SlideShare uma empresa Scribd logo
1 de 24
Baixar para ler offline
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DVO311
Learn How to Use Containers, Red Hat, and AWS
to Achieve Extreme IT Agility and Combat
Network Exploits
Sean Dilda
Senior Automation Engineer
Duke University
Chris Collins
Senior Linux System Administrator
Duke University
Scott McCarty
Container Technical Evangelist
Red Hat
What to Expect from the Session
In this session, you will learn:
•Where containers provide real value
•How Duke University use containers
Combatting a Denial of Service (DoS) attack
Identity management
Research computing
•How to address common container adoption challenges
•Key recommendations for working with containers
REAL VALUE OF CONTAINERS
Containers Deliver Many Benefits
Base: 171 IT and Developer/programmer decision-makers at companies with 500+ employees in APAC, EMEA, and NA
Source: A commissioned study conducted by Forrester Consulting on behalf of Red Hat, January, 2015
CONTAINERS IN USE
Adoption Patterns
PACKAGE AND SHIP
MONOLITHIC APPS
MIGRATE DIFFERENTIATING
APPS TO CLOUD
PACKAGE AND SHIP
CLOUD-READY APPS
PROBLEM
●DDoS attack targeting Duke.edu
●Flooding load balancers
●All load-balanced services impacted
●Duke.edu down
Real-world Example #1:
Combatting a Denial of Service Attack
SOLUTION
●Duke.edu container image
●AWS Docker hosts
●External DNS for duke.edu pointed to
AWS
●Internal traffic kept inside Duke
THE RESULT
●Duke.edu unaffected for internal customers
●Duke.edu traffic handled by AWS for external customers/DDoS
●30-minute migration!
●Attack removed from load balancers
●Other load-balanced services back to normal
PROBLEM
●Legacy IDM apps
●Unpredictable behavior after patching
●Result: Infrequent patching
●Inability to easily upgrade
●Result: Ancient hardware
Real-world Example #2:
Internet Download Manager (IDM) in a Container
SOLUTION
●Build IDM apps in containers
●Jenkins builds every 4 hours w/latest
patches
●Automated testing notifies of failures
●Last “known good” image kept
THE RESULT
●“Known good” image always available; uptime assured
●Breaking patches can be investigated while “known good” images are kept in use
●Extremely portable
●Hardware independent
●Other environment can be set up, tested, torn down in minutes
PROBLEM
●Researchers want custom tool chains
●IT wants researchers on shared
infrastructure
●Researchers need to be able to
reproduce/share environment
Real-world Example #3: Research Computing
Serving Up Multiple Stacks
SOLUTION
●Run every job in a custom Docker-
formatted container
●Keep archive of old container images
with log of which version was used for
which job run
THE RESULT
●Self service: Researchers at Duke are starting to build their own Docker-formatted
container images to run their analysis
THE REALITY OF ADOPTING
CONTAINERS: WHAT ARE THE
TOP CHALLENGES?
Top Challenges by Container Users
Base: 171 IT and Developer/programmer decision-makers at companies with 500+ employees in APAC, EMEA, and NA
Source: A commissioned study conducted by Forrester Consulting on behalf of Red Hat, January, 2015
TECHNOLOGY
Challenges Duke Is Seeing
PROCESS/STRATEGIC
CONTAINING THE MOST
INTERESTING APPLICATION
IN THE WORLD
The Reality: Security Implications
Security Inside the Container
●High vulnerabilities: ShellShock (bash), Heartbleed
(OpenSSL), etc.
●Medium vulnerabilities: Poodle (OpenSSL), etc.
●Low vulnerabilities: gcc: array memory allocations
could cause integer overflow
36% of official images available for download
contain high-priority security vulnerabilities
Source: Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities, Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner, BanyanOps, May 2015
(http://www.banyanops.com/pdf/BanyanOps-AnalyzingDockerHub-WhitePaper.pdf)
And That's Why the Ops Guy Is
Freaking Out
Container Host & Container Image
UNTRUSTED
●Will what’s inside the containers compromise your infrastructure?
●How and when will apps and libraries be updated?
●Will it work from host to host?
RED HAT CERTIFIED
●Trusted source for the host and the containers
●Trusted content inside the container with security fixes available as
part of an enterprise lifecycle
●Portability across hosts
●Container Development Kit
●Certification as a service
●Certification catalog
●Red Hat Container Registry
HOST OS
CONTAINER
OS
RUNTIME
APP
HOST OS
CONTAINER
OS
RUNTIME
APP
RECOMMENDATIONS
AND A WORD OF ADVICE
TRUST PORTABILITY COMPREHENSIVE
Red Hat’s Container Strategy
Start Small, but Think Big:
Advanced Tools & Planning
portability across environments
PHYSICAL VIRTUAL PRIVATE CLOUD PUBLIC CLOUD
portability across platforms
A Word of Advice
●Adoption Patterns
Start small for quick wins
Top-down approach for confidence
Advanced management tools
Single vs. multiple containers
Portability
●Trust
Supply chain, build methodology, temporal
Training and education
●Tenancy
Resources, security, and configuration
•Talk with Red Hat container experts at booth #409
•Follow our blogs:
http://rhelblog.redhat.com/tag/containers/
https://blog.openshift.com/
•Connect with us:
Learn more
Red Hat Atomic
@RedHatAtomic
Scott McCarty
@fatherlinux
Sean Dilda Chris Collins
@ChrisInDurham
Remember to complete
your evaluations!
Thank you!

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Sec301 Security @ (Cloud) Scale
Sec301 Security @ (Cloud) ScaleSec301 Security @ (Cloud) Scale
Sec301 Security @ (Cloud) Scale
 
(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWS(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWS
 
Amazon CloudWatch Logs and AWS Lambda
Amazon CloudWatch Logs and AWS LambdaAmazon CloudWatch Logs and AWS Lambda
Amazon CloudWatch Logs and AWS Lambda
 
GitHub Enterprise 及運用 Codedeploy 實現自動化
GitHub Enterprise 及運用 Codedeploy 實現自動化GitHub Enterprise 及運用 Codedeploy 實現自動化
GitHub Enterprise 及運用 Codedeploy 實現自動化
 
Releasing Software Quickly and Reliably with AWS CodePipline
Releasing Software Quickly and Reliably with AWS CodePiplineReleasing Software Quickly and Reliably with AWS CodePipline
Releasing Software Quickly and Reliably with AWS CodePipline
 
Deep Dive on Elastic Load Balancing
Deep Dive on Elastic Load BalancingDeep Dive on Elastic Load Balancing
Deep Dive on Elastic Load Balancing
 
AWS re:Invent 2016: Large-Scale, Cloud-Based Analysis of Cancer Genomes: Less...
AWS re:Invent 2016: Large-Scale, Cloud-Based Analysis of Cancer Genomes: Less...AWS re:Invent 2016: Large-Scale, Cloud-Based Analysis of Cancer Genomes: Less...
AWS re:Invent 2016: Large-Scale, Cloud-Based Analysis of Cancer Genomes: Less...
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless Cloud
 
Serverless Summit 21 - Resilient serverless architecture on AWS
Serverless Summit 21 - Resilient serverless architecture on AWSServerless Summit 21 - Resilient serverless architecture on AWS
Serverless Summit 21 - Resilient serverless architecture on AWS
 
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...
Log Analytics with Amazon Elasticsearch Service and Amazon Kinesis - March 20...
 
Stream Processing in SmartNews #jawsdays
Stream Processing in SmartNews #jawsdaysStream Processing in SmartNews #jawsdays
Stream Processing in SmartNews #jawsdays
 
GitHub's Latest: Automation and More
GitHub's Latest: Automation and MoreGitHub's Latest: Automation and More
GitHub's Latest: Automation and More
 
ENT201 A Tale of Two Pizzas: Accelerating Software Delivery with AWS Develope...
ENT201 A Tale of Two Pizzas: Accelerating Software Delivery with AWS Develope...ENT201 A Tale of Two Pizzas: Accelerating Software Delivery with AWS Develope...
ENT201 A Tale of Two Pizzas: Accelerating Software Delivery with AWS Develope...
 
Automated DevOps Workflows with Chef on AWS
Automated DevOps Workflows with Chef on AWSAutomated DevOps Workflows with Chef on AWS
Automated DevOps Workflows with Chef on AWS
 
Configuration Management with AWS OpsWorks
Configuration Management with AWS OpsWorksConfiguration Management with AWS OpsWorks
Configuration Management with AWS OpsWorks
 
AWS re:Invent 2016: Application Lifecycle Management in a Serverless World (S...
AWS re:Invent 2016: Application Lifecycle Management in a Serverless World (S...AWS re:Invent 2016: Application Lifecycle Management in a Serverless World (S...
AWS re:Invent 2016: Application Lifecycle Management in a Serverless World (S...
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
 
Automated Governance of Your AWS Resources
Automated Governance of Your AWS ResourcesAutomated Governance of Your AWS Resources
Automated Governance of Your AWS Resources
 
AWS APAC Webinar Week - 2015 An Amazing Year in AWS
AWS APAC Webinar Week - 2015 An Amazing Year in AWSAWS APAC Webinar Week - 2015 An Amazing Year in AWS
AWS APAC Webinar Week - 2015 An Amazing Year in AWS
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
 

Destaque

Reference for Pawala Ariyathilaka (2)
Reference for Pawala Ariyathilaka (2)Reference for Pawala Ariyathilaka (2)
Reference for Pawala Ariyathilaka (2)
Pawala Ariyathilaka
 
SuccessFactors_WFA_Admin_Certification
SuccessFactors_WFA_Admin_CertificationSuccessFactors_WFA_Admin_Certification
SuccessFactors_WFA_Admin_Certification
Charmi Jilka
 
P3O - The Value Adding PMO - from Strategy to Projects
P3O - The Value Adding PMO - from Strategy to ProjectsP3O - The Value Adding PMO - from Strategy to Projects
P3O - The Value Adding PMO - from Strategy to Projects
Tony Vynckier
 

Destaque (18)

Ejercicio final de microsoft word
Ejercicio final de microsoft wordEjercicio final de microsoft word
Ejercicio final de microsoft word
 
PHP, Arrays & Functional Programming
PHP, Arrays & Functional ProgrammingPHP, Arrays & Functional Programming
PHP, Arrays & Functional Programming
 
Casos Aprobados 1543 - 08 de octubre 2014
Casos Aprobados 1543 - 08 de octubre 2014Casos Aprobados 1543 - 08 de octubre 2014
Casos Aprobados 1543 - 08 de octubre 2014
 
Reference for Pawala Ariyathilaka (2)
Reference for Pawala Ariyathilaka (2)Reference for Pawala Ariyathilaka (2)
Reference for Pawala Ariyathilaka (2)
 
Fungsi neuroendokrin
Fungsi neuroendokrin Fungsi neuroendokrin
Fungsi neuroendokrin
 
SuccessFactors_WFA_Admin_Certification
SuccessFactors_WFA_Admin_CertificationSuccessFactors_WFA_Admin_Certification
SuccessFactors_WFA_Admin_Certification
 
Microservices With SenecaJS
Microservices With SenecaJSMicroservices With SenecaJS
Microservices With SenecaJS
 
La recherche de l'efficience - Lectra
La recherche de l'efficience - LectraLa recherche de l'efficience - Lectra
La recherche de l'efficience - Lectra
 
Abstracción geometria y proporciones
Abstracción geometria y proporciones Abstracción geometria y proporciones
Abstracción geometria y proporciones
 
Certificados Locutor Acta 6
Certificados Locutor Acta 6Certificados Locutor Acta 6
Certificados Locutor Acta 6
 
Certificados Locutor Acta 1
Certificados Locutor Acta 1Certificados Locutor Acta 1
Certificados Locutor Acta 1
 
Certificados Locutor Acta 20
Certificados Locutor Acta 20Certificados Locutor Acta 20
Certificados Locutor Acta 20
 
Certificados Locutor Acta 10
Certificados Locutor Acta 10Certificados Locutor Acta 10
Certificados Locutor Acta 10
 
P3O - The Value Adding PMO - from Strategy to Projects
P3O - The Value Adding PMO - from Strategy to ProjectsP3O - The Value Adding PMO - from Strategy to Projects
P3O - The Value Adding PMO - from Strategy to Projects
 
Database Consolidation using Oracle Multitenant
Database Consolidation using Oracle MultitenantDatabase Consolidation using Oracle Multitenant
Database Consolidation using Oracle Multitenant
 
1 corinthians 13
1 corinthians 131 corinthians 13
1 corinthians 13
 
使用 AWS Step Functions 開發 Serverless 服務
使用 AWS Step Functions 開發 Serverless 服務使用 AWS Step Functions 開發 Serverless 服務
使用 AWS Step Functions 開發 Serverless 服務
 
Introduction à Twitter
Introduction à TwitterIntroduction à Twitter
Introduction à Twitter
 

Semelhante a (DVO311) Containers, Red Hat & AWS For Extreme IT Agility

Evolving Your Distributed Cache In A Continuous Delivery World: Tyler Vangorder
Evolving Your Distributed Cache In A Continuous Delivery World: Tyler VangorderEvolving Your Distributed Cache In A Continuous Delivery World: Tyler Vangorder
Evolving Your Distributed Cache In A Continuous Delivery World: Tyler Vangorder
Redis Labs
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
Black Duck by Synopsys
 

Semelhante a (DVO311) Containers, Red Hat & AWS For Extreme IT Agility (20)

Kubernetes, Toolbox to fail or succeed for beginners - Demi Ben-Ari, VP R&D @...
Kubernetes, Toolbox to fail or succeed for beginners - Demi Ben-Ari, VP R&D @...Kubernetes, Toolbox to fail or succeed for beginners - Demi Ben-Ari, VP R&D @...
Kubernetes, Toolbox to fail or succeed for beginners - Demi Ben-Ari, VP R&D @...
 
Journey to the devops automation with docker kubernetes and openshift
Journey to the devops automation with docker kubernetes and openshiftJourney to the devops automation with docker kubernetes and openshift
Journey to the devops automation with docker kubernetes and openshift
 
Docker Enterprise Deployment Planning
Docker Enterprise Deployment PlanningDocker Enterprise Deployment Planning
Docker Enterprise Deployment Planning
 
Strategy, planning and governance for enterprise deployments of containers - ...
Strategy, planning and governance for enterprise deployments of containers - ...Strategy, planning and governance for enterprise deployments of containers - ...
Strategy, planning and governance for enterprise deployments of containers - ...
 
Containers: DevOp Enablers of Technical Solutions
Containers: DevOp Enablers of Technical SolutionsContainers: DevOp Enablers of Technical Solutions
Containers: DevOp Enablers of Technical Solutions
 
Top 5 benefits of docker
Top 5 benefits of dockerTop 5 benefits of docker
Top 5 benefits of docker
 
Demystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data ScientistsDemystifying Containerization Principles for Data Scientists
Demystifying Containerization Principles for Data Scientists
 
An Introduction to Docker
An Introduction to DockerAn Introduction to Docker
An Introduction to Docker
 
Docker?!?! But I'm a SysAdmin
Docker?!?! But I'm a SysAdminDocker?!?! But I'm a SysAdmin
Docker?!?! But I'm a SysAdmin
 
Dockers and kubernetes
Dockers and kubernetesDockers and kubernetes
Dockers and kubernetes
 
Tampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday DockerTampere Docker meetup - Happy 5th Birthday Docker
Tampere Docker meetup - Happy 5th Birthday Docker
 
Docker & aPaaS: Enterprise Innovation and Trends for 2015
Docker & aPaaS: Enterprise Innovation and Trends for 2015Docker & aPaaS: Enterprise Innovation and Trends for 2015
Docker & aPaaS: Enterprise Innovation and Trends for 2015
 
Webinar Docker Tri Series
Webinar Docker Tri SeriesWebinar Docker Tri Series
Webinar Docker Tri Series
 
Evolving Your Distributed Cache In A Continuous Delivery World: Tyler Vangorder
Evolving Your Distributed Cache In A Continuous Delivery World: Tyler VangorderEvolving Your Distributed Cache In A Continuous Delivery World: Tyler Vangorder
Evolving Your Distributed Cache In A Continuous Delivery World: Tyler Vangorder
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
IAU workshop 2018 day one
IAU workshop 2018 day oneIAU workshop 2018 day one
IAU workshop 2018 day one
 
Containers - Portable, repeatable user-oriented application delivery. Build, ...
Containers - Portable, repeatable user-oriented application delivery. Build, ...Containers - Portable, repeatable user-oriented application delivery. Build, ...
Containers - Portable, repeatable user-oriented application delivery. Build, ...
 
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
Drupal Dev Days Vienna 2023 - What is the secure software supply chain and th...
 
Docker handons-workshop-for-charity
Docker handons-workshop-for-charityDocker handons-workshop-for-charity
Docker handons-workshop-for-charity
 
Is Docker Secure?
Is Docker Secure?Is Docker Secure?
Is Docker Secure?
 

Mais de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

(DVO311) Containers, Red Hat & AWS For Extreme IT Agility

  • 1. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DVO311 Learn How to Use Containers, Red Hat, and AWS to Achieve Extreme IT Agility and Combat Network Exploits Sean Dilda Senior Automation Engineer Duke University Chris Collins Senior Linux System Administrator Duke University Scott McCarty Container Technical Evangelist Red Hat
  • 2. What to Expect from the Session In this session, you will learn: •Where containers provide real value •How Duke University use containers Combatting a Denial of Service (DoS) attack Identity management Research computing •How to address common container adoption challenges •Key recommendations for working with containers
  • 3. REAL VALUE OF CONTAINERS
  • 4. Containers Deliver Many Benefits Base: 171 IT and Developer/programmer decision-makers at companies with 500+ employees in APAC, EMEA, and NA Source: A commissioned study conducted by Forrester Consulting on behalf of Red Hat, January, 2015
  • 6. Adoption Patterns PACKAGE AND SHIP MONOLITHIC APPS MIGRATE DIFFERENTIATING APPS TO CLOUD PACKAGE AND SHIP CLOUD-READY APPS
  • 7. PROBLEM ●DDoS attack targeting Duke.edu ●Flooding load balancers ●All load-balanced services impacted ●Duke.edu down Real-world Example #1: Combatting a Denial of Service Attack SOLUTION ●Duke.edu container image ●AWS Docker hosts ●External DNS for duke.edu pointed to AWS ●Internal traffic kept inside Duke THE RESULT ●Duke.edu unaffected for internal customers ●Duke.edu traffic handled by AWS for external customers/DDoS ●30-minute migration! ●Attack removed from load balancers ●Other load-balanced services back to normal
  • 8. PROBLEM ●Legacy IDM apps ●Unpredictable behavior after patching ●Result: Infrequent patching ●Inability to easily upgrade ●Result: Ancient hardware Real-world Example #2: Internet Download Manager (IDM) in a Container SOLUTION ●Build IDM apps in containers ●Jenkins builds every 4 hours w/latest patches ●Automated testing notifies of failures ●Last “known good” image kept THE RESULT ●“Known good” image always available; uptime assured ●Breaking patches can be investigated while “known good” images are kept in use ●Extremely portable ●Hardware independent ●Other environment can be set up, tested, torn down in minutes
  • 9. PROBLEM ●Researchers want custom tool chains ●IT wants researchers on shared infrastructure ●Researchers need to be able to reproduce/share environment Real-world Example #3: Research Computing Serving Up Multiple Stacks SOLUTION ●Run every job in a custom Docker- formatted container ●Keep archive of old container images with log of which version was used for which job run THE RESULT ●Self service: Researchers at Duke are starting to build their own Docker-formatted container images to run their analysis
  • 10. THE REALITY OF ADOPTING CONTAINERS: WHAT ARE THE TOP CHALLENGES?
  • 11. Top Challenges by Container Users Base: 171 IT and Developer/programmer decision-makers at companies with 500+ employees in APAC, EMEA, and NA Source: A commissioned study conducted by Forrester Consulting on behalf of Red Hat, January, 2015
  • 12. TECHNOLOGY Challenges Duke Is Seeing PROCESS/STRATEGIC
  • 13. CONTAINING THE MOST INTERESTING APPLICATION IN THE WORLD
  • 14. The Reality: Security Implications
  • 15. Security Inside the Container ●High vulnerabilities: ShellShock (bash), Heartbleed (OpenSSL), etc. ●Medium vulnerabilities: Poodle (OpenSSL), etc. ●Low vulnerabilities: gcc: array memory allocations could cause integer overflow 36% of official images available for download contain high-priority security vulnerabilities Source: Over 30% of Official Images in Docker Hub Contain High Priority Security Vulnerabilities, Jayanth Gummaraju, Tarun Desikan, and Yoshio Turner, BanyanOps, May 2015 (http://www.banyanops.com/pdf/BanyanOps-AnalyzingDockerHub-WhitePaper.pdf)
  • 16. And That's Why the Ops Guy Is Freaking Out
  • 17. Container Host & Container Image UNTRUSTED ●Will what’s inside the containers compromise your infrastructure? ●How and when will apps and libraries be updated? ●Will it work from host to host? RED HAT CERTIFIED ●Trusted source for the host and the containers ●Trusted content inside the container with security fixes available as part of an enterprise lifecycle ●Portability across hosts ●Container Development Kit ●Certification as a service ●Certification catalog ●Red Hat Container Registry HOST OS CONTAINER OS RUNTIME APP HOST OS CONTAINER OS RUNTIME APP
  • 19. TRUST PORTABILITY COMPREHENSIVE Red Hat’s Container Strategy
  • 20. Start Small, but Think Big: Advanced Tools & Planning portability across environments PHYSICAL VIRTUAL PRIVATE CLOUD PUBLIC CLOUD portability across platforms
  • 21. A Word of Advice ●Adoption Patterns Start small for quick wins Top-down approach for confidence Advanced management tools Single vs. multiple containers Portability ●Trust Supply chain, build methodology, temporal Training and education ●Tenancy Resources, security, and configuration
  • 22. •Talk with Red Hat container experts at booth #409 •Follow our blogs: http://rhelblog.redhat.com/tag/containers/ https://blog.openshift.com/ •Connect with us: Learn more Red Hat Atomic @RedHatAtomic Scott McCarty @fatherlinux Sean Dilda Chris Collins @ChrisInDurham