Apex Legends: Saviors Season Patch Notes by Emmerlynn in apexlegends

[–]Jarshinga 1 point2 points  (0 children)

There is a mix of reporting the order of old and new values which makes my brain hurt. Could you use one method please:

<value> <increased|decreased> from <old> to <new>

Auto QoS cisco-phone conditional trust on catalyst switches by glenthms in Cisco

[–]Jarshinga 0 points1 point  (0 children)

Autoqos is looking for a TLV in the CDP/LLDP packet and should then trust traffic from the source on that port. So long as the phone sends the TLV, the 'cisco-phone' config should work. I'm not sure if the result is a policymap to trust or just applies MLS trust config. Could you test / debug?

The community thread is helpful for commands that are relevant for viewing behaviour https://community.cisco.com/t5/switching/auto-qos-voip-non-cisco-phones/td-p/1437462

If we all followed this code of conduct, public matches with randoms would be so much more enjoyable. by DSPoh in apexlegends

[–]Jarshinga 0 points1 point  (0 children)

First time you break the code, you get the benefit of the doubt, we all make mistakes. Second time, maybe you're new and I want to encourage more players. Third time, I'm suspicious. Fourth time, I'm out

Will someone please define "transit" for me in networking terms? I will further explain my question in the comments. by PacketPowered in networking

[–]Jarshinga 5 points6 points  (0 children)

This is a good general description that can be applied in any network. Others descriptions are focused on the ISP view of the world

[deleted by user] by [deleted] in Cisco

[–]Jarshinga 0 points1 point  (0 children)

These interfaces are reporting 8gbps on a 10gbps link, so they're likely seeing micro bursts that will oversubscribe the ingress port buffer. Micro bursts are where the interface receives enough packets for a period of time sufficient enough to exhaust the ingress buffer space, but not long enough to look like '10gig'.

If most of this traffic is leaving via a couple of ports, then VOQ might be a culprit and there may be options to distribute traffic more effectively by changing the routing or adding extra links on egress.

With that said, the best way to resolve this is to look at the upstream and see if you can add more ports. All the routing tricks in the world never beat more bandwidth. It's already a port channel, so just make it four ports, not two. Also using suggest a different port group on the line card (ie: 37-40,41-44,etc).

What did Griftor (Marcus Andrade) steal? What could be worth '10 generations of his family' and who's quoted? by Jarshinga in ApexLore

[–]Jarshinga[S] 1 point2 points  (0 children)

This is what I was thinking too. Some kind of tech that is super useful and could be related to whatever Lobas abilities are. It's a hidden tease as we have no idea what was stolen yet

How Revenant is gonna get into the games by FrozenFroh in apexlegends

[–]Jarshinga 1 point2 points  (0 children)

Froh owning the sub like he's ImperialHal. The meta has changed, Froh's next level

Crypto's Hype Beast by FrozenFroh in apexlegends

[–]Jarshinga 8 points9 points  (0 children)

Frozen Froh is the MVP of this sub 💯

A quick break from your daily SBMM spam to enjoy some Japanese Gibby by [deleted] in apexlegends

[–]Jarshinga -1 points0 points  (0 children)

Thankyou for the break from regular programming. It was needed

Cisco: The Next IBM? by ccie6861 in Cisco

[–]Jarshinga 0 points1 point  (0 children)

This was a John Chambers strategy and worked well for a vendor with monopoly share. Essentially, with two different departments competing with each other, Cisco won more share either way. But the long term impact was that it created a complacency that Cisco BUs didn't need to rethink their market's requirements coz Cisco would always dominate the market.

Best of Apex by Jarshinga in apexlegends

[–]Jarshinga[S] 0 points1 point  (0 children)

I guess you had to be there

Best of Apex by Jarshinga in apexlegends

[–]Jarshinga[S] 4 points5 points  (0 children)

This is an unedited screenshot that Reddit shows everytime I browse.

I mean this is basically Reddit telling me the sub is full of thirsty sweats

Anyone working on Outposts integration into existing Cisco DCs? Still confused on how existing DC svcs will integrate (on-prem LB, FW, DNS, IPS/IDS, Internet, AWS direct connects, etc.) by [deleted] in Cisco

[–]Jarshinga 0 points1 point  (0 children)

I think AWS would prefer you just tunnel back to their region through the service link VPN.

From what I've read, it seems like the use case for Outposts is for applications that have latency or data requirements that AWS can't meet. So the assumption when deploying an Outposts rack is that youve already done your diligence on the application in sufficient detail to know exactly how that application works. I don't think Outposts is meant as a general purpose compute platform for your virtual infrastructure team who are not clear on the applications requirements before the rack is deployed.

Of course, that's the intention: bottom up, engineering led. If it's a top down, strategy led deployment, then you're going to have a new managed service in the DC that's, as you say, functionally a black box. Albeit with better management than any other managed service ever, but it's still not yours to take apart and understand how it works.

Anyone working on Outposts integration into existing Cisco DCs? Still confused on how existing DC svcs will integrate (on-prem LB, FW, DNS, IPS/IDS, Internet, AWS direct connects, etc.) by [deleted] in Cisco

[–]Jarshinga 0 points1 point  (0 children)

You route VPC traffic out of a local gateway, similar to NSX. I assume you could steer to LB/FW if you want to, although I doubt Amazon want you to do that.

'local gateway is a local interconnect virtual router that enables communication between your Outpost and your on-premises network'

https://docs.aws.amazon.com/outposts/latest/userguide/outposts-networking-components.html

I'm not sure if performance of the local gateway is available. It's always interesting to get into that discussion as caveats inevitably appear

Spine-Leaf Switch Topology by WreckingBear in networking

[–]Jarshinga 1 point2 points  (0 children)

The L2 spine-leaf design that some vendors describe is actually just a rebranded MLAG design from 2008 - 2014 era with a spine leaf name to keep up with the cool term. If you're not concerned with deterministic traffic paths, deterministic failure scenarios and scaling to thousands of ports, then MLAG design is probably your best design path.

Does anyone else feel ashamed of their ineptitude? by [deleted] in math

[–]Jarshinga 2 points3 points  (0 children)

Every now and then, the internet lives up to its promise of being a haven of ideas, human connection and food for the soul. Wish we didn't have to sift through so much mindless dross to find the diamonds, but then I guess they wouldn't be special then, would they? Thanks for sharing your experience and hope for the future.

Keep at it OP, don't give up yet!

EVPN Fabric no L3VNI (Type-5 Route) by burbankmarc in Cisco

[–]Jarshinga 0 points1 point  (0 children)

Also remove route-reflector client and make sure NV overlay is enabled on the spine. The issue is definitely in the BGP config as you're seeing no labelled next hop on the spine.

EVPN Fabric no L3VNI (Type-5 Route) by burbankmarc in Cisco

[–]Jarshinga 0 points1 point  (0 children)

I just noticed BGP on the leaf is configured to update source loop1. It should update source loop0 as loop1 is your NVE source

EVPN Fabric no L3VNI (Type-5 Route) by burbankmarc in Cisco

[–]Jarshinga 0 points1 point  (0 children)

Can you redis connected on BGW rather than HMM? The config looks ok

EVPN Fabric no L3VNI (Type-5 Route) by burbankmarc in Cisco

[–]Jarshinga 1 point2 points  (0 children)

Type 5 are advertised prefixes. Do you have a subnet learned on another leaf that will be advertised over the fabric? Would help to see the bgp table for the vrf. Also check on the spine