Merken

FBTFTP: Facebook's open source python3 framework for dynamic TFTP servers.

Zitierlink des Filmsegments
Embed Code

Automatisierte Medienanalyse

Beta
Erkannte Entitäten
Sprachtranskript
so my name is Angela and to them talk about the 1 of the an open source project that been working on Facebook so the small interaction about myself and this is the me on 1 of our that this and this is in some affair with my several and so I'm a production engineer if you are familiar with the positions like as will either bead engineer or this basically we are a hybrid between them so source developers and and people like cooperation engineer basically I so our focus is reliability performances we engage with softer developers to make sure that the data and another softer we run our scale we will be like gratitude was to 2 types of production engineering team uh
1 type is embedded production engineers there are people that are embedded in product teams like in his for those team and we basically engage with them we make sure that the and the software operator or scalar then there is another type of reduction you know which which is 100 % production engineers and this is my let my team is 100 % changing that means we radical and we support the call with a political except I joined around 2011 so make 5 years ago Morris in that way and my 1st thing was a cold sites reliability operations now basically the 1st people responding to incidents that Facebook's all we needed to watch everything around the infrastructure from the website to the API for the mobile phones in our storage for those entities just pretty scary if you had picked Industrias where the this I was physically watching the site along on over the weekends and millions of people would you rely on me watching inside but eventually we managed to other made ourselves of the the job using by the and we wrote a tool called f buyer Facebook other remediation and which is a tool that and was spending an hour earlier consists consistent finding like all the others and try to remediate them automatically eventually became meeting was closed and that is what you want you want to other media job so what most of us joint different teams and I joined the cross the infrastructure keen on some items basically own said that the center core services for that I mean services like DA to be tested be the analysis without suffered out there anything basic that you need to run hybrid computers at scale and we do that we know the mission and we used heavily by the sum of sparse as well and we receive responsible for 1 of the thing responsible our bodies and making sure that you've installed operating systems on tens of thousands of service and you can do that basically no human intervention and we also all know dimension to it being up capacity and emission capacity that this was agreed by the end of the mission to make sure that when you have a new aggressive made of tens of thousands of service you can press a button and everything would have been held emissions would we come to you and all the victims will know about this new class success when I was about these 2 which this before for heck yeah so there is no Growling it there's just other people's computers right so long raise your hand if you working others and the environment only on some physical infrastructure by just a few people have any effect this style could be interesting also only by costly fuel deal with you you hybrid because you think you are on what you need to do do you make sure that again devoid of service and yet somebody needs to penetration them um so I wanted to say that we also ran container infrastructure and Facebook but we know that my team is responsible for making sure that the hydrogen bonds the containers can be automatically deployed so we did something like an AWS in his house this is an Compute Server analyzer 1 from 2012 I think fiscal grants this this nonprofit organization actually doesn't run it it is part of the board of open computer itself open source initiative for the sender and the server design we open source designs on how we do that is indirect assistance or how we decide our many motherboard a so you can check it out and in the truck my my team is it possible for installing the use of the wonderful and
we have many many of them we have many that the whole strategies to each made of many many rocks
and review things like this and this is a picture from that 1 of our that indices we'd end up in the pharmaceutical and this is a picture of when you know it was being built with the 2nd reading exited that this 1 up to to this 1 and we have many
it like some of them around the world we have a few in the US we have 1 neuron which is our 1st system that and the other outside the US and we are just in the process of building 1 in that with In addition to that we also have many books around the globe and we need box point of press presence to and make the user experience faster we want to be as close as possible to the end users and the location of these faults is still there and the way and we
don't have any in Africa and with have a few with anyway so get basically what make recommend this hands-free provisioning line and the I can't have people physically going we use the stick so CD-ROMs around standard to installing tens of thousands of so that was an and burgeoning is complex this many many many different and variables at play there is like a version of the DOS different versions of the emus are the different versions of the can if your stock is the 6 commonly or before was that could would be 6 if you're dealing with a bias machine machine which will draw the using hybrid exceed tool at which several type you're deploying and all of these components but today and then talk about 50 B so gifted P like in
2016 what the hell like did not use stations the command well that it is still used not used on the open internet of course this is very very unsafe but it's very very useful in that others in the environment and the environment there reason is it's a simple prodigal did this there's no specification of the ball I a simple we cannot find yourself in maybe like 1 week 2 weeks if you want to support to different diocese flights is to implement and if you to be UDP-based that that means that you don't need a full TCP IP stack which means the quality produce various very small and that means that you can combine this into small chips it's affecting about network-on-chip of for that and because of that the usually it's using embedded devices and our network with and that if the p is used initialize within the it's the other way to that will never would suffer machine from the network and some people say why don't you number and I exceed the dietary under sheets but we we we could do that but that's what I was scared because we want to try different versions of the would problems so I in them and to do that we want to be able to change a lot of the network of new version of the of the of the biblical result we don't actually member and I think see on any enables stood on chips it's alright so this is all
review all over how the depletion face works is divided tree parts you know power on the machine had this and that would face which have been going to do later after you again you get your network duration you about during a and you can you would step from that from there we use send so I have been based them operating system and In this system usually you have on that and 1 where about kick files and not do all the things that you need to do little formatting drives petitioning used only at the end of the growing network whatever after that into a and then we can shift of chef would be sitting on the edge of machine and at this stage we want after that is share and united with status code of 0 if we just match the best machine provisions which means eating enough potentially take a production traffic so if you look into the network face is divided in 3 parts this a view to the face at the beginning where the machine doesn't have any natural configuration is to search for the concentration difficulties stuff like that might be the 48 written that must as and we also I said the location of the net with the laws we use both of these have been before and the 6 depending on the on the on the class that we're in we are in the basic now every a new precedent which would not it's single-spike B 6 holidays not before I thought this had its own program we watched conduct like for 2 years and now we basically have no problem at all with it we can bring up processing in the 6 environments the software is it's only on it you get your and the location of inedible problem then indeed the chief Nicaragua dialog with the internet the work program and static and the metal would problem itself will use TFTP to be and so developed subtree which used to be added dimension but but you and then then that would problem we delegates compression stimuli the hour-by-hour it is to be able to do it to be and you recently by recent book to other arms and you can download it on the and then this point again can happen over it should be it is to be noticed we just inside the will sort if to be because you want to use the same and then that would put with problem with I will just this is the general like to start logic endowed the memory load candidate knowing just so gifted although 30 years blast for the ball from 1981 but I'm from 1981 so far this of to use all flights the loads of our those me on and this
is a diagram showing the probable in higher so the client over UDP into port 69 we ask for a file this ever with uh will visit noted random and source support for the bike at being sent back to the client in this case the port is why in the picture there it's missing passengers and you request you get but the 1st chunk of data by default it's a very small block size of 512 bytes which is ridiculous and we're going to see about the problems of connected to that but this is delivered I'm using the a chunk of their values and back an acknowledgment with an integer students signifying the next and what you want and you know conversation happens in this it's a lockstep algorithm that you can't have next chunk and you acknowledge the previous 1 and basically the last spike at the sort of the end of the session is suspected indicated by and the size of the last block if this the last block is addressed and the block size and this is and in the session is over here if I I it is also the network and declined with recent abuse of knowledge to get there and the other by get back and there are a number of retries of which is the right solution would you up and you know when
I say that both in the in the for block sites these frequencies small and the is like this can cause problems for example if a somewhere like on the other side of the Pacific Ocean all of that I put it in North Korea but we don't know popping up in the degree of a project test but anyway it's a fairly popular that somewhere in a shack and then they can make in 2014 we used to begin having gifted is a imports so we needed to connect to the closest original that this and in this case or in your own if you have a big breeding with big fire like 80 megabytes of fertility and died which is 80 megabytes and you dialog that we did before the block sites with 150 millisecond latency yeah it would take it will allow us to the time I even if the double sites tool 14 hundred it would take you if I was 4 4 4 point 5 this is not the way is not the problem in the data center its efficacy of musical latency soluble was cases displayed on 1 minute with so but this is a great great problem on on the in the box on so this
was an important problem that of something that inverting and we had this is deployment structure and you can take the the diagram on the right and you can just call the base this diagram for every class we had so every class was contained pictures to be installation and we used to have physical hole in the heart of all of the answers they were exposing the applicative to be the for every several and it crosses and we just leaders in the you know the standardized analysis under the development selective to begin you find in in in units of distribution we have this active standby compression and and then our break we needed to single around saying gigabytes of stuff because we have many of the many care knows many syscall merely images and stuff like that so every time you add the blind 1 of these in a distance it's any device and keep it in sync then we have our own personal by the whole to with the provisions the middle and these are the nation needed to be aware of which of the 2 reasons as was active so that was a bit of a pain in any of those and things in the future can face so you know they the problems with these are physical advances waste of resources because we had 1 machine linguine in aggressive just doing nothing and for every cluster and we had this of what forces that when President doing nothing we would make it go away like a future fuel and tens of them papers that and there's something so it was a waste of resources and yet the other question easily aware which 1 was active so we wouldn't have any stats but then we tried to obtain the a holiday is to be demon log files but we found out that after 3 weeks and it was to stop it stopping that logging and you want to go into the sequel to to fix it and and as I said before 50 these very by the protocol in high latency environments the yeah and I said it before the way to walk to many moving parts and each 1 of them can fail so how we did we
solve these problems are solved
in general we like to use open source as much as safe as we can but sometimes doesn't work so we tried to you come up with our own solution sometimes we can't open source there so sometimes we do in in this case they decided to do it anything you can go he wrote a framework and tool and right so that basically it's a framework to be advantages to be set and it supports only our q so the 1st request as there is no right support if using 50 before writing to stop it done with the that and that it supports the main this to be specific actions of the main 1 and then also all other extensions like the negotiation of the block size negotiation of by Martin devise and honest and it is extensible that means you can in each and bought the framework alright if few glasses and you can define your own logic and you can also define some box that will be called by 7 to push your own statistics to your own infrastructure that monitoring infrastructure of directing the structure was based on seasonal review of how the framework works this guy and he sends a RQ Request and user base class beta code base over this class basically implemented the UDP except for for any new connection to do some passing of the connection and after that it will for into a new process and we basically just called get and which is the metadata records are based on the which is this object tool that deals with the session this with the crime the base and the itself will call a method called get response data which returns an object this object is a file like object solute it implements the Albany read sites just like a normal would nominal morphological do and the base and there we use this subject will fetch block of data from from the subject and this is with the client and implemented the protocol when decision is over we are called back and you provided in the that there will be executed which would give you stand counters but you can add your own Kunduz and make your own logic to bushels starts to your infrastructure and the server does the same the base of the same thing in the intervals that you can configure
so In the gift of may actually in the get github project is an example of that you can look at Windows symbols are over the simplest simplest everything right leg of a server that's repair and so this file from the from related to file system this is basically just the example you find in the github repo on so 1st thing you need to do so I use it as an before you deserve fire fire response that are 5 object what you do is you know can read gold and sorry goes and you get you can do you need to know it from this object and implemented in them and sides and causing these days it's a very simple objects just it it's just about prior and the final version but can be anything collecting about consideration 5 situated generated dynamically right you can just drive whatever you want here but the the face has to be a fire like objects so you do that then in then implement the study can be which is just basically just inheriting their based object calling the construction and then exposing the root directory and upon which he devised to begin response data and a method which returns that the object we declared in Busan there for the base ever you don't sentencing actually about that in the past after at the top you you all you have to do we have to declare an argument for the for the this statistics at all but if you basically the same for the static several you you know the survey called the constructor of explores enough initializes initialize the and the status quo but and then just alright get tended to return the object we declared to be a and
this is the main we have the top 2 functions your call box you get stats which is a dictionary of statistics and you can do whatever you want with it and use your internal libraries to Bush counters to you in this to your family the infrastructure and interview just initializes and then you just called there maintenance and that's it so how do we use
it in our sort in Facebook away going toward 3 years ago we decided to get rid of hybrid advances and we have our own softer alliances architecture which is based on the line of sight PVs just kind stuff but the control panel it's 5 so we have widened uh to control and I devious by enacting JBI so evident went with missing the you by them with some idea suffering so we got decided that get in of the height of the answers so we use a soft 1 so what they do with it is we have a progression of the gift if the distance of this in every and the server can respond to requests coming from any kind of what we do is we implement our own logic on top of the framework to stream the stuff from the course as it should be revisited so we need to synchronize and you might suffice anymore what we do is if something is is not only local cache reader and if we want to do is reflected in the the file study 5 from it should be what we don't wait for the 1st initially just outstanding bytes we don't wait for it to minimize celebrities to land on the disk and then we say that and so the reason we do and it should be and had requested tool to initiative ever to make to trip to get the timestamp of the 5 it's we just started streaming process again otherwise the use of it from the fire from the end we have solve what when request comes in Mary was stations where various stations if it matches a static 5 would do what they just said so distant from the closest aides variable if it's a dynamic request that confirmation 5 we make some bacon calls to orbit consistence to get the information we need to build the fire response objects which is dynamically generated we send their response but declined so all of the improvements here as I said no more physical advances Norway some source and machine can serve traffic from anywhere which starts finally with know finds a Dutch word in wouldn't if to be so that the time it didn't need any their state status of specific novel all of the convex spies foreground out of the when you are generated and in the subject files or streams and yeah of course you don't need to synchronize 70 people so that every time we deploy new server and because of this it's content friend we can just take the binary put it in a container and it will just enough run but I said that we
removed blood bonds is completely so how do we do we how do we rely our relative to the traffic subdued is the guided knowledge has been machines which I feel they need to connect to to find it is to be so and so but what we do is have a project called model which is actually it was reason do you find like an article on our blog about it and that and of is only was sent by the by them fast but did the goal of this project is to being every rats which in the freed from every comes from different locations on the street you know define latencies and I and what it produces ultimately it's is a a huge Jason mock trial which tells you the latencies between class the x and cross in the infrastructure so we have this huge is something that gets published every couple of minutes and navigation can subscribe to this chosen 5 so what this is this is a very which actually I talked about last year in a silicon and is our own implementation of the to isn't it true fetch the spare map combined it with the location from which the client is the writing and also mining and that we didn't have checks that we have internally to to know which give give to the service are are enabled SOA alive we by this information and we just decided we would just be the coarsest to be over to a given inclined so users much of our network to the and this helps a lot with sports right so now we what we do is we deploy is to be made if needed to be implementation in every single pop so we introduce it is to be latency because it it stays inside the same and location and we seeing the stuff from the from already directions are disappear we don't we don't have distinctive features ending back in 2004 to OK so
that's the end of my talk you can find virgin 13 get that you can install would beep and you know you have a session tomorrow at the tool 45 PM about how we use iron production during the 1st so if you want to talk to us just free free freedom over an hour take some questions and on were pushed higher at a much faster is its comparing to produce if people get injured again sort of have to the comparison all is not so it's not faster because that's the CFC production this is by the with with I did some benchmark unfortunately legal didn't want me to put their benchmarks on the slides but it is not as fast as the by it was quite well with our infrastructure so we can do we did like we do it OK and we want to think yet with a quarter we do must version desolate ECAF aggressively drainage we must provisioning discovered with tens of thousands of machines and you just can't cope with tens of thousands of machines yeah so to respond in question is not as part of the synchronization but it's not for us it's good for us do you want know the difference Kenneth Walker and some network college instead yeah yeah so but educational by them in there but we can you can absolutely work and like other emotional but we have uh will do rats which for all the other computer rats which is which is the only nodes of boxes with the ACT PAT either in them and they're on like a normal lives system so potentially you can have as the distributed lighting every actually which and just be able to that tracks so that you can you can if you can run an interpreter in your device and you can do it by the in all its pure by the treaties knowledge there is no dependence is going to be a the yeah so you don't have that problem you can just decide with violence and they did just uses sockets and then with the processing and and maybe a few days you need to do what we do at this training staff you need to to be very but you can use the embedded in on the library in the in the in depth of things is default Biden distribution case was we take the union of many of the technical problems that was take of order in the desert conference hunting curiosity overcoming harmonization thinking well
Zentrische Streckung
Facebook
Ortsoperator
Open Source
Datentyp
Interaktives Fernsehen
Projektive Ebene
Hybridrechner
Biprodukt
Softwareentwickler
Fokalpunkt
Computeranimation
Facebook
Web Site
Gewichtete Summe
Hecke-Operator
Selbst organisierendes System
Hausdorff-Dimension
Klasse <Mathematik>
Datenmanagement
Dienst <Informatik>
Computer
Computerunterstütztes Verfahren
Hauptplatine
Inzidenzalgebra
Skalarfeld
Whiteboard
Computeranimation
Datenverarbeitungssystem
Prozess <Informatik>
Software
Datentyp
Speicherabzug
Notepad-Computer
Speicher <Informatik>
Hybridrechner
Meta-Tag
Analysis
Soundverarbeitung
Nichtlinearer Operator
Zentrische Streckung
Zehn
Open Source
Kanalkapazität
Systemaufruf
Betriebssystem
Schwach besetzte Matrix
Biprodukt
Ordnungsreduktion
Sinusfunktion
Dienst <Informatik>
Verbandstheorie
Offene Menge
Hypermedia
Mereologie
Strategisches Spiel
Server
Speicherabzug
Programmierumgebung
Addition
Prozess <Physik>
Punkt
Quader
Punkt
URL
Physikalisches System
Computeranimation
Lesen <Datenverarbeitung>
Resultante
Subtraktion
Server
Versionsverwaltung
Zahlenbereich
Computeranimation
Internetworking
Virtuelle Maschine
Metropolitan area network
Service provider
Variable
Software
Datennetz
Maschinensprache
Arbeitsplatzcomputer
Datentyp
Zusammenhängender Graph
Booten
Hybridrechner
Gerade
Implementierung
Umwandlungsenthalpie
Zehn
Programmierumgebung
Dynamic Host Configuration Protocol
Offene Menge
Programmierumgebung
Personal Area Network
Offene Menge
Server
Umsetzung <Informatik>
Prozess <Physik>
Gewicht <Mathematik>
Punkt
Gemeinsamer Speicher
Klasse <Mathematik>
t-Test
Programm
Zahlenbereich
Gesetz <Physik>
Mathematische Logik
Code
Computeranimation
Internetworking
Netzwerktopologie
Hydrostatik
Virtuelle Maschine
Client
Algorithmus
Software
Default
Konfigurationsraum
Quellencodierung
Virtuelle Adresse
Leistung <Physik>
Elektronische Publikation
Sichtenkonzept
Open Source
p-Block
Physikalisches System
Elektronische Publikation
Biprodukt
Quick-Sort
Endlicher Graph
Konzentrizität
Filetransferprotokoll
Diagramm
Ganze Zahl
Last
Festspeicher
Mereologie
Client
Leistung <Physik>
Dateiformat
URL
Programmierumgebung
Distributionstheorie
Server
Web Site
Bit
Punkt
Quader
Klasse <Mathematik>
Physikalismus
Fortsetzung <Mathematik>
Kartesische Koordinaten
Synchronisierung
Computeranimation
RFID
Rechenzentrum
Virtuelle Maschine
Einheit <Mathematik>
Gruppe <Mathematik>
Kontrollstruktur
Delisches Problem
Abstand
Datenstruktur
Softwareentwickler
Quellencodierung
Bildgebendes Verfahren
Analysis
Softwaretest
Protokoll <Datenverarbeitungssystem>
Zehn
Datenlogger
Physikalischer Effekt
Systemaufruf
Statistische Analyse
Programmierumgebung
p-Block
Knoten <Statik>
Filetransferprotokoll
Diagramm
Minimalgrad
Forcing
Rechter Winkel
Mereologie
Projektive Ebene
Dämon <Informatik>
Programmierumgebung
Server
Web Site
Konfiguration <Informatik>
Prozess <Physik>
Quader
Gruppenoperation
Klasse <Mathematik>
Mathematische Logik
Framework <Informatik>
Code
Computeranimation
Metadaten
Datensatz
Client
Endlicher Graph
Wärmeübergang
Endogene Variable
Vererbungshierarchie
Gruppoid
Datenstruktur
Maßerweiterung
Einfach zusammenhängender Raum
Statistik
Protokoll <Datenverarbeitungssystem>
Betafunktion
Open Source
Gasströmung
Ausnahmebehandlung
p-Block
Elektronische Publikation
Endogene Variable
Endlicher Graph
Entscheidungstheorie
Objekt <Kategorie>
Filetransferprotokoll
Rechter Winkel
Client
Server
p-Block
Message-Passing
Server
Quader
Versionsverwaltung
Familie <Mathematik>
Ikosaeder
Data Envelopment Analysis
Sondierung
Computeranimation
Metropolitan area network
Font
Endlicher Graph
Wärmeübergang
Endogene Variable
Bildschirmfenster
Statistische Analyse
Programmbibliothek
Dateiverwaltung
Wurzel <Mathematik>
Gammafunktion
Peer-to-Peer-Netz
Beobachtungsstudie
Parametersystem
Konstruktor <Informatik>
Lineares Funktional
Statistik
Elektronische Publikation
Systemaufruf
Statistische Analyse
Symboltabelle
Objektklasse
Elektronische Publikation
Data Dictionary
Objekt <Kategorie>
Softwarewartung
Rechter Winkel
Server
Projektive Ebene
Reelle Zahl
Mini-Disc
Repository <Informatik>
Verzeichnisdienst
Offene Menge
Prozess <Physik>
Web log
Konvexer Körper
Schreiben <Datenverarbeitung>
Aggregatzustand
Binärcode
Computeranimation
Richtung
Metropolitan area network
Streaming <Kommunikationstechnik>
Client
Zeitstempel
Umwandlungsenthalpie
Caching
Stellenring
Filetransferprotokoll
Dienst <Informatik>
Client
Server
Projektive Ebene
Information
URL
Aggregatzustand
Magnetbandlaufwerk
Facebook
Server
Physikalismus
Klasse <Mathematik>
Implementierung
Dienst <Informatik>
Mathematische Logik
Framework <Informatik>
Virtuelle Maschine
Variable
Informationsmodellierung
Arithmetische Folge
Software
Mini-Disc
Front-End <Software>
Endogene Variable
Arbeitsplatzcomputer
Abstand
Widerspruchsfreiheit
Beobachtungsstudie
Elektronische Publikation
Diskretes System
Open Source
Orbit <Mathematik>
Elektronische Publikation
Quick-Sort
Objekt <Kategorie>
Mapping <Computergraphik>
Portscanner
Dynamic Host Configuration Protocol
Caching
Wort <Informatik>
Computerarchitektur
Distributionstheorie
Harmonische Analyse
Subtraktion
Wellenpaket
Quader
Stab
Versionsverwaltung
Computer
Socket-Schnittstelle
Synchronisierung
Computeranimation
Virtuelle Maschine
Knotenmenge
Software
Programmbibliothek
Default
Benchmark
Interpretierer
Zehn
Paarvergleich
Physikalisches System
Biprodukt
Quick-Sort
Rechenschieber
BEEP
Mereologie
Normalvektor
Ordnung <Mathematik>

Metadaten

Formale Metadaten

Titel FBTFTP: Facebook's open source python3 framework for dynamic TFTP servers.
Serientitel EuroPython 2016
Teil 105
Anzahl der Teile 169
Autor Failla, Angelo
Lizenz CC-Namensnennung - keine kommerzielle Nutzung - Weitergabe unter gleichen Bedingungen 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen und nicht-kommerziellen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen und das Werk bzw. diesen Inhalt auch in veränderter Form nur unter den Bedingungen dieser Lizenz weitergeben
DOI 10.5446/21102
Herausgeber EuroPython
Erscheinungsjahr 2016
Sprache Englisch

Technische Metadaten

Dauer 27:55

Inhaltliche Metadaten

Fachgebiet Informatik
Abstract FBTFTP: facebook's opensource framework for creating dynamic TFTP servers in Python3. ----- TFTP was first standardized in '81 (same year I was born!) and one of its primary uses is in the early stage of network booting. TFTP is very simple to implement, and one of the reasons it is still in use is that its small footprint allows engineers to fit the code into very low resource, single board computers, system-on-a-chip implementations and mainboard chipsets, in the case of modern hardware. It is therefore a crucial protocol deployed in almost every data center environment. It is used, together with DHCP, to chain load Network Boot Programs (NBPs), like Grub2 and iPXE. They allow machines to bootstrap themselves and install operating systems off of the network, downloading kernels and initrds via HTTP and starting them up. At Facebook, we have been using the standard in.tftpd daemon for years, however, we started to reach its limitations. Limitations that were partially due to our scale and the way TFTP was deployed in our infrastructure, but also to the protocol specifications based on requirements from the 80's. To address those limitations we ended up writing our own framework for creating dynamic TFTP servers in Python3, and we decided to open source it. I will take you thru the framework and the features it offers. I'll discuss the specific problems that motivated us to create it. We will look at practical examples of how touse it, along with a little code, to build your own server that are tailored to your own infra needs.

Ähnliche Filme

Loading...