This workshop is meant to be an introduction to the systematic review process. Further information about systematic reviews was available through a research guide. http://libguides.ucalgary.ca/content.php?pid=593664
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...Twilio Inc
Designing a massively scalable highly available persistence layer has been one of the great challenges we’ve faced building out Twilio’s cloud communications infrastructure. Robust Voice and SMS APIs have strict consistency, latency, and availability requirements that cannot be solved using traditional sharding or scaling approaches. In this talk we first look to understand the challenges of running high-availability services in the cloud and then describe how we’ve architected “in-flight” and “post-flight” data into separate datastores that can be implemented using a range of technologies.
This workshop is meant to be an introduction to the systematic review process. Further information about systematic reviews was available through a research guide. http://libguides.ucalgary.ca/content.php?pid=593664
High-Availability Infrastructure in the Cloud - Evan Cooke - Web 2.0 Expo NYC...Twilio Inc
Designing a massively scalable highly available persistence layer has been one of the great challenges we’ve faced building out Twilio’s cloud communications infrastructure. Robust Voice and SMS APIs have strict consistency, latency, and availability requirements that cannot be solved using traditional sharding or scaling approaches. In this talk we first look to understand the challenges of running high-availability services in the cloud and then describe how we’ve architected “in-flight” and “post-flight” data into separate datastores that can be implemented using a range of technologies.
Digital Transformation with Kubernetes, Containers, and MicroservicesLightbend
See the full presentation here: https://www.lightbend.com/blog/digital-transformation-kubernetes-containers-microservices
In this talk by David Ogren, Principal Enterprise Architect at Lightbend, we draw from experiences helping our clients successfully create, migrate to, and manage cloud-native system architectures.
Microservices, Kubernetes, and Application Modernization Done RightLightbend
In this talk by David Ogren, Enterprise Architect at Lightbend, we draw from experiences helping our clients successfully create, migrate to, and manage cloud-native system architectures. We look at some of the common pitfalls and anti-patterns of modernization efforts, and some of the best practices for taking an incremental approach to transforming legacy systems.
See the full post with video on the Lightbend blog: https://www.lightbend.com/blog/microservices-kubernetes-application-modernization
Your developers just walked into your cube and said: "Here's the new app, I built it with Docker, and it's ready to go live." What do you do next? In this session, we'll talk about what containers are and what they are not. And we'll step through a series of considerations that need to be examined when deploying containerized workloads - VMs or Container? Bare Metal or Cloud? What about capacity planning? Security? Disaster Recovery? How do I even get started?
Soccnx III - Connections Administration: Understand the challenge ... and fin...LetsConnect
Speakers: Otto Foerg Felix Binsack
Connections administration is not easy. The administrator has to work from the WebSphere "wsadmin" command-line interface where he has to enter a lot of commands to accomplish one simple task. Everything is case-sensitive, temporary variables must be used to transfer values between commands. It can take some time to find out which combination of commands solves a certain problem. People responsible for Connections administration often are not familiar to do their job this way. This session gives an overview of how Connections administration works and the challenges an administrator is facing. We will show some typical examples and how they are solved using the out-of-the-box Connections administration techniques. Additionally we will introduce the "Connections Administration Toolkit (CAT)", a web-based application offering a graphical interface instead of a command-line. CAT reduces dramatically the complexity of Connections administration and the time needed to perform administrative tasks .
Pull, Don't Push! Sensu Summit 2018 TalkJulian Dunn
Architectures for monitoring and configuration in a microservices era. A talk given by Julian Dunn and Fletcher Nichol at Sensu Summit 2018 in Portland, Oregon.
Pull, don’t push: Architectures for monitoring and configuration in a microse...Sensu Inc.
Applications today are increasingly being designed using a share-nothing, microservices architecture that is resilient to the failure of individual components, even when built atop cloud infrastructure that can suffer infrequent-but-massive outages. Yet we still see many supporting tools for application monitoring, observability, configuration management and release management using a centralized “orchestration” approach that depends on pushing changes to unreliable distributed systems.
In this Sensu Summit 2018 talk, Chef's Julian Dunn & Fletcher Nichol give you a primer about promise theory and the autonomous actor model that underlies the design of products like Sensu and Habitat, why it leads to not only higher overall system reliability but human comprehension for easier operations. They argue that you should consider designing all of your applications and supporting systems in this way. They may even show a demo or two to illustrate how inverting the design radically changes the notion of “application release orchestration”, so that you can retain orchestration-type semantics even with an eventually-consistent system design.
5 Cloud Commandments - Why Cloud Management Makes SenseRightScale
RightScale Conference Santa Clara 2011: What is the cloud and how do you manage it? Uri Budnik will discuss the cloud technology landscape and where RightScale fits in to drive agility, cost, and time savings above cloud infrastructure. RightScale has been investing heavily for the past four years to make cloud infrastructure easy to leverage. This session will clarify elements that are straightforward, what continues to be difficult, and the impact on your schedule and budget.
Successfully Migrate Cisco Call Manager 4x To 7x With a Proven Frameworkglamba
A field tested proven famework that will help ensure successful migrations from Cisco Call Manager (Cisco Unified Communications Manager) 4.x to 6.x/7.x.
DevOps is an emerging name for the collection of techniques we are adopting to meet this challenge and close the gap. While the DevOps movement is relatively young, many of its approaches are rooted in existing best practices.
This presentation makes an argument for DevOps, and proposes a DevOps Infrastructure team to help implement tooling that brings Developers and Operations folks together.
These slides are from a recorded webcast available here: http://www.urbancode.com/html/resources/webinars/DevOps_ITs_Automation_Revolution.html
Are up-front costs holding you back from upgrading your business voice infrastructure?
Whether you\'re considering an update or setting up a completely new voice platform to support your business, the initial costs of hardware and installation can be a deterrant for many organizations.
Our Bell Total Connect Voice solution can help you address this challenge. Part of a new suite of hosted Unified Communications (UC) solutions, Bell Total Connect Voice is an innovative virtual phone system hosted in a Bell data center that offers scalable VoIP and UC functionalities, with affordable monthly subscription packages.
Join us and guest speaker, Forrester\'s Senior UC Analyst Art Schoeller, for a 45-minute live webinar and learn about:
The changing landscape of business voice infrastructure Moving beyond the PBX Bell Total Connect Voice functionalities The benefits of a hosted voice solution
Bimodal IT: Shortcut to Innovation or Path to Dysfunction?dev2ops
Damon Edwards (DTO Solutions) presentation at Pink16 in Las Vegas on February 16, 2016.
Key takeaway: "Bimodal IT describes the problem, not the solution"
More Related Content
Similar to Orchestration Panel at Cloud Connect 2010
Digital Transformation with Kubernetes, Containers, and MicroservicesLightbend
See the full presentation here: https://www.lightbend.com/blog/digital-transformation-kubernetes-containers-microservices
In this talk by David Ogren, Principal Enterprise Architect at Lightbend, we draw from experiences helping our clients successfully create, migrate to, and manage cloud-native system architectures.
Microservices, Kubernetes, and Application Modernization Done RightLightbend
In this talk by David Ogren, Enterprise Architect at Lightbend, we draw from experiences helping our clients successfully create, migrate to, and manage cloud-native system architectures. We look at some of the common pitfalls and anti-patterns of modernization efforts, and some of the best practices for taking an incremental approach to transforming legacy systems.
See the full post with video on the Lightbend blog: https://www.lightbend.com/blog/microservices-kubernetes-application-modernization
Your developers just walked into your cube and said: "Here's the new app, I built it with Docker, and it's ready to go live." What do you do next? In this session, we'll talk about what containers are and what they are not. And we'll step through a series of considerations that need to be examined when deploying containerized workloads - VMs or Container? Bare Metal or Cloud? What about capacity planning? Security? Disaster Recovery? How do I even get started?
Soccnx III - Connections Administration: Understand the challenge ... and fin...LetsConnect
Speakers: Otto Foerg Felix Binsack
Connections administration is not easy. The administrator has to work from the WebSphere "wsadmin" command-line interface where he has to enter a lot of commands to accomplish one simple task. Everything is case-sensitive, temporary variables must be used to transfer values between commands. It can take some time to find out which combination of commands solves a certain problem. People responsible for Connections administration often are not familiar to do their job this way. This session gives an overview of how Connections administration works and the challenges an administrator is facing. We will show some typical examples and how they are solved using the out-of-the-box Connections administration techniques. Additionally we will introduce the "Connections Administration Toolkit (CAT)", a web-based application offering a graphical interface instead of a command-line. CAT reduces dramatically the complexity of Connections administration and the time needed to perform administrative tasks .
Pull, Don't Push! Sensu Summit 2018 TalkJulian Dunn
Architectures for monitoring and configuration in a microservices era. A talk given by Julian Dunn and Fletcher Nichol at Sensu Summit 2018 in Portland, Oregon.
Pull, don’t push: Architectures for monitoring and configuration in a microse...Sensu Inc.
Applications today are increasingly being designed using a share-nothing, microservices architecture that is resilient to the failure of individual components, even when built atop cloud infrastructure that can suffer infrequent-but-massive outages. Yet we still see many supporting tools for application monitoring, observability, configuration management and release management using a centralized “orchestration” approach that depends on pushing changes to unreliable distributed systems.
In this Sensu Summit 2018 talk, Chef's Julian Dunn & Fletcher Nichol give you a primer about promise theory and the autonomous actor model that underlies the design of products like Sensu and Habitat, why it leads to not only higher overall system reliability but human comprehension for easier operations. They argue that you should consider designing all of your applications and supporting systems in this way. They may even show a demo or two to illustrate how inverting the design radically changes the notion of “application release orchestration”, so that you can retain orchestration-type semantics even with an eventually-consistent system design.
5 Cloud Commandments - Why Cloud Management Makes SenseRightScale
RightScale Conference Santa Clara 2011: What is the cloud and how do you manage it? Uri Budnik will discuss the cloud technology landscape and where RightScale fits in to drive agility, cost, and time savings above cloud infrastructure. RightScale has been investing heavily for the past four years to make cloud infrastructure easy to leverage. This session will clarify elements that are straightforward, what continues to be difficult, and the impact on your schedule and budget.
Successfully Migrate Cisco Call Manager 4x To 7x With a Proven Frameworkglamba
A field tested proven famework that will help ensure successful migrations from Cisco Call Manager (Cisco Unified Communications Manager) 4.x to 6.x/7.x.
DevOps is an emerging name for the collection of techniques we are adopting to meet this challenge and close the gap. While the DevOps movement is relatively young, many of its approaches are rooted in existing best practices.
This presentation makes an argument for DevOps, and proposes a DevOps Infrastructure team to help implement tooling that brings Developers and Operations folks together.
These slides are from a recorded webcast available here: http://www.urbancode.com/html/resources/webinars/DevOps_ITs_Automation_Revolution.html
Are up-front costs holding you back from upgrading your business voice infrastructure?
Whether you\'re considering an update or setting up a completely new voice platform to support your business, the initial costs of hardware and installation can be a deterrant for many organizations.
Our Bell Total Connect Voice solution can help you address this challenge. Part of a new suite of hosted Unified Communications (UC) solutions, Bell Total Connect Voice is an innovative virtual phone system hosted in a Bell data center that offers scalable VoIP and UC functionalities, with affordable monthly subscription packages.
Join us and guest speaker, Forrester\'s Senior UC Analyst Art Schoeller, for a 45-minute live webinar and learn about:
The changing landscape of business voice infrastructure Moving beyond the PBX Bell Total Connect Voice functionalities The benefits of a hosted voice solution
Bimodal IT: Shortcut to Innovation or Path to Dysfunction?dev2ops
Damon Edwards (DTO Solutions) presentation at Pink16 in Las Vegas on February 16, 2016.
Key takeaway: "Bimodal IT describes the problem, not the solution"
DevOps & Security from an Enterprise Toolsmith's Perspectivedev2ops
Slides from presentation by Alex Honor and Damon Edwards at DevOps Connect at RSA 2015 in San Francisco on April 20, 2015.
Abstract:
IT organizations are feeling the squeeze from seemingly conflicting business mandates. At one moment the message is “Go Go Go. DevOps, Lean Startup, Continuous Delivery… move faster and give more people access”. The next moment the message is “Be more secure. Compliance above all. Keep us out of the press!”. Damon Edwards and Alex Honor work with many enterprises who are facing these challenges. This talk is an in the trenches view of how these companies are responding and learning to go faster and be more secure.
Without Self-Service Operations, the Cloud is Just Expensive Hosting 2.0 - (a...dev2ops
Damon Edwards (DTO Solutions) presentation at Cloud Expo 2014 Santa Clara.
We are all here because we are sold on the transformative promise of The Cloud. But what good is all of this ephemeral, on-demand infrastructure if your usage doesn't actually improve the agility and speed of your business? How must Operations adapt in order to avoid stifling your Cloud initiative?
Rundeck + Nexus (from Nexus Live on June 5, 2014)dev2ops
The SimplifyOps team was on Nexus Live talking about how people use Rundeck and the integration between Rundeck and Nexus.
Link to the webcast:
https://www.youtube.com/watch?v=eHaEEBEMRA8
You Can't Change Culture, But You Can Change Behavior (DevOpsDays Rome 2012)dev2ops
Presentation by Damon Edwards at DevOpsDays Rome 2012.
Topics:
• What do we mean by "Culture"?
• DevOps Vision defined
1. See the system
2. Focus on flow
3. Recognize feedback loops
4. Look for continuous improvement opportunities
• Examples of techniques that high performing companies use
Lloyd Taylor’s talk at SVDevOps Meetup on Dec 8, 2010. Diagnosing and transforming the culture of your organization.
Video:
http://vimeo.com/17661043
Lloyd Taylor:
http://www.linkedin.com/in/lloydtaylor
SVDevOps:
http://www.meetup.com/SVDevOps/
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
1. Orchestration:
The Next Frontier for Cloud Applications
John Willis, Opscode Inc.
Alex Honor, ControlTier Project
Mark Hinkle, Zenoss Inc.
Duncan Johnston-Watt, CloudSoft Corporation
Damon Edwards, DTO Solutions Inc.
9. The Path to Orchestration
1. Bring “Dev”, “Ops”, and “Biz” points-of-view
and practices into alignment
10. The Path to Orchestration
1. Bring “Dev”, “Ops”, and “Biz” points-of-view
and practices into alignment
See also: #DevOps
11. The Path to Orchestration
1. Bring “Dev”, “Ops”, and “Biz” points-of-view
and practices into alignment
See also: #DevOps
2. Fully automated infrastructure
12. The Path to Orchestration
1. Bring “Dev”, “Ops”, and “Biz” points-of-view
and practices into alignment
See also: #DevOps
2. Fully automated infrastructure
See also: “Infrastructure as Code”
13. Agenda
John Willis (Opscode)
Alex Honor (ControlTier)
Mark Hinkle (Zenoss)
Duncan Johnston-Watt (CloudSoft)
Q&A with Panel Damon Edwards (DTO Solutions)
Moderator
17. 1999
Inventory, packaged file transfers and desktops
2005
Unattended bare metal servers “very very” hard
7k Nodes took 5 days w/90 success
2007
Unattended bare metal in under 10 minutes
Fully configured in under 3 mins
2008
Unattended server in 2 minutes
5000 servers in a week
2010
10k Nodes in under 5 minutes
18. Managing Infrastructure Is Hard
Has Always Been
Proprietary Solutions
• Solve very little of the problem...
1980 • Reach just a handful of large,
enterprise customers
1989 • Require custom implementations
with large professional services
1999
• Deployed exclusively on-premise
2001 • Acquired by companies with large
consulting organizations (IBM, HP,
CA)
19. Open Source Solutions
Cfengine
Started in 1993 by Mark Burgess. He created a scientific approach to
model systems and set a new paradigm for CM. DSL based,
declarative, abstract, convergent and self documenting configuration
management.
Puppet
Founded in 2005 by Luke Kanies. Frustrated with Cfengine syntax and
ability to adapt to real world configuration management, he made a
quantum leap in making a DSL easier to use for declarative, abstract,
convergent and self documenting configuration management.
Chef
Founded in 2008 by Adam Jacob. A community leader working with
Puppet on massively scalable fully automated infrastructures, Saw the
problem as a “systems Integration” problem first and configuration
management as a subcomponent.
21. Infrastructure is changing
• Easier to get (good!)
...but harder to manage (bad!)
• Demand is dynamic
• Developers are crucial to Operations
• Web / Cloud services are proliferating
...and Enterprise is following along
• Manual configuration no longer a crutch
• Few tools to solve a ubiquitous problem
22. Core Principles
• System Integration
• Infrastructure as Code
• Infrastructure API
• Community involvement
• Zero touch
23. Infrastructure as Code
Nodes -- Where recipes are applied
Roles -- Allow you to group together nodes
Cookbooks -- Recipes, Definitions, Attributes, Libraries, Files
and Templates
Resources -- The basic unit of work in Chef - a resource might
be a package, file or service
Providers -- A provider takes actions on resources. A node
decides what provider should be used by default.
Metadata -- Defines cookbook dependencies and additional
parts.
46. Command Dispatcher Provides
• Abstraction at several levels
– Nodes
– Services
– Management Procedures
• Sequenced or parallel execution
47. Command Dispatcher Provides
• Abstraction at several levels
– Nodes
– Services
– Management Procedures
• Sequenced or parallel execution
• Plug-in control modules
48. Example: Cluster Management
• Coordinate actions within a larger procedure
• Roll sets of tasks across sets of nodes
• Manage as whole or logical slices
53. Command Dispatcher Projects
Example command dispatchers (cont’d)…
• ControlTier (controltier.org)
– Workflow system on top of dispatcher
– Web-based GUI and command line tools
– Fine-grain access controls
– Logging and reporting framework
– Integrated with CMDB
54. Orchestration and
Monitoring
Mark Hinkle
VP of Community, Zenoss Inc.
55. Legacy IT
Different perspective, lack of coordination
Cartoon originally copyrighted by the authors; G. Renee Guzlas, artist
56. Legacy Monitoring Perspective
Types of Monitoring Data Collection
• Availability Monitoring – Binary, Moment in
Time • SNMP
• Performance Monitoring – Two
Dimensions, Time and State
• SSH
• Change Management – Comparisons of
states in Time
• WMI
• Event Management – Normalizing • Syslog
Randomness
• Synthetic Transactions – Simulated • Proprietary Agents
Experiences
• Business Service Management (BSM) –
$$$ Consequences of IT Performance
57. The Myth of the Nines
Availability % Downtime per Year Downtime per Month Downtime per Week
99.9% (three nines) 8.76 hours 43.2 minutes 10.1 minutes
99.95% 4.38 hours 21.56 minutes 5.04 minutes
99.99% (four nines) 52.6 minutes 4.32 minutes 1.01 minutes
99.999% (five nines) 5.26 minutes 25.9 seconds 6.05 minutes
99.9999% (six nines) 31.5 seconds 2.59 seconds .0605 seconds
•Average polling interval for monitoring? 5 minutes?
•Even super human operations people can’t be alerted and take action in under 5 minutes.
•One outage per year could drop service level to three nines.
58. Legacy Systems Management:
Fragmented Awareness
Global dashboard is a difficult mash-up of
disparate systems or doesn’t exist. No
communication, No automation
database
Provisioning Configuration Management Performance & Availability Management
Analytics Analytics
server server
Process server Process server Configurtation Process server
database database
Database
Multiple data models across disciplines with no Each management discipline
common object model managed has its own
Agent Agent Agent
separate product (UI,
process, database, and
Multiple agents required for each domain specific language)
discipline and platform
59. Unlegacy Systems Management:
Integrated Model, Interactive, Automated
Application Application
Op. System Op. System
Virtual Machine Virtual Machine
Physical/Virtual/Cloud Infrastructure
60. Example – Broadcast Company
Large premium television content provider serves national cable network with
content served from Linux servers.
• Servers are automatically built using configuration
management software
• As servers are brought into service configuration
management inserts hosts into CMDB used by
monitoring database
• One way interaction between configuration
management and monitoring system
• Reports are generated to determine which
systems are compliant
61. Example - Geeknet
Hundreds of servers, serving web, databases, and other infrastructure for some
of the world’s most highly trafficked websites – over 40 million visitors per
month.
• Servers are automatically built using configuration
management software
• Discovery tool finds infrastructure and populates a
CMDB then spits out information to scripts that
translate information to BIND configurations for
DNS
• Monitoring tool adds hosts to polling tool to start
monitoring servers for availability
• As infrastructure changes systems are updated
automatically
• Servers can be spun up and managed in
minutes, not hours automatically with little or
no human interaction
64. The Application Mobility Manifesto
• Application mobility is the ability to …
– Dynamically change some or all of the infrastructure that an
application is using without any disruption of service
– Optimize the location of application components in the cloud
– Bridge the gap between your private cloud and trusted third
party cloud services providers
• Application mobility is achieved by orchestrating the
cloud
• Application mobility is the “Missing Link” in Cloud
Computing
65. Demo: Application Mobility in Action
• EzBrokerage is implemented using CloudSoft’s
Monterey middleware platform
• EzBrokerage benefits from two complementary
policies
– Workload policy: ensures the service is adequately resourced
based on server demand by managing the size of a pool and
distribution of workload across it
– Geolocation policy: ensures the service is hosted in the right
region based on client demand by managing the overall
distribution of workload across multiple resource pools or
clouds
66. John Willis (opscode.com)
@botchagalupe
Alex Honor (controltier.org)
@alexhonor
Mark Hinkle (zenoss.com)
@mrhinkle
Duncan Johnston-Watt (cloudsoftcorp.com)
@duncanjw
Damon Edwards (dtosolutions.com)
@damonedwards