Scott's Weblog The weblog of an IT pro specializing in virtualization, networking, open source, and cloud computing

Technology Short Take #80

Welcome to Technology Short Take #80! This post is a week late (I try to publish these every other Friday), so my apologies for the delay. However, hopefully I’ve managed to gather together some articles with useful information for you. Enjoy!


  • Biruk Mekonnen has an introductory article on using Netmiko for network automation. It’s short and light on details, but it does provide an example snippet of Python code to illustrate what can be done with Netmiko.
  • Gabriele Gerbino has a nice write-up about Cisco’s efforts with APIs; his article includes a brief description of YANG data models and a comparison of working with network devices via SSH or via API.
  • Giuliano Bertello shares why it’s important to RTFM; or, how he fixed an issue with a Cross-vCenter NSX 6.2 installation caused by duplicate NSX Manager UUIDs.
  • Andrius Benokraitis provides a preview of some of the networking features coming soon in Ansible 2.3. From my perspective, Ansible has jumped out in front in the race among tools for network automation; I’m seeing more coverage and more interest in using Ansible for network automation.
  • Need to locate duplicate MAC addresses in your environment, possibly caused by cloning VMs? Matt Boren has a PowerShell script over at vNugglets that might be helpful.


Sorry, I don’t have anything this time around. Check back next time!


  • Mike Foley tackles the topic of TLS 1.2 and vSphere.
  • Cossack Labs recently released Acra, a database encryption suite designed to protect applications against data leaks by providing strong encryption. In this respect, it seems similar to HexaTier, a company I spoke with last year (as of this writing, the HexaTier product was no longer available per their website). As opposed to just encrypting data at the transport level (although Acra does that between components of its architecture) or just encrypting data at the storage level (using an encrypted file system or similar), Acra targets encrypting data at the table/row/column level within a database. Acra is open source and available via GitHub.
  • Federacy recently published an article about the results of their Docker image vulnerability research. There’s some good information in this article; I recommend reading it.
  • Cisco Systems recently disclosed a vulnerability affecting more than 300 models of switches; see this Ars Technica article for more details. While this may seem like a big deal, it relies on the device being configured for telnet (which is itself something you should have addressed already, IMHO). Thanks to Devender Sharma for the link.

Cloud Computing/Cloud Management

  • Paul Johnston takes a very sensible approach in his post on cloud first serverless second. His point about organizations and individuals needing to focus on the basis for the tools (instead of the tools themselves) is spot on in my opinion, and it underlies the recommendation that organizations/individuals need to become conversant/fluent with cloud operations before trying serverless architectures. (Hat tip to Maish Saidel-Keesing for sharing this article via Twitter.)
  • Here’s a post outlining some of VMware’s more prominent open source projects in the “cloud-native” space. Some of these you’ve probably heard of, some not.
  • Ivan Pepelnjak is best known for his deep networking expertise, but a recent article of his focused more on OpenStack—in particular, some of the “lessons learned” via Paddy Power Betfair’s OpenStack Reference Architecture whitepaper. My takeaway? A lot of the design decisions are common sense decisions that you’d see in any other “normal” technology implementation (but are, for whatever reason, often overlooked in attempted OpenStack implementations).
  • Gavin Lees shows how to create a Photon OS container host blueprint. Or, in plain English instead of vRA jargon, Gavin shows how to prepare a Photon OS instance that can be deployed by vRA and which registers automatically with Admiral (VMware’s open source GUI for deploying containers).

Operating Systems/Applications


  • Chris Evans has a post from January talking about building data storage with containers in which he briefly touches upon some storage solutions being built using containers. Maybe I’m missing something, but this doesn’t seem as revolutionary to me as it’s made out to be—in this context, containers are just another way of delivering the compute functionality necessary to manage the storage and provide data services on top of that storage. Or is there more I’m not seeing?


  • VMware recently announced the open sourcing of some software development kits (SDKs) for the new REST APIs in vSphere 6.5. This is great news, and something VMware needed to do. If you’d like more information on using the SDKs, there’s a couple blog posts (here and here) that may be helpful getting you started, and you can also check out the GitHub landing page for the SDKs.
  • I’ve said for a while the whole “containers vs. VMs” situation is a false dichotomy, and apparently I’m not alone in my beliefs. In this article, a presentation given by Graham Whaley of Intel discusses the “continuum” that exists between containers and VMs, and how in the future we’ll pick and choose the best attributes of both approaches.
  • Eric Shanks provides a high-level overview of creating vSphere images and AWS AMIs using Packer.
  • William Lam explains a slight change in the recently-released vSphere 6.5b patch update, in which users with no vCenter permissions can no longer log into the vSphere Web Client.

Career/Soft Skills

  • Knowing the correct questions to ask and how to ask the questions correctly are important skills. This article helps provide some guidelines. Well worth reading, in my humble opinion.
  • Greg Schulz has a two-part series on tradecraft that I found interesting (part 1 and part 2). Although he’s discussing tradecraft in the context of storage, I think some of the points he makes are applicable to any career (and certainly any IT career).

That’s it for this time around. Look for the next Technology Short Take in approximately two weeks. Thanks for reading!

Be social and share this post!