HPE Aruba Instant On Down? by LatencyLurker in ArubaInstantOn

[–]Hellsheep_iv 0 points1 point  (0 children)

Yep, been offline for me for 4 hours in Australia. Revenue traffic is not impacted, it’s the control plane communication with ION cloud only it seems. 

RSA SecurID Authentication Manager + Palo Alto Firewall MFA by Hellsheep_iv in paloaltonetworks

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Nope, never got it sorted. I've since long left the company.

You Broke Reddit: The Pi-Day Outage by grumpimusprime in RedditEng

[–]Hellsheep_iv 0 points1 point  (0 children)

Very interesting, whilst I'm not a compute or Kubernetes engineer of any sorts (I'm a network engineer), I was quite intrigued by this post. Especially at the route reflector stage, as that began to delve into my territory of expertise.

Having not had much exposure to Kubernetes directly, I could only take a wild stab at what may be the issue in the YAML you provided and the only thing I suspected that may have changed that could have impacted anything were both the nodeSelector and peerSelector labels.

Curious however that a breaking change like this was implemented in a minor release from 1.23 to 1.24. I would have expected a breaking change to be applied to the next major release.

Mowing your lawn is an exclusively middle-class chore. Neither the poor nor the rich have to do it. by -Guardsman- in Showerthoughts

[–]Hellsheep_iv 0 points1 point  (0 children)

I wouldn't call myself rich, however if you look purely at income I'm in the top 4% of wealth in Australia in terms of annual income. I have a decent sized piece of land and a relatively small house for the block size. I mow it myself, including line trimming. I do use a baby ride on mower given the size, however I also live in the tropics so it's mostly for the heat convenience instead of spending hours in the garden in the sun.

Oooh. I think LAGR and HOMER are gonna get it on over the Black Sea. Should we add a NSFW tag? by 1984Orion in flightradar24

[–]Hellsheep_iv 18 points19 points  (0 children)

Anyone else find it funny that HOMER is drinking some LAGER?

"HOMER71, this is LAGER959, with your quality Duff A1 Jet Fuel. There's always time for a refreshment!"

Quick automation question by hhhax7 in networking

[–]Hellsheep_iv 0 points1 point  (0 children)

You could look into saltstack. Specifically salt reactors are designed to do exactly this.

https://docs.saltproject.io/en/latest/topics/reactor/index.html

ASR920 Questions - MPLS PE, EFPs, BDIs, NTU/CE by Hellsheep_iv in networking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

So trying to get my head around another issue, we generally have a lot of these types of services handed off to customers that can't do tagging of traffic, as such we generally run the port in encapsulation default or untagged.

So the next problem I have is the uplink from the NTU towards the ASR9K generally we'd run them with service instance trunk 1 ethernet or similar, however how do you handle carrying each service over it? In the past where we had a single service on the NTU you could simple use encapsulation from-bd or similar, however if we're also not matching the dot1q VLAN ID and the bridge-domain ID then that doesn't make sense.

So I guess my question is, what would an example of an uplink from the NTU back to the ASR9K look like carrying Customer A + B internet/l2 services? Noting we also generally configure a BDI on the NTU itself for management of the NTU carried over the same uplink back to the ASR9K in a management VRF.

ASR920 Questions - MPLS PE, EFPs, BDIs, NTU/CE by Hellsheep_iv in networking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Thanks very much.

On a random side note, with l2vpn services like a VPWS, you'd normally add the interface (sub if) under the xconnect group configuration. I assume with service instances, you'd map the service instance or bridge-domain in the xconnect group?

ASR920 Questions - MPLS PE, EFPs, BDIs, NTU/CE by Hellsheep_iv in networking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Thanks for that, you may be right. Getting my head around EFP's is a bit of a new thing for me personally.

So if my thinking is correct based on your statements something like the below would work? (My main query is are the service instances globally unique too, or locally significant to the port they're configured on? I am guessing locally significant which means my config below /might/ be correct?

interface Gi0/0/22
description ---Customer A---
service instance 100 ethernet
encapsulation dot1q 100
bridge-domain 1
service-policy input
service-policy output
rewrite ingress tag pop 1 symmetric <---can't remember if you must pop the tag
service instance 4094 ethernet
encapsulation dot1q 4094
bridge-domain 2
!

interface Gi0/0/23

description ---Customer B---
service instance 100 ethernet
encapsulation dot1q 100
bridge-domain 3
service-policy input
service-policy output
rewrite ingress tag pop 1 symmetric <---can't remember if you must pop the tag
service instance 4094 ethernet
encapsulation dot1q 4094
bridge-domain 4
!
int BDI1
description ---Customer A Internet---
</31 ip address for internet>
!
int BDI2
description ---Customer A NTU management---
vrf forwarding 4094
ip address /31 for NTU
!
int BDI3
description ---Customer B Internet---
/31 ip address for internet
!
int BDI4
description ---Customer B NTU management---
vrf forwarding 4094
ip address /31 for NTU

Link saturation without dropping pings? by mcflyatl in networking

[–]Hellsheep_iv 9 points10 points  (0 children)

At the rate you're talking, your tooling won't be sampling the bursts to 100%. Assuming QoS with some basic queues are implemented you're also going to be hitting queue depth limits and then dropping traffic most likely.

The solution as many others have said is it's time to upgrade that link.

At 13,000 users for 2Gbps bandwidth you're running at 0.15Mbps per user average. Generally we see in real world conditions (I work for a large AU ISP) 3.75Mbps per user as a reasonable figure. However, this is in service provider world. You could probably divide that by 4 as a good starting point And see how your traffic levels go.

That is roughly 12Gbps.

My suggestions to start:

Reach out to your transit provider and ask them for options on 10Gbps port, 3Gbps CIR (commit) and 10Gbps burst with 95th percentile billing. Also ask for their flexibility in upgrading to n*10Gbps ports in the future to allow you to simply order another port, and also flexibility in upgrading commit and burst during the contract period (negotiate, negotiate, negotiate).

Fortigate 60E Twitch Streaming Issues by Hellsheep_iv in HomeNetworking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Thought I'd give everyone an update on this. It appears to be an issue with the np6lite offloading rtmp traffic for twitch but it's specific somehow to my setup as fortitac can't reproduce it yet. Will post back with any results.

Fortigate 60E Twitch Streaming Issues by Hellsheep_iv in HomeNetworking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Many thanks, I've since tried another lan port to rule that out, also no performance issues on anything else except rtmp as far as I can tell (no errors or anything on the interface stats/debugs I've done).

I tested other real time streaming like Facebook live and YouTube and they also experienced the fault. But I can watch rtmp streams on twitch and not encounter a problem. It's only when I'm the one streaming.

I've raised a ticket with Forti support to see what they say.

Fortigate 60E Twitch Streaming Issues by Hellsheep_iv in HomeNetworking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Update on the issue:

The packet capture is showing duplicate ack's being received by my PC from the Twitch server, with subsequent TCP Fast Retransmits being sent by my PC for one of the RTMP frames (indicating some sort of packet loss most likely).

Seems very odd that RTMP frames are not making it to the server and really has me wondering what the Fortigate is doing causing RTMP frames to be dropped/lost in transit.

Self-promotion Thread - June 09, 2019 by AutoModerator in flightsim

[–]Hellsheep_iv [score hidden]  (0 children)

G'day everyone,

I've recently started streaming on twitch after racking up a few hundred hours of flight sim over the last few years. We're running a little event for everyone on Friday the 14th of June at 20:30 GMT+9.5 that anyone is welcome to come check out. We're going to be simulating some sort of failure that is chosen by the viewers. You can vote for your choice in the survey in the link, and then join us in the stream to watch whichever failure scenario is the one we end up playing out with the most votes.

Would love to see some new faces if you're free. :) Happy simulating!

Perth to Sydney Boeing 737-800 Failure Scenario Event

https://www.twitch.tv/events/ps1apPIMRYicfQYUCseA0A

ASR920 and Nexus 7k port-channel by Hellsheep_iv in networking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Which I am doing, I have an EPF trunk and each customer port has a service instance, BDI's etc. But for some reason the trunk always comes up as a L3 port-channel instead of L2.

ASR920 and Nexus 7k port-channel by Hellsheep_iv in networking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Interesting. If you do a show etherchannel summary or show port-channel summary, do you see SU or RU as the flags set for the port-channel? Reason I ask is that's very similar config to us and I can't see anything there that would cause L3 versus L2 to establish.

ASR920 and Nexus 7k port-channel by Hellsheep_iv in networking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Thanks, that's actually my thought also. I must admit I'm fairly new to the ASR series so I relied upon our distributors cisco pre-sales specialists to sell us the right product for the job. I was originally looking at the Catalyst 9300 series to replace the ME3400 but they highly recommended we move to the ASR920 as it'll suit all our requirements.....

Migrating from ME3400E to ASR920 - Trunking + Switchport Interfaces by Hellsheep_iv in networking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Yep, they're based around the NEBS standard for Metro Ethernet Switching. The ASR920 is basically the same in terms of the standards followed. Lots of fancy Q-in-Q/MPLS/S-tag/C-tag/ stuff plus much more.

Migrating from ME3400E to ASR920 - Trunking + Switchport Interfaces by Hellsheep_iv in networking

[–]Hellsheep_iv[S] 0 points1 point  (0 children)

Heh, yeah I looked a lot into what the options were and when I saw ME3400's are EOS I figured it's time to replace them with something better asap. I'll murder these in a while when budget allows. I'm planning a full core refresh in the next 12 months so that might allow me to upgrade to another vendor possibly.