SlideShare a Scribd company logo
Lessons learned from global telecom operators’ cloud
journeys
Zeev Likwornik
Head of Amdocs Cloud Center of Excellence
Amdocs Technology & New Offerings
Cloud@Amdocs.com
OpenStack Day Israel 2017
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs2
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs2
Key Cloud
challenges for telcos
Organization
 Selecting the right stack
 Complexity of ecosystemRoadmap
 Re-architect applications to cloudApplications
 Skills Scarcity
 Organizational changes
Operability
 Managing hybrid environments
(private/public/hybrid)
 Bi-modal operations (legacy and
new applications)
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs3
CSPs are moving to Cloud mainly to increase agility
3
Business agility driving innovation
Enable continuous cost
efficiencies try and err
INNOVATION
Fail fast
Speed new updates, upgrades, products and
services to market through faster code-to-
production cycles and seamless continuous
releases
AGILITY
Faster Time to Market/TTR
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs4
CSP’s Cloud agility is driven mainly by DevOps
Top Challenges to DevOps adoption
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs5
Telecom operators cloud maturity model
Bare metal1Infrastructure
Virtual machines2
Hybrid cloud4
Multi cloud5
Private & Public Clouds3
Applications Physical1
Virtualized2
Cloud-enabled3
Cloud native4
Cloud
next gen
5
1
2
3
4
5
Agile &
automation
Siloed teams
Continuous
integration
Continuous delivery
/ DevOps
NoOps
People & Processes
Value gained
Operational
Enablers
Technology
Enablers
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs6
Source: Matt Beal – Director, Innovation & Architecture May 2017
Light Reading Live Event
Vodafone’s phased approach to Cloud
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs7
By 2020, the majority of CSPs’ workloads will be on cloud
Cloud adoption by telcos is well underway
Physical Virtualized Public Cloud
10% 20% 10%
On-Premise 70%
Hybrid Cloud
EMEA&CALAAPAC
Physical Virtualized Public CloudPrivate Cloud
10% 25% 25% 10% 10%
On-Premise 60% Off-Premise 40%
Hybrid Cloud
NAM
5% 25% 30%
Physical Virtualized Private Cloud Public Cloud
On-Premise 60% Off-Premise
Hybrid Cloud
20%
20%
SaaS
20%
SaaS
10%
SaaSPrivate Cloud
40%
Off-Premise 30%
10%
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs8
Cloud Center of Excellence
Vendors Trusted design customers
Jointly plan roadmap, timelines and needed investment
Significantly minimize risks and reduce costs associated with embracing new
and emerging cloud technologies
Influence leading vendors and market roadmaps
Offer comprehensive, certified solutions to our customers
Selected examples:
Define cloud strategy & roadmap Support customersGrow knowledge in the organization
OpenStack and containers
in the telco domain
Real world challenges for ISVs
Tal Barenboim
Technology Evangelist
June 2017
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs10
Quick refresh
Amdocs sells BSS/OSS/Network mission-critical
software for Telcos/CSPs
SLA and support is critical for our customers
Telcos build their own internal private clouds
Amdocs software is a GUEST in a Telco on-premise
internal cloud
Amdocs software must adhere to the Telco’s own
internal cloud and policies
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs11
OpenStack is KVM…
CSPs use multiple OpenStack distributions
Multiple CSPs use multiple KVM releases from different
Linux vendors
Your app is running in as Guest VM in KVM
KVM from Linux distro vendor A is not the same KVM
from Linux distro Vendor B (kernel)
Guest OS (VM) support under multiple versions of KVM
is MAJOR PROBLEM
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs12
KVM support – unsustainable model in production
 Linux vendors REALLY supports only their KVM implementation
 A Linux Guest VM from vendor A running on KVM from Linux Distribution of vendor B is not really
supported
 Linux Vendors do not certify each other KVM – Linux Distro Vendor Lock
 SLA provided by Linux Vendors are unsustainable for production use
Hardware
RHEL’s KVM
My App VM
RHEL
Supported!
Hardware
Ubuntu KVM
My App VM
RHEL
Not supported!
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs13
OpenStack Networking: Not that simple
 CSPs have their own networking requirements and policies around OpenStack
 OVS (Open vSwitch) may not be used by some CSPs at all!
 You tested on OVS, but the customer does not use OVS – your app may be impacted
 Your app depends on specific networking capabilities and performance baselines, not possible with OVS.
Yet the customer is not moving from OVS.
Align your networking requirements
and expectations with the customer
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs14
Containers: Oh the hype….
 Containerization is built-in capability of the Linux kernel (cgroups, lxc, namespaces,etc)
 Hence containers are Linux (capability)
 Containers promise portability - they potentially can run on any Linux where there is a compatible
container engine (docker,rkt)
 However, some Linux vendors embrace the “Containers are Linux” stance, but only THEIR Linux, breaking
the entire portability of containers
 Distributing containerized software for an ISV is a serious challenge
 Networking containers may not be as straightforward as you might think
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs15
Containers portability: Or lack of…
RHEL 7 Base Image
Containerized App
Container
RHEL 7 HOST OS (kernel)
Docker Engine
RHEL 7 Base Image
Container
Ubuntu Linux HOST OS (kernel)
Docker Engine
Supported!
Base Image
and Host OS
match!
Not Supported
Containerized App
Red Hat Linux VM or Physical Host Ubuntu Linux VM or Physical Host
Base image user space libraries are compiled with each vendor’s specific Linux Kernel release, and
key libraries such as glibc.
Linux Distribution vendors support only their user space libraries run on THEIR Linux HOST OS
kernel. NO SLA guaranteed otherwise
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs16
Distributing containerized software: Hold on!
 Containers is packaged software. It’s a packaging format.
 We package the base image, our 3rd parties dependencies + our app
 Distributing our software in this way is way cool, yet highly problematic:
 Are you using commercial software in your container? - you need OEM/Embedded licensing agreement to
distribute your software in a container.
 Does your app depends on 3rd party GPL libraries and components? – distributing your software which
linked to GPL libraries and packaging those GPL libraries with your software has significant LEGAL impact
on your software code
 Using Oracle JDK/JRE for your containerized app ? That’s commercial software!
 Are you building your own containers or using ready made containers from docker hub and other
registries? Think security!
 Security updates to the base image mandate you will rebuild your containers and re-provision it. Does your
software support this?
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs17
Container’s networking: endless options
 Containers ecosystem support pluggable SDN fabrics for container to container networking
 Commercial container management platforms (CMP/CaaS) may already have built in SDN fabrics that may
not meet your networking requirements at the capability and performance levels
 When not using CMP/CaaS - You are required to pick the SDN fabric for your containers – which one to
use?
 The SDN fabric you picked and tested in-house – may not be the one the customer is using. This can
seriously impact your app.
 Some SDN fabrics for containers do not support Jumbo Frames, IP Multicast, and some have serious
impact on your host CPU/MEM resources
Align your networking requirements
and expectations with the customer
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs18
Summary
 Linux, OpenStack distributions and containers are a business!
 OpenStack and Linux distribution vendors protect their business, prohibiting supportable interoperability,
yet focus on vendor locking the customer though the support channel
 Testing and certifying your app on multiple KVM and Linux distros releases is required
 Your virtualized app running in KVM, networking behavior and performance depends on whatever virtual
switch the customer is using, not what you tested in-house.
 Containers are cool, yet the hype is so big as Linux vendors lock you to their distribution if you require
support. No true portability possible.
 Containers are a packaging format. Pay attention to what you package and the legal aspects.
 Containers can be a security and IT nightmare to maintain, if there is no one that maintains this inside your
company.
 Containers SDN networking differ in capability and performance. Choose wisely. Test and align with your
customer.
Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs19 Information Security Level 2 – Sensitive
© 2017 – Proprietary & Confidential Information of Amdocs19
Questions?
cloud@amdocs.com
Thank you
Cloud@amdocs.com

More Related Content

What's hot

[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...
[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...
[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...
OpenStack Korea Community
 
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh BoddapatiPolicy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
buildacloud
 

What's hot (20)

OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFVOpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
OpenStack and OpenDaylight: An Integrated IaaS for SDN/NFV
 
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
Rightscale Webinar: Designing Private & Hybrid Clouds (Hosted by Citrix)
 
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
[OpenStack Days Korea 2016] An SDN Pioneer's Vision of Networking
 
Getting started with OpenStack
Getting started with OpenStackGetting started with OpenStack
Getting started with OpenStack
 
[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...
[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...
[2015-05월 세미나] Network Bottlenecks Mutiply with NFV Don't Forget Performance ...
 
Container Networking - State of the Ecosystem [ContainerConf, Mannheim, Nov 2...
Container Networking - State of the Ecosystem [ContainerConf, Mannheim, Nov 2...Container Networking - State of the Ecosystem [ContainerConf, Mannheim, Nov 2...
Container Networking - State of the Ecosystem [ContainerConf, Mannheim, Nov 2...
 
OpenStack & OpenContrail in Production
OpenStack & OpenContrail in ProductionOpenStack & OpenContrail in Production
OpenStack & OpenContrail in Production
 
Openstack and Reddwarf Overview
Openstack and Reddwarf OverviewOpenstack and Reddwarf Overview
Openstack and Reddwarf Overview
 
SDN Scale-out Testing at OpenStack Innovation Center (OSIC)
SDN Scale-out Testing at OpenStack Innovation Center (OSIC)SDN Scale-out Testing at OpenStack Innovation Center (OSIC)
SDN Scale-out Testing at OpenStack Innovation Center (OSIC)
 
[OpenStack Days Korea 2016] Track1 - Red Hat enterprise Linux OpenStack Platform
[OpenStack Days Korea 2016] Track1 - Red Hat enterprise Linux OpenStack Platform[OpenStack Days Korea 2016] Track1 - Red Hat enterprise Linux OpenStack Platform
[OpenStack Days Korea 2016] Track1 - Red Hat enterprise Linux OpenStack Platform
 
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
[OpenStack Day in Korea 2015] Track 2-3 - 오픈스택 클라우드에 최적화된 네트워크 가상화 '누아지(Nuage)'
 
Open Stack Days israel Keynote 2017
Open Stack Days israel Keynote 2017Open Stack Days israel Keynote 2017
Open Stack Days israel Keynote 2017
 
OpenStack Architecture and Use Cases
OpenStack Architecture and Use CasesOpenStack Architecture and Use Cases
OpenStack Architecture and Use Cases
 
Container security within Cisco Container Platform
Container security within Cisco Container PlatformContainer security within Cisco Container Platform
Container security within Cisco Container Platform
 
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...
Triangle Kubernetes Meetup: Container cloud networking - Contiv for K8S & Ope...
 
Networking For Nested Containers: Magnum, Kuryr, Neutron Integration
Networking For Nested Containers: Magnum, Kuryr, Neutron IntegrationNetworking For Nested Containers: Magnum, Kuryr, Neutron Integration
Networking For Nested Containers: Magnum, Kuryr, Neutron Integration
 
OpenStack As A Strategy For Future Growth at Cisco
OpenStack As A Strategy For Future Growth at CiscoOpenStack As A Strategy For Future Growth at Cisco
OpenStack As A Strategy For Future Growth at Cisco
 
How we built Packet's bare metal cloud platform
How we built Packet's bare metal cloud platformHow we built Packet's bare metal cloud platform
How we built Packet's bare metal cloud platform
 
OpenStack Israel Meetup - Project Kuryr: Bringing Container Networking to Neu...
OpenStack Israel Meetup - Project Kuryr: Bringing Container Networking to Neu...OpenStack Israel Meetup - Project Kuryr: Bringing Container Networking to Neu...
OpenStack Israel Meetup - Project Kuryr: Bringing Container Networking to Neu...
 
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh BoddapatiPolicy Based SDN Solution for DC and Branch Office by Suresh Boddapati
Policy Based SDN Solution for DC and Branch Office by Suresh Boddapati
 

Similar to Lessons learned from global telecom operators' cloud journeys - Zeev Likwornik, Tal Barenboim - OpenStack Israel 2017

The missing piece : when Docker networking and services finally unleashes so...
 The missing piece : when Docker networking and services finally unleashes so... The missing piece : when Docker networking and services finally unleashes so...
The missing piece : when Docker networking and services finally unleashes so...
Adrien Blind
 

Similar to Lessons learned from global telecom operators' cloud journeys - Zeev Likwornik, Tal Barenboim - OpenStack Israel 2017 (20)

Confidential Computing overview
Confidential Computing overviewConfidential Computing overview
Confidential Computing overview
 
Why and how are containers the foundation for a hybrid cloud future
Why and how are containers the foundation for a hybrid cloud futureWhy and how are containers the foundation for a hybrid cloud future
Why and how are containers the foundation for a hybrid cloud future
 
Microservices and containers networking: Contiv, an industry leading open sou...
Microservices and containers networking: Contiv, an industry leading open sou...Microservices and containers networking: Contiv, an industry leading open sou...
Microservices and containers networking: Contiv, an industry leading open sou...
 
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
 
Working with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data ArchitecturesWorking with Hybrid Clouds and Data Architectures
Working with Hybrid Clouds and Data Architectures
 
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlowCloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow
Cloud Expo New York: OpenFlow Is SDN Yet SDN Is Not Only OpenFlow
 
Accelerate Digital Transformation with IBM Cloud Private
Accelerate Digital Transformation with IBM Cloud PrivateAccelerate Digital Transformation with IBM Cloud Private
Accelerate Digital Transformation with IBM Cloud Private
 
Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016Andy Kennedy - Scottish VMUG April 2016
Andy Kennedy - Scottish VMUG April 2016
 
Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014Docker meetup talk - chicago March 2014
Docker meetup talk - chicago March 2014
 
Forging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for EnterprisesForging a Secure Path to Private 5G Networks for Enterprises
Forging a Secure Path to Private 5G Networks for Enterprises
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
DockerCon - The missing piece : when Docker networking unleashes software arc...
DockerCon - The missing piece : when Docker networking unleashes software arc...DockerCon - The missing piece : when Docker networking unleashes software arc...
DockerCon - The missing piece : when Docker networking unleashes software arc...
 
The missing piece : when Docker networking and services finally unleashes so...
 The missing piece : when Docker networking and services finally unleashes so... The missing piece : when Docker networking and services finally unleashes so...
The missing piece : when Docker networking and services finally unleashes so...
 
Dattatray Resume
Dattatray ResumeDattatray Resume
Dattatray Resume
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
AWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWSAWS live hack: Docker + Snyk Container on AWS
AWS live hack: Docker + Snyk Container on AWS
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 

More from Cloud Native Day Tel Aviv

More from Cloud Native Day Tel Aviv (20)

Cloud Native is a Cultural Decision. By Reshef Mann
Cloud Native is a Cultural Decision. By Reshef MannCloud Native is a Cultural Decision. By Reshef Mann
Cloud Native is a Cultural Decision. By Reshef Mann
 
Container Runtime Security with Falco, by Néstor Salceda
Container Runtime Security with Falco, by Néstor SalcedaContainer Runtime Security with Falco, by Néstor Salceda
Container Runtime Security with Falco, by Néstor Salceda
 
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...
Kafka Mirror Tester: Go and Kubernetes Powered Test Suite for Kafka Replicati...
 
Running I/O intensive workloads on Kubernetes, by Nati Shalom
Running I/O intensive workloads on Kubernetes, by Nati ShalomRunning I/O intensive workloads on Kubernetes, by Nati Shalom
Running I/O intensive workloads on Kubernetes, by Nati Shalom
 
WTF Do We Need a Service Mesh? By Anton Weiss.
WTF Do We Need a Service Mesh? By Anton Weiss.WTF Do We Need a Service Mesh? By Anton Weiss.
WTF Do We Need a Service Mesh? By Anton Weiss.
 
Update Strategies for the Edge, by Kat Cosgrove
Update Strategies for the Edge, by Kat CosgroveUpdate Strategies for the Edge, by Kat Cosgrove
Update Strategies for the Edge, by Kat Cosgrove
 
Building a Cloud-Native SaaS Product The Hard Way. By Arthur Berezin
Building a Cloud-Native SaaS Product The Hard Way. By Arthur BerezinBuilding a Cloud-Native SaaS Product The Hard Way. By Arthur Berezin
Building a Cloud-Native SaaS Product The Hard Way. By Arthur Berezin
 
The Four Questions (Every Monitoring Engineer gets asked), by Leon Adato
The Four Questions (Every Monitoring Engineer gets asked), by Leon AdatoThe Four Questions (Every Monitoring Engineer gets asked), by Leon Adato
The Four Questions (Every Monitoring Engineer gets asked), by Leon Adato
 
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.K8s Pod Scheduling - Deep Dive. By Tsahi Duek.
K8s Pod Scheduling - Deep Dive. By Tsahi Duek.
 
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-Shalom
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-ShalomCloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-Shalom
Cloud Native: The Cattle, the Pets, and the Germs, by Avishai Ish-Shalom
 
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.
MySQL Shell: the daily tool for devs and admins. By Vittorio Cioe.
 
Cloud native transformation patterns, by Pini Reznik
Cloud native transformation patterns, by Pini ReznikCloud native transformation patterns, by Pini Reznik
Cloud native transformation patterns, by Pini Reznik
 
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
Cloud and Edge: price, performance and privacy considerations in IOT, by Tsvi...
 
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...
Two Years, Zero servers: Lessons learned from running a startup 100% on Serve...
 
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...
12 Factor Serverless Applications - Mike Morain, AWS - Cloud Native Day Tel A...
 
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...
Not my problem! Delegating responsibilities to the infrastructure - Yshay Yaa...
 
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
Brain in the Cloud: Machine Learning on OpenStack & Kubernetes Done Right - E...
 
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...
A stateful application walks into a Kubernetes bar - Arthur Berezin, JovianX ...
 
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...
The story of how KubeMQ was born - Oz Golan, KubeMQ - Cloud Native Day Tel Av...
 
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018
I want it all: go hybrid - Orit Yaron, Outbrain - Cloud Native Day Tel Aviv 2018
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 

Lessons learned from global telecom operators' cloud journeys - Zeev Likwornik, Tal Barenboim - OpenStack Israel 2017

  • 1. Lessons learned from global telecom operators’ cloud journeys Zeev Likwornik Head of Amdocs Cloud Center of Excellence Amdocs Technology & New Offerings Cloud@Amdocs.com OpenStack Day Israel 2017
  • 2. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs2 Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs2 Key Cloud challenges for telcos Organization  Selecting the right stack  Complexity of ecosystemRoadmap  Re-architect applications to cloudApplications  Skills Scarcity  Organizational changes Operability  Managing hybrid environments (private/public/hybrid)  Bi-modal operations (legacy and new applications)
  • 3. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs3 CSPs are moving to Cloud mainly to increase agility 3 Business agility driving innovation Enable continuous cost efficiencies try and err INNOVATION Fail fast Speed new updates, upgrades, products and services to market through faster code-to- production cycles and seamless continuous releases AGILITY Faster Time to Market/TTR
  • 4. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs4 CSP’s Cloud agility is driven mainly by DevOps Top Challenges to DevOps adoption
  • 5. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs5 Telecom operators cloud maturity model Bare metal1Infrastructure Virtual machines2 Hybrid cloud4 Multi cloud5 Private & Public Clouds3 Applications Physical1 Virtualized2 Cloud-enabled3 Cloud native4 Cloud next gen 5 1 2 3 4 5 Agile & automation Siloed teams Continuous integration Continuous delivery / DevOps NoOps People & Processes Value gained Operational Enablers Technology Enablers
  • 6. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs6 Source: Matt Beal – Director, Innovation & Architecture May 2017 Light Reading Live Event Vodafone’s phased approach to Cloud
  • 7. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs7 By 2020, the majority of CSPs’ workloads will be on cloud Cloud adoption by telcos is well underway Physical Virtualized Public Cloud 10% 20% 10% On-Premise 70% Hybrid Cloud EMEA&CALAAPAC Physical Virtualized Public CloudPrivate Cloud 10% 25% 25% 10% 10% On-Premise 60% Off-Premise 40% Hybrid Cloud NAM 5% 25% 30% Physical Virtualized Private Cloud Public Cloud On-Premise 60% Off-Premise Hybrid Cloud 20% 20% SaaS 20% SaaS 10% SaaSPrivate Cloud 40% Off-Premise 30% 10%
  • 8. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs8 Cloud Center of Excellence Vendors Trusted design customers Jointly plan roadmap, timelines and needed investment Significantly minimize risks and reduce costs associated with embracing new and emerging cloud technologies Influence leading vendors and market roadmaps Offer comprehensive, certified solutions to our customers Selected examples: Define cloud strategy & roadmap Support customersGrow knowledge in the organization
  • 9. OpenStack and containers in the telco domain Real world challenges for ISVs Tal Barenboim Technology Evangelist June 2017
  • 10. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs10 Quick refresh Amdocs sells BSS/OSS/Network mission-critical software for Telcos/CSPs SLA and support is critical for our customers Telcos build their own internal private clouds Amdocs software is a GUEST in a Telco on-premise internal cloud Amdocs software must adhere to the Telco’s own internal cloud and policies
  • 11. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs11 OpenStack is KVM… CSPs use multiple OpenStack distributions Multiple CSPs use multiple KVM releases from different Linux vendors Your app is running in as Guest VM in KVM KVM from Linux distro vendor A is not the same KVM from Linux distro Vendor B (kernel) Guest OS (VM) support under multiple versions of KVM is MAJOR PROBLEM
  • 12. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs12 KVM support – unsustainable model in production  Linux vendors REALLY supports only their KVM implementation  A Linux Guest VM from vendor A running on KVM from Linux Distribution of vendor B is not really supported  Linux Vendors do not certify each other KVM – Linux Distro Vendor Lock  SLA provided by Linux Vendors are unsustainable for production use Hardware RHEL’s KVM My App VM RHEL Supported! Hardware Ubuntu KVM My App VM RHEL Not supported!
  • 13. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs13 OpenStack Networking: Not that simple  CSPs have their own networking requirements and policies around OpenStack  OVS (Open vSwitch) may not be used by some CSPs at all!  You tested on OVS, but the customer does not use OVS – your app may be impacted  Your app depends on specific networking capabilities and performance baselines, not possible with OVS. Yet the customer is not moving from OVS. Align your networking requirements and expectations with the customer
  • 14. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs14 Containers: Oh the hype….  Containerization is built-in capability of the Linux kernel (cgroups, lxc, namespaces,etc)  Hence containers are Linux (capability)  Containers promise portability - they potentially can run on any Linux where there is a compatible container engine (docker,rkt)  However, some Linux vendors embrace the “Containers are Linux” stance, but only THEIR Linux, breaking the entire portability of containers  Distributing containerized software for an ISV is a serious challenge  Networking containers may not be as straightforward as you might think
  • 15. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs15 Containers portability: Or lack of… RHEL 7 Base Image Containerized App Container RHEL 7 HOST OS (kernel) Docker Engine RHEL 7 Base Image Container Ubuntu Linux HOST OS (kernel) Docker Engine Supported! Base Image and Host OS match! Not Supported Containerized App Red Hat Linux VM or Physical Host Ubuntu Linux VM or Physical Host Base image user space libraries are compiled with each vendor’s specific Linux Kernel release, and key libraries such as glibc. Linux Distribution vendors support only their user space libraries run on THEIR Linux HOST OS kernel. NO SLA guaranteed otherwise
  • 16. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs16 Distributing containerized software: Hold on!  Containers is packaged software. It’s a packaging format.  We package the base image, our 3rd parties dependencies + our app  Distributing our software in this way is way cool, yet highly problematic:  Are you using commercial software in your container? - you need OEM/Embedded licensing agreement to distribute your software in a container.  Does your app depends on 3rd party GPL libraries and components? – distributing your software which linked to GPL libraries and packaging those GPL libraries with your software has significant LEGAL impact on your software code  Using Oracle JDK/JRE for your containerized app ? That’s commercial software!  Are you building your own containers or using ready made containers from docker hub and other registries? Think security!  Security updates to the base image mandate you will rebuild your containers and re-provision it. Does your software support this?
  • 17. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs17 Container’s networking: endless options  Containers ecosystem support pluggable SDN fabrics for container to container networking  Commercial container management platforms (CMP/CaaS) may already have built in SDN fabrics that may not meet your networking requirements at the capability and performance levels  When not using CMP/CaaS - You are required to pick the SDN fabric for your containers – which one to use?  The SDN fabric you picked and tested in-house – may not be the one the customer is using. This can seriously impact your app.  Some SDN fabrics for containers do not support Jumbo Frames, IP Multicast, and some have serious impact on your host CPU/MEM resources Align your networking requirements and expectations with the customer
  • 18. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs18 Summary  Linux, OpenStack distributions and containers are a business!  OpenStack and Linux distribution vendors protect their business, prohibiting supportable interoperability, yet focus on vendor locking the customer though the support channel  Testing and certifying your app on multiple KVM and Linux distros releases is required  Your virtualized app running in KVM, networking behavior and performance depends on whatever virtual switch the customer is using, not what you tested in-house.  Containers are cool, yet the hype is so big as Linux vendors lock you to their distribution if you require support. No true portability possible.  Containers are a packaging format. Pay attention to what you package and the legal aspects.  Containers can be a security and IT nightmare to maintain, if there is no one that maintains this inside your company.  Containers SDN networking differ in capability and performance. Choose wisely. Test and align with your customer.
  • 19. Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs19 Information Security Level 2 – Sensitive © 2017 – Proprietary & Confidential Information of Amdocs19 Questions? cloud@amdocs.com

Editor's Notes

  1. Professional services to develop microservices (architects & developers) Provide Telco Grade operational envelop to support the various tooling and platforms
  2. Agility enables Fail fast culture and innovation
  3. Amdocs Cloud Center of Excellence has define a Cloud maturity model uniquely designed for CSPs The model enables CSPs to assess what stage of maturity they are at are in terms of evolving their infrastructure to the cloud, evolving their applications to the cloud and adopting DevOps approach, as well as plan where they want to move and what steps they need to take
  4. “large majority of CSPs are planning their BSS/OSS to reside on the private cloud.”
  5. “large majority of CSPs are planning their BSS/OSS to reside on the private cloud.”
  6. Amdocs has significantly changed its past approach when it often developed proprietary tools, and is now leveraging open source across the portfolio in a massive way - here a few selected examples. Our knowledge accum over the last 3 years Our accumulated view on adoption, challenges Cd part – vendor to CSP on-premise is most battled place We are working with vendors to solve these problems
  7. Explain shortly what is the base image and app dependency.