f5 in five: the emergence of · f5 in five: the emergence of the cloud edge joel moses sr....
TRANSCRIPT
F5 in Five: The Emergence of the Cloud EdgeJoel Moses Sr. Director, Solution Engineering
What Is the Cloud Edge?
What Is the Cloud Edge?(But first… history class!)
© 2016 F5 Networks
The Gold Rush!
4
© 2016 F5 Networks
The Gold Rush!
(Not unlike the cloud…)4
© 2016 F5 Networks
A gold mine is a hole in the ground with a liar at the top.
Old Western Adage
5
© 2016 F5 Networks
“Properly Kitted”
7
© 2016 F5 Networks
“Properly Kitted”Not just picks and shovels!
7
© 2016 F5 Networks
“Properly Kitted”Not just picks and shovels!Miners needed to be well-equipped, while still being light enough to move quickly.
7
© 2016 F5 Networks
“Properly Kitted”Not just picks and shovels!Miners needed to be well-equipped, while still being light enough to move quickly.They needed to eat well enough to have the energy to keep digging.
7
© 2016 F5 Networks
“Properly Kitted”Not just picks and shovels!Miners needed to be well-equipped, while still being light enough to move quickly.They needed to eat well enough to have the energy to keep digging.In the middle of nowhere, they had to be able to recognize and react to emergencies with the right tools.
7
© 2016 F5 Networks
“Properly Kitted”Not just picks and shovels!Miners needed to be well-equipped, while still being light enough to move quickly.They needed to eat well enough to have the energy to keep digging.In the middle of nowhere, they had to be able to recognize and react to emergencies with the right tools.Protection from the constant attack of the weather was a priority.
7
The Cloud Edge
The Cloud Edge(Getting properly kitted)
© 2016 F5 Networks
Applications Are Transforming
9
© 2016 F5 Networks
Applications Are Transforming
• Top 100 CIOs* • Currently 71% hybrid • Expect Azure to
eclipse AWS by 2019 • Majority of workloads
in public cloud/IaaS by 2020
• Majority of AWS customers connect via colocation
The Future Is Cloudy
9
© 2016 F5 Networks
Applications Are Transforming
• Top 100 CIOs* • Currently 71% hybrid • Expect Azure to
eclipse AWS by 2019 • Majority of workloads
in public cloud/IaaS by 2020
• Majority of AWS customers connect via colocation
The Future Is Cloudy
• Modular application construction is now dominant
• Emergence of development integrated with operations
• Shared ownership of applications is beginning to take root
DevOps Is Rising
9
© 2016 F5 Networks
Applications Are Transforming
• Top 100 CIOs* • Currently 71% hybrid • Expect Azure to
eclipse AWS by 2019 • Majority of workloads
in public cloud/IaaS by 2020
• Majority of AWS customers connect via colocation
The Future Is Cloudy
• Modular application construction is now dominant
• Emergence of development integrated with operations
• Shared ownership of applications is beginning to take root
DevOps Is Rising
• Containerized “microservices” gaining popularity
• Orchestration is now a part of the application landscape • Docker, Kubernetes,
Mesos, OpenShift • Analytics now
commonly built into applications
Technology Is Changing
* Morgan Stanley 2016 CIO Analysis
9
© 2016 F5 Networks
Organizations Are Transforming
Desired attributes Predictable, stable, centralized
Key influencers NetOps, IT management, SecOps
Application types Packaged, regulated, compliant
Established IT (Mode 1)
Desired attributes Dynamic, agile, distributed
Key influencers Application teams, DevOps, cloud architects
Application types Born in the cloud, custom, web-based
Emerging IT (Mode 2)
* Derived from Gartner G00301285 (March 24th 2016)
10
© 2016 F5 Networks
Everyone’s Staking a Claim
DevOps
NetOps
VM
VMVMVM
VMVMVM
MSP Colocation
Private CloudApplication
Application
Corporate Data Center
Private Cloud
Silverline
DDoS
BIG-IP SecOps
FW
VMVMVM
VMVMVM
11
© 2016 F5 Networks
Everyone’s Staking a Claim
DevOps
NetOps
VM
VMVMVM
VMVMVM
MSP Colocation
Private CloudApplication
Application
Corporate Data Center
Private Cloud
Silverline
DDoS
BIG-IP SecOps
FW
VMVMVM
VMVMVM
11
© 2016 F5 Networks
Everyone’s Staking a Claim
DevOps
NetOps
VM
VMVMVM
VMVMVM
MSP Colocation
Private CloudApplication
Application
Corporate Data Center
Private Cloud
Silverline
DDoS
BIG-IP SecOps
FW
VMVMVM
VMVMVM
11
© 2016 F5 Networks
Everyone’s Staking a Claim
DevOps
NetOps
VM
VMVMVM
VMVMVM
MSP Colocation
Private CloudApplication
Application
Corporate Data Center
Private Cloud
Silverline
DDoS
BIG-IP SecOps
FW
VMVMVM
VMVMVM
11
© 2016 F5 Networks
Everyone’s Staking a Claim
DevOps
NetOps
VM
VMVMVM
VMVMVM
MSP Colocation
Private CloudApplication
Application
Corporate Data Center
Private Cloud
Silverline
DDoS
BIG-IP SecOps
FW
VMVMVM
VMVMVM
12
© 2016 F5 Networks
Everyone’s Staking a Claim
DevOps
NetOps
VM
VMVMVM
VMVMVM
MSP Colocation
Private CloudApplication
Application
Corporate Data Center
Private Cloud
Silverline
DDoS
BIG-IP SecOps
FW
VMVMVM
VMVMVMNew challenges • Lack of security policy controls • Poor visibility into application
health/transactions • Inconsistent application services • Wildly divergent APIs • Cloud “lock-in” • Need to keep critical data
(e.g., security certs) on-premises
12
© 2016 F5 Networks
And Some of the Old Lessons…
13
© 2016 F5 Networks
Latency Reliability ConsistencyVisibility
And Some of the Old Lessons…
13
© 2016 F5 Networks
Emergence of the Cloud Edge
14
© 2016 F5 Networks
Emergence of the Cloud Edge
Enterprise Data Center
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS
Enterprise Data Center
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
Common Services
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
Services that are applied to an application aren’t going away
Common Services
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
Services that are applied to an application aren’t going away
Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds
NEXT-GEN FW
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
Common Services
CACHING/ACCELERATION
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
Services that are applied to an application aren’t going away
Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds
Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center
NEXT-GEN FW
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
Common Services
CACHING/ACCELERATION
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
Services that are applied to an application aren’t going away
Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds
Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center
Traditio
nal
Virtuali
zed
Multi-T
enan
t
Cloud O
ptimize
d
Private Cloud Maturity Continuum
NEXT-GEN FW
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
Common Services
CACHING/ACCELERATION
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
Services that are applied to an application aren’t going away
Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds
Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center
Traditio
nal
Virtuali
zed
Multi-T
enan
t
Cloud O
ptimize
d
Private Cloud Maturity Continuum
NEXT-GEN FW
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
Common Services
CACHING/ACCELERATION
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
Services that are applied to an application aren’t going away
Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds
Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center
Traditio
nal
Virtuali
zed
Multi-T
enan
t
Cloud O
ptimize
d
Private Cloud Maturity Continuum
NEXT-GEN FW
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
Common Services
CACHING/ACCELERATION
14
© 2016 F5 Networks
Emergence of the Cloud Edge
SaaS Public
Enterprise Data Center
Services that are applied to an application aren’t going away
Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds
Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center
Traditio
nal
Virtuali
zed
Multi-T
enan
t
Cloud O
ptimize
d
Private Cloud Maturity Continuum
NEXT-GEN FW
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
Common Services
CACHING/ACCELERATION
14
© 2016 F5 Networks
A Service In Depth
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
15
© 2016 F5 Networks
DATA LEAKAGE PREVENTION
A Service In Depth
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
15
© 2016 F5 Networks
DATA LEAKAGE PREVENTION
A Service In Depth
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
Security tools like DLP “weigh” a lot and require intensive compute resources.
DATA LEAKAGE PREVENTION
15
© 2016 F5 Networks
DATA LEAKAGE PREVENTION
A Service In Depth
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
Security tools like DLP “weigh” a lot and require intensive compute resources.
DLP tools often need to be engaged in specific ways that some environments don’t support (ICAP).
DATA LEAKAGE PREVENTION
15
© 2016 F5 Networks
DATA LEAKAGE PREVENTION
A Service In Depth
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
Security tools like DLP “weigh” a lot and require intensive compute resources.
DLP tools often need to be engaged in specific ways that some environments don’t support (ICAP).
Many of these tools require a lot of manual interaction and aren’t easy to orchestrate into place.
DATA LEAKAGE PREVENTION
15
© 2016 F5 Networks
DATA LEAKAGE PREVENTION
A Service In Depth
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
Security tools like DLP “weigh” a lot and require intensive compute resources.
DLP tools often need to be engaged in specific ways that some environments don’t support (ICAP).
Many of these tools require a lot of manual interaction and aren’t easy to orchestrate into place.
…No wonder why no one smiled in those old photos.
DATA LEAKAGE PREVENTION
15
© 2016 F5 Networks
Origin of the Cloud Edge
SaaS Public
Enterprise Data Center
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
16
© 2016 F5 Networks
Origin of the Cloud Edge
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
16
© 2016 F5 Networks
Origin of the Cloud Edge
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
Higher latency and higher cost links
16
© 2016 F5 Networks
Origin of the Cloud Edge
NEXT-GEN FW
CACHING/ACCELERATION
WEB APPLICATION FIREWALL
INTRUSION PREVENTION
DATA LEAKAGE PREVENTION
Higher latency and higher cost links
Lower latency and lower cost links
16
© 2016 F5 Networks
Origin of the Cloud Edge
Higher latency and higher cost links
Lower latency and lower cost links
16
What Are You Going to Give Me?
© 2016 F5 Networks
Deploy any application, anywhere, with consistent application services and security
Traditional Data Center
Private Cloud
CoLo/Public Cloud
Consistent Policies Cloud Freedom
Fastest Time to Service Visibility
Lowest TCO
Workload Migration Workload M
igration
SaaS Apps
Managed Hosting
F5 Cloud Vision
SaaS
SaaS
SaaS
SaaS
SaaS
DIRECT CONNECT
BIG-IP
AWSGoogle
Azure
IBM
Rackspace
18
© 2016 F5 Networks
Deploy any application, anywhere, with consistent application services and security
F5 Cloud Vision
SaaS
SaaS
SaaS
SaaS
SaaS
DIRECT CONNECT
BIG-IP
AWSGoogle
Azure
IBM
Rackspace
Service Center
18
© 2016 F5 Networks
FreedomTo deploy any application, anywhere, with consistent application services and security
Private Cloud
Public Cloud
SaaS Apps
Traditional Data Center
F5 Cloud Vision
SaaS
SaaS
SaaS
SaaS
SaaS
DIRECT CONNECT
BIG-IP
AWSGoogle
Azure
IBM
Rackspace
Service Center
SaaS SaaS
Silverline
19
© 2016 F5 Networks
FreedomTo deploy any application, anywhere, with consistent application services and security
Private Cloud
Public Cloud
SaaS Apps
Traditional Data Center
F5 Cloud Vision
SaaS
SaaS
SaaS
SaaS
SaaS
DIRECT CONNECT
BIG-IP
AWSGoogle
Azure
IBM
Rackspace
Service Center
SaaS SaaS
Silverline
Service Interconnect
19
© 2016 F5 Networks
F5 Private CloudSolution packages and ecosystem
Visualization and Analytics—Horizon, App-IQ
Orchestration—Heat, iWorkflow, Chef, Puppet
Programmability—iApps LX, iRules LX, SDK/Eclipse
Certifications—Red Hat, Mirantis
SI Partnerships—HP Helion, IBM Blue Box, others
BIG-IP VEs
F5 private cloud solution packages: engineered, tested, certified
Microsoft AzureStack
Microsoft AzureStack
OpenStack
VMware NSX
Cisco APIC
20
© 2016 F5 Networks
F5 Cloud Participation
21
© 2016 F5 Networks
F5 Cloud Participation
Provide a comfortable, well-instrumented environment for DevOps
21
© 2016 F5 Networks
F5 Cloud Participation
Provide a comfortable, well-instrumented environment for DevOpsSupport applications with delivery techniques that are sized and managed correctly for them
21
© 2016 F5 Networks
F5 Cloud Participation
Provide a comfortable, well-instrumented environment for DevOpsSupport applications with delivery techniques that are sized and managed correctly for themEnable true agility through adoption of a service catalog (iWorkflow)
21
© 2016 F5 Networks
F5 Cloud Participation
Provide a comfortable, well-instrumented environment for DevOpsSupport applications with delivery techniques that are sized and managed correctly for themEnable true agility through adoption of a service catalog (iWorkflow)Embrace the open source model and contribute back to the community
21
© 2016 F5 Networks
F5 Visibility Tools
22
© 2016 F5 Networks
F5 Visibility Tools
22
© 2016 F5 Networks
F5 Visibility Tools
22
© 2016 F5 Networks
F5 Visibility Tools
22
© 2016 F5 Networks
F5 Visibility Tools
22
© 2016 F5 Networks
Data Center and Cloud Strategy
Established IT Emerging/DevOps IT
23
Q&A
• Add class to your personal schedule.
• Survey will pop up in Mobile App. • Answer the multiple choice. • Submit your question to complete. • Receive 5 points!
Give Feedback – Get Points!