this document proposes a well-known BGP community to denote this property.
You can find the lastest version of the draft at: https://datatracker.ietf.org/doc/draft-wilhelm-grow-anycast-community/
The presenter has been active in different data centers over many years. Many times has he helped out other parties with various tools or materials. Even looking for help from time to time, the fixe idea formed to have a data center machine to be able to buy nuts and screws, tools or cables. But this was nowhere to be found. This seemed like something to start an interesting project...
The journey started with an idea how to get some kind of data center vending machine project going. What would be needed? How could it be provided given the different machine types? How about support? All types of questions and a long journey with many people involved started.
After many setbacks, many ideas thrown out, many people saying "No this will not work!" the device actually got shipped. But this was only the start of an even longer journey to the point, the first patch cable changed hands and the first optic got programmed and used inside the data center.
RFC9234 allows to assign a role to each BGP neighbors. Roles can be matched when setting up sessions and a transitive attribute is added to prefixes which should be announced to customers only.
Over the years many talks and workshops have been held to improve and spread the overall knowledge of BGP and it's knobs, configs and features. These days there are only a few up-to-date and vendor-agnostic references when it comes to design, control plane and forwarding filtering in modern carrier and/or ISP like networks.
We think that DENOG is the perfect organisation to form a group of people willing to contribute their knowledge to create documents containing best practice tips and configurations for the community.
We call the community to participate in the "DENOG Working Group Routing" (wg-routing).
With vPC Fabric Peering, direct links between vPC peers can be eliminated in most situations as vPC traffic goes through the fabric. It even simplifies the VXLAN-EVPN configuration in some cases. This lightning talk gives a short overview of how to configure vPC Fabric Peering and sheds light on a few pitfalls.
Most companies are already aware that diverse teams can help with innovation, performance and prevent "group think". But aside from the usual "we're open to applications from all backgrounds"-sidenote, many companies and hiring managers aren't sure how to best go about diverse hiring.
If you keep getting applications from the same crowd and want to do something about it, come along and reflect on changes you can make to your hiring policies, interview processes and company culture!
In this presentation Pavel will share practical real field aspects of using BGP Flow Spec for DDoS mitigation. I will talk about level of vendor support level and known implementation issues.
Day1 is coming to an end, let's see where we're headed...
In a heterogeneous environment the devices need to cooperate. This talk aims to define the common ground for planning and implementing QoS. Different designs are compared and - if possible - matched.
Monitoring of traffic flows is a central aspect of modern network engineering from planning peering connectivity to anomaly detection. This talk discusses how we handle flows from different sources, enrich them with additional contextual data such as customer names or geo locations, and use that information in different contexts using our own Open Source flowpipeline tool.
BelWü (AS553) is the research and education network of the German federal state of Baden-Württemberg.
DE-CIX has been working on the introduction of EVPN on its peering platform since the beginning of the year. Considering the increasing number of participants, especially in Frankfurt, the introduction of EVPN including ProxyARP/ND is already overdue in order to get the exponentially growing broadcast/multicast traffic in our peering LANs under control and to reduce the load on customer routers. Additionally further security features based on a ProxyARP/ND agent according to RFC 9161 will be activated and the protocol stack of our global network will be expanded to include RSVP-TE and sBFD. In this presentation we would like to present the course of the project, benefits and side effects for DE-CIX customers, explained in technical detail.
At the time of the potential presentation, we will already have migrated the first peering LANs and will be a few weeks in front of the DE-CIX Frankfurt migration.
Are you hearing the word sustainability more and more often but you are not sure what exactly that means for you, your company, or the industry? In this talk you will learn about the new upcoming regulations, tracking options, network vendor sustainability data, reporting types and forms, organizational integration of sustainability data, as well as some certificates you can apply for. You'll also get insights into our lessons learned at Inter.link and our best practices to assist you on your sustainability journey.
There are very few troubleshooting tools that work across the public internet reasonably reliably. Well, it really boils down to Ping and Traceroute. Of those two, the latter is sometimes referred to as the "the number one go-to tool" for troubleshooting problems on the internet [1]. That is not, because it provides all the information we need or would like to have but at least, for the most part, it is universally supported. Traceroute is however missing one important piece of information, and that is information about the return path, i.e. the path from the target towards the host that initiated the traceroute. In this talk, we look at why this would be useful, what people have worked on in the past to implement a reverse traceroute tool and recent work in the IETF that aims at defining a standard protocol for reverse traceroute [2].
[1] https://nanog.org/news-stories/nanog-tv/nanog-80-webcast/troubleshooting-with-traceroute/
[2] https://datatracker.ietf.org/doc/html/draft-heiwin-intarea-reverse-traceroute
Pastel de Natas are delicious and while sharing some in Belgrade, the topic of "all traffic goes via Frankfurt" came up. So what does the traffic numbers actually say. And is the result something we should discuss?
PeeringDB has been around for almost 20 years and is the go-to place for interconnection data. Whether to find new peers around you, looking for facilities when expanding your networks or retrieving configuration data for BGP sessions. PeeringDB has all of these data.
The database is a non-profit, community-driven initiative run and promoted by volunteers. It is a public tool for the growth and good of the Internet.
Due to the pandemic situation, we haven't updated the German community for a while. This presentation briefly introduces PeeringDB to bring newcomers up to speed and then roughly goes through the new features and developments
Route leaks containing more specific announcements of Internet Exchange Peering-LANs pose a risk to the reliability of Internet infrastructure.
RPKI validation and filtering can mitigate some of the dangers - if the IXP operator created proper ROAs.
In this lightning talk we will take a look at what can go wrong, how RPKI ROAs can save us and what the current state of the rollout is.
In this talk, Pim will demonstrate high performance routing using open-source VPP and its underlying Data Plane Development Kit. This talk highlights the authors work on integrating the Linux Control Plane which makes BGP, OSPF, etc available with VPP, including smart ways to automate configuration of the router's data- and controlplane layers.
We’ll then turn to a popular DPDK based network load testing tool TRex, and discuss performance benchmarking results from the field using the author’s AS8298 as a practical example. This will demonstrate that a fully open source router can seriously compete with silicon based router vendors.
This talk will present a scalable, redundant and vendor-neutral approach to provide firewalled network segments within an EVPN fabric.
Instead of stretching layer-2 segments, VRF route leaking is used to route traffic from network segments to the firewalls in a generic way. Using anycast gateways within the EVPN fabric, a consistent gateway behavior across firewalled and non-firewalled network segments is achieved.
A lot of things have been added and improved since the last talk at DENOG10.
We want to take this opportunity to provide an update on what we have done on and what our agenda looks like.
News from IXPs in Germany
Thank you for joining us at DENOG14!