Tag
The fundamentals of network design are the essential elements that all network designers must understand and know how to apply. These elemen…
When programming, keeping a solid ground and understanding how to manipulate data will save you a lot of time and effort. For this reason, h…
In this series, I will provide a cheat sheet or summary of important BGP points and information for quick reference and review. This is not …
Welcome to our first post in a comprehensive series that will explore in detail what Network Design is. In this series, we will dive into th…
In this post, I want to discuss one of OSPF's most important building blocks. 💡 When learning routing protocols, the most important step t…
Spanning-tree helps you create a loop-free topology in your switched network. The question we should ask ourselves is: What causes a loop i…
This article explores some of Python's essential functions—enumerate(), reversed(), zip(), map(), filter(), sorted(), and lambda—showing how…
In certain situations, Jinja templates can become overly complex and difficult to manage due to the presence of numerous deeply nested if st…
# Outline: Basics Tips I Want to Remember As I continue to work with Docker, I find that many useful commands and concepts and overall conta…
While trying to wrap my head around some of the NetBox database relationships, I wished for a database schema diagram. I looked through the …
Introduction to Network Automation This chapter delves into the fundamentals of network automation with Nornir, a powerful Python-based fram…
Introduction In network automation, a "source of truth" is vital for managing and automating network devices, IP addresses, and connectivity…
Hey there! Today we will be building a cheat sheet to facilitate using some very helpful tools for network automation. This helps us get som…
Problem Statement The other day I had a situation where I had two Windows machines from work that I wanted to transfer some big files (Bigge…
In the last post of this series, we downloaded the images and created the containers to run our monitoring environment. You can check it out…
SSH Tunnels serve as a powerful method for establishing connections between three entities that face restrictions or limitations in directly…
What Sequence Diagram is A visualization of how the system actors interact within the system application. I’ve been looking for a while for…
Welcome to my network automation monitoring exploration series! These posts are mainly for me to understand the TIG stack, Netbox, Container…
Usually, as network engineers, we use Jinja2 to store configuration templates, so let us check the structures, thinking of a practical appro…
Documentation as Code Jinja2 templates are mainly used for configuration templates. You can also use Jinja2 to format raw or parsed data int…