SlideShare a Scribd company logo
Bringing Together the Core Fundamentals
of Distributed Systems
Kevin Jones @webopsx
11-5-2015
A Little about me
2
• My name is Kevin Jones
• Currently working as Sales Engineer for NGINX, Inc
• Previously worked as an SRE for YP - yellowpages.com
• Experience with production operations, large scale infrastructure and
automation
• Enjoy meeting new people, music and learning new technology
Objectives
3
• What is a Distributed System?
• What makes a Distributed System efficient and reliable?
• What are some of the core fundamentals of Distributed Systems and what
makes them great characteristics to implement in other areas of your IT
infrastructure?
• What qualities does NGINX have that reflect some of these core fundamentals
and how can NGINX help strengthen and improve your existing IT
infrastructure?
• Q&A
What Is a Distributed System?
4
5
• A program… is the code you write.
• A process… is what you get when you run it.
• A message… is used to communicate between processes.
• A packet… is a fragment of a message on a wire.
• A protocol… is a formal description of a message and its rules it must follow
in order to exchange those messages.
• A network… is the infrastructure that links computers, workstations, terminals
etc together.
• A component… can be a process or any piece of hardware required to run a
process.
Lets go back to the basics…
6
Therefore…
• A distributed system… is an application that executes a
collection of protocols to coordinate the actions of multiple
processes on a network, such that all components cooperate
together to perform a single or small set of related tasks.
What Makes a Distributed System Efficient and Reliable?
7
• Scalable
• High Performing
• Highly Available
• Transparent
• Open
• Secure
It should be…
8
The ability of a system, network, or process, to handle a growing amount of work in a capable 
manner or its ability to be enlarged to accommodate that growth.
Scalability
9
• Plan for the future
• Think about user experience
• Start with thinking about SCALE!
Distributed Geometric Availability When Needed
10
• Number of machines
• Number of users
• Number of tasks
• Connections or concurrency
Dealing with the Size of Your Infrastructure
11
• Cost of maintenance
• Efficiency of maintenance
Administration and Dealing with
Maintenance of Systems
12
Characterized by the amount of useful work accomplished by a computer system compared to
the time and resources that are used.
Performance
13
Latency is the state of being latent; delay, a period between the initiation of
something and the occurrence.
14
Latent in latin terms means “hidden”. Existing or present but concealed or
inactive.
15
What Are the Characteristics of High Performance?
• Short response time or low latency
• High throughput or rate of processing work
• Low utilization of computing resources
16
The proportion of time a system is in a functioning condition. If a user cannot access the
system, it is said to be down.
Availability
17
• Designing for failure
• Identifying weak points
• Implementing redundancy
High Availability Is All about Being Fault Tolerant
18
• Network outages across the wire or inside your own private network
• Outages of other third party services or dependencies
• Anything that is out of control of the designer
Some Things Are out of Your Control
19
Any form of a distributed system should hide its distributed nature from its users, appearing
and functioning as a normal centralized system.
Transparency
There Are Many Types of Transparencies in Distributed Systems
20
• Access - one single way to access
• Location - no matter where the user is
• Migration - physical location
• Relocation - moving of resources
• Replication - appear as a single resource
• Concurrent - competing for resources
• Failure - try to hide failure to the user
• Persistence - whether volatile or permanent
• Security - minimum user intervention
21
This determines whether the system can be extended in various ways without disrupting
existing systems or services and be able to easily interact with other open services.
Openness
22
• Conform to well-defined interfaces
• Support portability of applications
• Easily interoperate with other services
To Keep Your Distributed System Open It Must…
23
The system should authenticate access to data and services,
be invulnerable to know threats and follow industry standard security guidelines.
Secureness
24
• Security Audits
• Software patching maintenance or vulnerability management
• Try to use a security framework
• Encryption everywhere
• Integrity checking (Auth)
• Confidentiality through authorization (Resource Access)
• Monitoring of traffic, logins and requests
Common Measures to Help with Security
25
ALL of them!
Which of These Core Fundamentals Can Be Implemented
in Other Areas of Your IT infrastructure?
26
Many of these characteristics can be found in NGINX and can even help you
strengthen your existing IT infrastructure.
27
Quick Intro to NGINX
• Open source version created in 2004
• NGINX, Inc. founded in 2011
• 140 million + known instances running
today on the internet
• #1 web server of choice on the top 100,000
busiest sites
Igor Sysoev, NGINX creator and founder
28
Load Balancer
Web Server
Reverse Proxy
Content Cache
29
Scalability
NGINX - Open Source
Layer 7 Software Load Balancer for HTTP(S) / TCP
Application Delivery Platform
API Gateway
10,000+ Virtual Servers Multi-tenancy
NGINX Plus - Commercial
Real Time Activity Monitoring API (status)
Dynamic Upstream Reconfiguration API (upstream_conf)
30
NGINX Plus Real Time Activity Monitoring
31
QUICK DEMO
32
Performance
NGINX - Open Source
High Throughput
High Number of Concurrent Connections (1 Million+)
Content Caching at Edge
Low CPU/Memory Utilization
Fine Tunable Configuration
HTTP2!!!
33
HTTP(S) / TCP
34
Availability
NGINX - Open Source
HA Configurable with keepalived
(IP Syncronization over VRRP)
NGINX Plus - Commercial
NGINX HA Package for Easy Configuration
Application Aware Health Checks for Upstreams
35
Transparency
NGINX - Open Source
Combined with Global DNS Can Handle
Global Load Balancing (Route53, Google, GoDaddy etc)
Reverse Proxy - Single Entry Point
NGINX Plus - Commercial
Session Persistence (Cookie, Session, Route)
36
Openness
NGINX - Open Source
Open Source / Third Party Modules
nginScript - JavaScript Inside NGINX Configurations
Dynamic Loadable Modules COMING SOON!
NGINX Plus - Commercial
Simple HTTP Based APIs
API with JSON Interface
37
{
"version":6,
"nginx_version":"1.9.5",
“address”:”127.0.0.1",
"generation":12,
"load_timestamp":1446285600278,
"timestamp":1446705526537,
"pid":92676,
"processes":{
"respawned":0
},
"connections":{
"accepted":11441510,
"dropped":0,
"active":4,
"idle":30
},
"ssl":{
"handshakes":57921,
"handshakes_failed":9497,
"session_reuses":11987
},
NGINX Plus Monitoring JSON API
38
Secureness
NGINX - Open Source
Authentication via auth_request Module
SSL Support
Client Certificate Based Authentication Support
Bandwidth Limiting
Connection Limiting
Access Control Lists (ACLs)
LDAP Support
Reverse Proxy - Easily ACL Backend Resources
NGINX Plus - Commercial
NTLM Support
39
Thank you all again for coming!
Twitter @webopsx
Kevin Jones
http://www.slideshare.net/KevinJones62
Q&A?
40
http://www.aosabook.org/en/distsys.html

http://arxiv.org/pdf/0911.4395v1.pdf 

http://book.mixu.net/distsys/ 

http://the-paper-trail.org/blog/distributed-systems-theory-for-the-distributed-systems-engineer/ 

http://www.fit.vutbr.cz/~rabj/pdie/lecture_1.pdf 

http://www.cl.cam.ac.uk/~jac22/books/ods/ods/node18.html 

http://www.hpcs.cs.tsukuba.ac.jp/~tatebe/lecture/h23/dsys/dsd-tutorial.html 

http://cse.csusb.edu/tongyu/courses/cs660/notes/chap1.php 

http://www.opengroup.org/cloud/cloud/cloud_iop/cloud_port.htm 

http://www.toptal.com/security/10-most-common-web-security-vulnerabilities 

http://arxiv.org/pdf/1211.2032.pdf 

https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html

http://nginx.org/en/docs/ 

http://www.aosabook.org/en/nginx.html 

https://www.nginx.com/resources/admin-guide/ 

https://www.nginx.com/blog/nginx-plus-authenticate-users/
References

More Related Content

What's hot

Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
Papitha Velumani
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive Networks
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
Priyanka Aash
 
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and MicroservicesAccelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Rick Hightower
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware
 
New Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization ProtocolsNew Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization Protocols
Internet Technology Matters (Internet Society)
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
Shakas Technologies
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
Shawn Wells
 
MQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsMQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfalls
Dominik Obermaier
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure security
Len Bass
 
Lightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTTLightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTT
Dominik Obermaier
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network Virtualization
NetCraftsmen
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
GLC Networks
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
Gabriella Davis
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
Sam Bowne
 
cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encrypted
DevanandPatil6
 
The Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on SecurityThe Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on Security
Brent Salisbury
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
Ziv Ichilov
 

What's hot (20)

Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and MicroservicesAccelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
New Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization ProtocolsNew Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization Protocols
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
MQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsMQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfalls
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure security
 
Lightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTTLightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTT
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network Virtualization
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encrypted
 
The Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on SecurityThe Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on Security
 
SDN-Security
SDN-SecuritySDN-Security
SDN-Security
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 

Viewers also liked

Rss
RssRss
Deploying NGINX Plus with Ansible
Deploying NGINX Plus with AnsibleDeploying NGINX Plus with Ansible
Deploying NGINX Plus with Ansible
Kevin Jones
 
The 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century SkillsThe 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century Skills
Liberty Gavas
 
Presentacion de rss
Presentacion de rssPresentacion de rss
Presentacion de rss
Freddy Javier Quiñones Ramirez
 
Real madrid jmgm
Real madrid jmgmReal madrid jmgm
Real madrid jmgm
jose garcia
 
Lectores rss
Lectores rssLectores rss
Lectores rss
deissy30
 
Med supppresentation
Med supppresentationMed supppresentation
Med supppresentation
nebulainsurance
 
Barlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parteBarlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parte
Basile Barlot
 
Cuales son las diapositivas
Cuales son las diapositivasCuales son las diapositivas
Cuales son las diapositivas
toaquizamargoth
 
Vascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicionVascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicion
Jaime Guillermo González Gámez
 
Boca y contenido
Boca y contenidoBoca y contenido
Boca y contenido
IPN
 
Habilidades gerenciales
Habilidades gerenciales Habilidades gerenciales
Habilidades gerenciales
Edgar Condor Capcha
 

Viewers also liked (14)

Rss
RssRss
Rss
 
OKURA hotel Amsterdam
OKURA hotel AmsterdamOKURA hotel Amsterdam
OKURA hotel Amsterdam
 
Deploying NGINX Plus with Ansible
Deploying NGINX Plus with AnsibleDeploying NGINX Plus with Ansible
Deploying NGINX Plus with Ansible
 
The 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century SkillsThe 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century Skills
 
Presentacion de rss
Presentacion de rssPresentacion de rss
Presentacion de rss
 
Real madrid jmgm
Real madrid jmgmReal madrid jmgm
Real madrid jmgm
 
Medicare 1II
Medicare 1IIMedicare 1II
Medicare 1II
 
Lectores rss
Lectores rssLectores rss
Lectores rss
 
Med supppresentation
Med supppresentationMed supppresentation
Med supppresentation
 
Barlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parteBarlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parte
 
Cuales son las diapositivas
Cuales son las diapositivasCuales son las diapositivas
Cuales son las diapositivas
 
Vascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicionVascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicion
 
Boca y contenido
Boca y contenidoBoca y contenido
Boca y contenido
 
Habilidades gerenciales
Habilidades gerenciales Habilidades gerenciales
Habilidades gerenciales
 

Similar to Ricon 2015 final

Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxChapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
meharikiros2
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
udaya khanal
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
Mofizur Rahman
 
Manging Container Deployments at Scale
Manging Container Deployments at ScaleManging Container Deployments at Scale
Manging Container Deployments at Scale
Mofizur Rahman
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1Lahav Savir
 
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
InfluxData
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is king
plumbee
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud Computing
Mark Hinkle
 
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
AgileNetwork
 
Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016
Keith Lynch
 
Benefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centersBenefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centers
Aruba, a Hewlett Packard Enterprise company
 
Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices
Dev_Events
 
DEVNET-1117 Open Source DevCenter Launched within DevNet
DEVNET-1117	Open Source DevCenter Launched within DevNetDEVNET-1117	Open Source DevCenter Launched within DevNet
DEVNET-1117 Open Source DevCenter Launched within DevNet
Cisco DevNet
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
Rick Hightower
 
2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation
Shawn Wells
 
Microservices: Yes or not?
Microservices: Yes or not?Microservices: Yes or not?
Microservices: Yes or not?
Eduard Tomàs
 
Microservices Architecture
Microservices ArchitectureMicroservices Architecture
Microservices Architecture
Srinivasan Nanduri
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705Miguel Vidal
 
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
MariaDB plc
 

Similar to Ricon 2015 final (20)

Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxChapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
 
Manging Container Deployments at Scale
Manging Container Deployments at ScaleManging Container Deployments at Scale
Manging Container Deployments at Scale
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is king
 
Introduction
IntroductionIntroduction
Introduction
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud Computing
 
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
 
Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016
 
Benefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centersBenefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centers
 
Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices
 
DEVNET-1117 Open Source DevCenter Launched within DevNet
DEVNET-1117	Open Source DevCenter Launched within DevNetDEVNET-1117	Open Source DevCenter Launched within DevNet
DEVNET-1117 Open Source DevCenter Launched within DevNet
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
 
2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation
 
Microservices: Yes or not?
Microservices: Yes or not?Microservices: Yes or not?
Microservices: Yes or not?
 
Microservices Architecture
Microservices ArchitectureMicroservices Architecture
Microservices Architecture
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705
 
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
 

More from Kevin Jones

DockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINXDockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINX
Kevin Jones
 
Using NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes IngressUsing NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes Ingress
Kevin Jones
 
High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINX
Kevin Jones
 
Using NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content CacheUsing NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content Cache
Kevin Jones
 
NGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern WebNGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern Web
Kevin Jones
 
Accelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINXAccelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINX
Kevin Jones
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX Plus
Kevin Jones
 
Load Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterLoad Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS Cluster
Kevin Jones
 

More from Kevin Jones (8)

DockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINXDockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINX
 
Using NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes IngressUsing NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes Ingress
 
High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINX
 
Using NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content CacheUsing NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content Cache
 
NGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern WebNGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern Web
 
Accelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINXAccelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINX
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX Plus
 
Load Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterLoad Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS Cluster
 

Recently uploaded

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 

Recently uploaded (20)

Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 

Ricon 2015 final

  • 1. Bringing Together the Core Fundamentals of Distributed Systems Kevin Jones @webopsx 11-5-2015
  • 2. A Little about me 2 • My name is Kevin Jones • Currently working as Sales Engineer for NGINX, Inc • Previously worked as an SRE for YP - yellowpages.com • Experience with production operations, large scale infrastructure and automation • Enjoy meeting new people, music and learning new technology
  • 3. Objectives 3 • What is a Distributed System? • What makes a Distributed System efficient and reliable? • What are some of the core fundamentals of Distributed Systems and what makes them great characteristics to implement in other areas of your IT infrastructure? • What qualities does NGINX have that reflect some of these core fundamentals and how can NGINX help strengthen and improve your existing IT infrastructure? • Q&A
  • 4. What Is a Distributed System? 4
  • 5. 5 • A program… is the code you write. • A process… is what you get when you run it. • A message… is used to communicate between processes. • A packet… is a fragment of a message on a wire. • A protocol… is a formal description of a message and its rules it must follow in order to exchange those messages. • A network… is the infrastructure that links computers, workstations, terminals etc together. • A component… can be a process or any piece of hardware required to run a process. Lets go back to the basics…
  • 6. 6 Therefore… • A distributed system… is an application that executes a collection of protocols to coordinate the actions of multiple processes on a network, such that all components cooperate together to perform a single or small set of related tasks.
  • 7. What Makes a Distributed System Efficient and Reliable? 7 • Scalable • High Performing • Highly Available • Transparent • Open • Secure It should be…
  • 9. 9 • Plan for the future • Think about user experience • Start with thinking about SCALE! Distributed Geometric Availability When Needed
  • 10. 10 • Number of machines • Number of users • Number of tasks • Connections or concurrency Dealing with the Size of Your Infrastructure
  • 11. 11 • Cost of maintenance • Efficiency of maintenance Administration and Dealing with Maintenance of Systems
  • 12. 12 Characterized by the amount of useful work accomplished by a computer system compared to the time and resources that are used. Performance
  • 13. 13 Latency is the state of being latent; delay, a period between the initiation of something and the occurrence.
  • 14. 14 Latent in latin terms means “hidden”. Existing or present but concealed or inactive.
  • 15. 15 What Are the Characteristics of High Performance? • Short response time or low latency • High throughput or rate of processing work • Low utilization of computing resources
  • 16. 16 The proportion of time a system is in a functioning condition. If a user cannot access the system, it is said to be down. Availability
  • 17. 17 • Designing for failure • Identifying weak points • Implementing redundancy High Availability Is All about Being Fault Tolerant
  • 18. 18 • Network outages across the wire or inside your own private network • Outages of other third party services or dependencies • Anything that is out of control of the designer Some Things Are out of Your Control
  • 19. 19 Any form of a distributed system should hide its distributed nature from its users, appearing and functioning as a normal centralized system. Transparency
  • 20. There Are Many Types of Transparencies in Distributed Systems 20 • Access - one single way to access • Location - no matter where the user is • Migration - physical location • Relocation - moving of resources • Replication - appear as a single resource • Concurrent - competing for resources • Failure - try to hide failure to the user • Persistence - whether volatile or permanent • Security - minimum user intervention
  • 21. 21 This determines whether the system can be extended in various ways without disrupting existing systems or services and be able to easily interact with other open services. Openness
  • 22. 22 • Conform to well-defined interfaces • Support portability of applications • Easily interoperate with other services To Keep Your Distributed System Open It Must…
  • 23. 23 The system should authenticate access to data and services, be invulnerable to know threats and follow industry standard security guidelines. Secureness
  • 24. 24 • Security Audits • Software patching maintenance or vulnerability management • Try to use a security framework • Encryption everywhere • Integrity checking (Auth) • Confidentiality through authorization (Resource Access) • Monitoring of traffic, logins and requests Common Measures to Help with Security
  • 25. 25 ALL of them! Which of These Core Fundamentals Can Be Implemented in Other Areas of Your IT infrastructure?
  • 26. 26 Many of these characteristics can be found in NGINX and can even help you strengthen your existing IT infrastructure.
  • 27. 27 Quick Intro to NGINX • Open source version created in 2004 • NGINX, Inc. founded in 2011 • 140 million + known instances running today on the internet • #1 web server of choice on the top 100,000 busiest sites Igor Sysoev, NGINX creator and founder
  • 28. 28 Load Balancer Web Server Reverse Proxy Content Cache
  • 29. 29 Scalability NGINX - Open Source Layer 7 Software Load Balancer for HTTP(S) / TCP Application Delivery Platform API Gateway 10,000+ Virtual Servers Multi-tenancy NGINX Plus - Commercial Real Time Activity Monitoring API (status) Dynamic Upstream Reconfiguration API (upstream_conf)
  • 30. 30 NGINX Plus Real Time Activity Monitoring
  • 32. 32 Performance NGINX - Open Source High Throughput High Number of Concurrent Connections (1 Million+) Content Caching at Edge Low CPU/Memory Utilization Fine Tunable Configuration HTTP2!!!
  • 34. 34 Availability NGINX - Open Source HA Configurable with keepalived (IP Syncronization over VRRP) NGINX Plus - Commercial NGINX HA Package for Easy Configuration Application Aware Health Checks for Upstreams
  • 35. 35 Transparency NGINX - Open Source Combined with Global DNS Can Handle Global Load Balancing (Route53, Google, GoDaddy etc) Reverse Proxy - Single Entry Point NGINX Plus - Commercial Session Persistence (Cookie, Session, Route)
  • 36. 36 Openness NGINX - Open Source Open Source / Third Party Modules nginScript - JavaScript Inside NGINX Configurations Dynamic Loadable Modules COMING SOON! NGINX Plus - Commercial Simple HTTP Based APIs API with JSON Interface
  • 38. 38 Secureness NGINX - Open Source Authentication via auth_request Module SSL Support Client Certificate Based Authentication Support Bandwidth Limiting Connection Limiting Access Control Lists (ACLs) LDAP Support Reverse Proxy - Easily ACL Backend Resources NGINX Plus - Commercial NTLM Support
  • 39. 39 Thank you all again for coming! Twitter @webopsx Kevin Jones http://www.slideshare.net/KevinJones62 Q&A?
  • 40. 40 http://www.aosabook.org/en/distsys.html http://arxiv.org/pdf/0911.4395v1.pdf http://book.mixu.net/distsys/ http://the-paper-trail.org/blog/distributed-systems-theory-for-the-distributed-systems-engineer/ http://www.fit.vutbr.cz/~rabj/pdie/lecture_1.pdf http://www.cl.cam.ac.uk/~jac22/books/ods/ods/node18.html http://www.hpcs.cs.tsukuba.ac.jp/~tatebe/lecture/h23/dsys/dsd-tutorial.html http://cse.csusb.edu/tongyu/courses/cs660/notes/chap1.php http://www.opengroup.org/cloud/cloud/cloud_iop/cloud_port.htm http://www.toptal.com/security/10-most-common-web-security-vulnerabilities http://arxiv.org/pdf/1211.2032.pdf https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html http://nginx.org/en/docs/ http://www.aosabook.org/en/nginx.html https://www.nginx.com/resources/admin-guide/ https://www.nginx.com/blog/nginx-plus-authenticate-users/ References