4. ACI Contracts, Subjects
and Filters generated
by Application Dependency
Mapping (ADM)
using Cisco Tetration
Workflow is defined by
playbooks and requirement
files: include Ansible
roles to define network
configuration
Credentials,
Playbooks,
Roles,
and variables
stored in version control
Version
Control
GitHub
Workflow
Ansible
Playbooks
Source of Truth
YAML
NoSQL
IPAM
Analytics
Cisco
Tetration
END-USER
ACI
Business
Outcome
One Source of Truth for
Configuration Data:
MongoDB
Infoblox
YAML and CSV files
programmatically consumable
7. Modular framework
Roles, units of work, are included into Ansible PlayBooks
Configuration library
Data Model, sources and sinks of data within the system
Integrating units of work
Roles and the Data Model are combined in a
deployment to create the desired business outcome
Booth #1601
Editor's Notes
The intellectual property of the F5 | IT automation pod is the application of structured design and analysis concepts to create and automate a desired configuration state in the IT infrastructure to address a business requirement. The knowledge and experience of creating the architecture, and combining analysis, design, workflow and programming techniques is a skills gap many IT organizations lack.
https://en.wikipedia.org/wiki/Structured_analysis
1101111010101101 = DEADBEEF