SlideShare uma empresa Scribd logo
1 de 40
Baixar para ler offline
Bringing Together the Core Fundamentals
of Distributed Systems
Kevin Jones @webopsx
11-5-2015
A Little about me
2
• My name is Kevin Jones
• Currently working as Sales Engineer for NGINX, Inc
• Previously worked as an SRE for YP - yellowpages.com
• Experience with production operations, large scale infrastructure and
automation
• Enjoy meeting new people, music and learning new technology
Objectives
3
• What is a Distributed System?
• What makes a Distributed System efficient and reliable?
• What are some of the core fundamentals of Distributed Systems and what
makes them great characteristics to implement in other areas of your IT
infrastructure?
• What qualities does NGINX have that reflect some of these core fundamentals
and how can NGINX help strengthen and improve your existing IT
infrastructure?
• Q&A
What Is a Distributed System?
4
5
• A program… is the code you write.
• A process… is what you get when you run it.
• A message… is used to communicate between processes.
• A packet… is a fragment of a message on a wire.
• A protocol… is a formal description of a message and its rules it must follow
in order to exchange those messages.
• A network… is the infrastructure that links computers, workstations, terminals
etc together.
• A component… can be a process or any piece of hardware required to run a
process.
Lets go back to the basics…
6
Therefore…
• A distributed system… is an application that executes a
collection of protocols to coordinate the actions of multiple
processes on a network, such that all components cooperate
together to perform a single or small set of related tasks.
What Makes a Distributed System Efficient and Reliable?
7
• Scalable
• High Performing
• Highly Available
• Transparent
• Open
• Secure
It should be…
8
The ability of a system, network, or process, to handle a growing amount of work in a capable 
manner or its ability to be enlarged to accommodate that growth.
Scalability
9
• Plan for the future
• Think about user experience
• Start with thinking about SCALE!
Distributed Geometric Availability When Needed
10
• Number of machines
• Number of users
• Number of tasks
• Connections or concurrency
Dealing with the Size of Your Infrastructure
11
• Cost of maintenance
• Efficiency of maintenance
Administration and Dealing with
Maintenance of Systems
12
Characterized by the amount of useful work accomplished by a computer system compared to
the time and resources that are used.
Performance
13
Latency is the state of being latent; delay, a period between the initiation of
something and the occurrence.
14
Latent in latin terms means “hidden”. Existing or present but concealed or
inactive.
15
What Are the Characteristics of High Performance?
• Short response time or low latency
• High throughput or rate of processing work
• Low utilization of computing resources
16
The proportion of time a system is in a functioning condition. If a user cannot access the
system, it is said to be down.
Availability
17
• Designing for failure
• Identifying weak points
• Implementing redundancy
High Availability Is All about Being Fault Tolerant
18
• Network outages across the wire or inside your own private network
• Outages of other third party services or dependencies
• Anything that is out of control of the designer
Some Things Are out of Your Control
19
Any form of a distributed system should hide its distributed nature from its users, appearing
and functioning as a normal centralized system.
Transparency
There Are Many Types of Transparencies in Distributed Systems
20
• Access - one single way to access
• Location - no matter where the user is
• Migration - physical location
• Relocation - moving of resources
• Replication - appear as a single resource
• Concurrent - competing for resources
• Failure - try to hide failure to the user
• Persistence - whether volatile or permanent
• Security - minimum user intervention
21
This determines whether the system can be extended in various ways without disrupting
existing systems or services and be able to easily interact with other open services.
Openness
22
• Conform to well-defined interfaces
• Support portability of applications
• Easily interoperate with other services
To Keep Your Distributed System Open It Must…
23
The system should authenticate access to data and services,
be invulnerable to know threats and follow industry standard security guidelines.
Secureness
24
• Security Audits
• Software patching maintenance or vulnerability management
• Try to use a security framework
• Encryption everywhere
• Integrity checking (Auth)
• Confidentiality through authorization (Resource Access)
• Monitoring of traffic, logins and requests
Common Measures to Help with Security
25
ALL of them!
Which of These Core Fundamentals Can Be Implemented
in Other Areas of Your IT infrastructure?
26
Many of these characteristics can be found in NGINX and can even help you
strengthen your existing IT infrastructure.
27
Quick Intro to NGINX
• Open source version created in 2004
• NGINX, Inc. founded in 2011
• 140 million + known instances running
today on the internet
• #1 web server of choice on the top 100,000
busiest sites
Igor Sysoev, NGINX creator and founder
28
Load Balancer
Web Server
Reverse Proxy
Content Cache
29
Scalability
NGINX - Open Source
Layer 7 Software Load Balancer for HTTP(S) / TCP
Application Delivery Platform
API Gateway
10,000+ Virtual Servers Multi-tenancy
NGINX Plus - Commercial
Real Time Activity Monitoring API (status)
Dynamic Upstream Reconfiguration API (upstream_conf)
30
NGINX Plus Real Time Activity Monitoring
31
QUICK DEMO
32
Performance
NGINX - Open Source
High Throughput
High Number of Concurrent Connections (1 Million+)
Content Caching at Edge
Low CPU/Memory Utilization
Fine Tunable Configuration
HTTP2!!!
33
HTTP(S) / TCP
34
Availability
NGINX - Open Source
HA Configurable with keepalived
(IP Syncronization over VRRP)
NGINX Plus - Commercial
NGINX HA Package for Easy Configuration
Application Aware Health Checks for Upstreams
35
Transparency
NGINX - Open Source
Combined with Global DNS Can Handle
Global Load Balancing (Route53, Google, GoDaddy etc)
Reverse Proxy - Single Entry Point
NGINX Plus - Commercial
Session Persistence (Cookie, Session, Route)
36
Openness
NGINX - Open Source
Open Source / Third Party Modules
nginScript - JavaScript Inside NGINX Configurations
Dynamic Loadable Modules COMING SOON!
NGINX Plus - Commercial
Simple HTTP Based APIs
API with JSON Interface
37
{
"version":6,
"nginx_version":"1.9.5",
“address”:”127.0.0.1",
"generation":12,
"load_timestamp":1446285600278,
"timestamp":1446705526537,
"pid":92676,
"processes":{
"respawned":0
},
"connections":{
"accepted":11441510,
"dropped":0,
"active":4,
"idle":30
},
"ssl":{
"handshakes":57921,
"handshakes_failed":9497,
"session_reuses":11987
},
NGINX Plus Monitoring JSON API
38
Secureness
NGINX - Open Source
Authentication via auth_request Module
SSL Support
Client Certificate Based Authentication Support
Bandwidth Limiting
Connection Limiting
Access Control Lists (ACLs)
LDAP Support
Reverse Proxy - Easily ACL Backend Resources
NGINX Plus - Commercial
NTLM Support
39
Thank you all again for coming!
Twitter @webopsx
Kevin Jones
http://www.slideshare.net/KevinJones62
Q&A?
40
http://www.aosabook.org/en/distsys.html

http://arxiv.org/pdf/0911.4395v1.pdf 

http://book.mixu.net/distsys/ 

http://the-paper-trail.org/blog/distributed-systems-theory-for-the-distributed-systems-engineer/ 

http://www.fit.vutbr.cz/~rabj/pdie/lecture_1.pdf 

http://www.cl.cam.ac.uk/~jac22/books/ods/ods/node18.html 

http://www.hpcs.cs.tsukuba.ac.jp/~tatebe/lecture/h23/dsys/dsd-tutorial.html 

http://cse.csusb.edu/tongyu/courses/cs660/notes/chap1.php 

http://www.opengroup.org/cloud/cloud/cloud_iop/cloud_port.htm 

http://www.toptal.com/security/10-most-common-web-security-vulnerabilities 

http://arxiv.org/pdf/1211.2032.pdf 

https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html

http://nginx.org/en/docs/ 

http://www.aosabook.org/en/nginx.html 

https://www.nginx.com/resources/admin-guide/ 

https://www.nginx.com/blog/nginx-plus-authenticate-users/
References

Mais conteúdo relacionado

Mais procurados

Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
LiveAction Next Generation Network Management Software
 

Mais procurados (20)

Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and MicroservicesAccelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
New Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization ProtocolsNew Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization Protocols
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
MQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsMQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfalls
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure security
 
Lightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTTLightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTT
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network Virtualization
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encrypted
 
The Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on SecurityThe Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on Security
 
SDN-Security
SDN-SecuritySDN-Security
SDN-Security
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 

Destaque

The 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century SkillsThe 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century Skills
Liberty Gavas
 

Destaque (14)

Rss
RssRss
Rss
 
OKURA hotel Amsterdam
OKURA hotel AmsterdamOKURA hotel Amsterdam
OKURA hotel Amsterdam
 
Deploying NGINX Plus with Ansible
Deploying NGINX Plus with AnsibleDeploying NGINX Plus with Ansible
Deploying NGINX Plus with Ansible
 
The 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century SkillsThe 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century Skills
 
Presentacion de rss
Presentacion de rssPresentacion de rss
Presentacion de rss
 
Real madrid jmgm
Real madrid jmgmReal madrid jmgm
Real madrid jmgm
 
Medicare 1II
Medicare 1IIMedicare 1II
Medicare 1II
 
Lectores rss
Lectores rssLectores rss
Lectores rss
 
Med supppresentation
Med supppresentationMed supppresentation
Med supppresentation
 
Barlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parteBarlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parte
 
Cuales son las diapositivas
Cuales son las diapositivasCuales son las diapositivas
Cuales son las diapositivas
 
Vascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicionVascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicion
 
Boca y contenido
Boca y contenidoBoca y contenido
Boca y contenido
 
Habilidades gerenciales
Habilidades gerenciales Habilidades gerenciales
Habilidades gerenciales
 

Semelhante a Ricon 2015 final

Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
Lahav Savir
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705
Miguel Vidal
 

Semelhante a Ricon 2015 final (20)

Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxChapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
 
Manging Container Deployments at Scale
Manging Container Deployments at ScaleManging Container Deployments at Scale
Manging Container Deployments at Scale
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is king
 
Introduction
IntroductionIntroduction
Introduction
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud Computing
 
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
 
Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016
 
Benefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centersBenefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centers
 
Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices
 
DEVNET-1117 Open Source DevCenter Launched within DevNet
DEVNET-1117	Open Source DevCenter Launched within DevNetDEVNET-1117	Open Source DevCenter Launched within DevNet
DEVNET-1117 Open Source DevCenter Launched within DevNet
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
 
2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation
 
Microservices: Yes or not?
Microservices: Yes or not?Microservices: Yes or not?
Microservices: Yes or not?
 
Microservices Architecture
Microservices ArchitectureMicroservices Architecture
Microservices Architecture
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705
 
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
 

Mais de Kevin Jones

Mais de Kevin Jones (8)

DockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINXDockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINX
 
Using NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes IngressUsing NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes Ingress
 
High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINX
 
Using NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content CacheUsing NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content Cache
 
NGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern WebNGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern Web
 
Accelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINXAccelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINX
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX Plus
 
Load Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterLoad Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS Cluster
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Ricon 2015 final

  • 1. Bringing Together the Core Fundamentals of Distributed Systems Kevin Jones @webopsx 11-5-2015
  • 2. A Little about me 2 • My name is Kevin Jones • Currently working as Sales Engineer for NGINX, Inc • Previously worked as an SRE for YP - yellowpages.com • Experience with production operations, large scale infrastructure and automation • Enjoy meeting new people, music and learning new technology
  • 3. Objectives 3 • What is a Distributed System? • What makes a Distributed System efficient and reliable? • What are some of the core fundamentals of Distributed Systems and what makes them great characteristics to implement in other areas of your IT infrastructure? • What qualities does NGINX have that reflect some of these core fundamentals and how can NGINX help strengthen and improve your existing IT infrastructure? • Q&A
  • 4. What Is a Distributed System? 4
  • 5. 5 • A program… is the code you write. • A process… is what you get when you run it. • A message… is used to communicate between processes. • A packet… is a fragment of a message on a wire. • A protocol… is a formal description of a message and its rules it must follow in order to exchange those messages. • A network… is the infrastructure that links computers, workstations, terminals etc together. • A component… can be a process or any piece of hardware required to run a process. Lets go back to the basics…
  • 6. 6 Therefore… • A distributed system… is an application that executes a collection of protocols to coordinate the actions of multiple processes on a network, such that all components cooperate together to perform a single or small set of related tasks.
  • 7. What Makes a Distributed System Efficient and Reliable? 7 • Scalable • High Performing • Highly Available • Transparent • Open • Secure It should be…
  • 9. 9 • Plan for the future • Think about user experience • Start with thinking about SCALE! Distributed Geometric Availability When Needed
  • 10. 10 • Number of machines • Number of users • Number of tasks • Connections or concurrency Dealing with the Size of Your Infrastructure
  • 11. 11 • Cost of maintenance • Efficiency of maintenance Administration and Dealing with Maintenance of Systems
  • 12. 12 Characterized by the amount of useful work accomplished by a computer system compared to the time and resources that are used. Performance
  • 13. 13 Latency is the state of being latent; delay, a period between the initiation of something and the occurrence.
  • 14. 14 Latent in latin terms means “hidden”. Existing or present but concealed or inactive.
  • 15. 15 What Are the Characteristics of High Performance? • Short response time or low latency • High throughput or rate of processing work • Low utilization of computing resources
  • 16. 16 The proportion of time a system is in a functioning condition. If a user cannot access the system, it is said to be down. Availability
  • 17. 17 • Designing for failure • Identifying weak points • Implementing redundancy High Availability Is All about Being Fault Tolerant
  • 18. 18 • Network outages across the wire or inside your own private network • Outages of other third party services or dependencies • Anything that is out of control of the designer Some Things Are out of Your Control
  • 19. 19 Any form of a distributed system should hide its distributed nature from its users, appearing and functioning as a normal centralized system. Transparency
  • 20. There Are Many Types of Transparencies in Distributed Systems 20 • Access - one single way to access • Location - no matter where the user is • Migration - physical location • Relocation - moving of resources • Replication - appear as a single resource • Concurrent - competing for resources • Failure - try to hide failure to the user • Persistence - whether volatile or permanent • Security - minimum user intervention
  • 21. 21 This determines whether the system can be extended in various ways without disrupting existing systems or services and be able to easily interact with other open services. Openness
  • 22. 22 • Conform to well-defined interfaces • Support portability of applications • Easily interoperate with other services To Keep Your Distributed System Open It Must…
  • 23. 23 The system should authenticate access to data and services, be invulnerable to know threats and follow industry standard security guidelines. Secureness
  • 24. 24 • Security Audits • Software patching maintenance or vulnerability management • Try to use a security framework • Encryption everywhere • Integrity checking (Auth) • Confidentiality through authorization (Resource Access) • Monitoring of traffic, logins and requests Common Measures to Help with Security
  • 25. 25 ALL of them! Which of These Core Fundamentals Can Be Implemented in Other Areas of Your IT infrastructure?
  • 26. 26 Many of these characteristics can be found in NGINX and can even help you strengthen your existing IT infrastructure.
  • 27. 27 Quick Intro to NGINX • Open source version created in 2004 • NGINX, Inc. founded in 2011 • 140 million + known instances running today on the internet • #1 web server of choice on the top 100,000 busiest sites Igor Sysoev, NGINX creator and founder
  • 28. 28 Load Balancer Web Server Reverse Proxy Content Cache
  • 29. 29 Scalability NGINX - Open Source Layer 7 Software Load Balancer for HTTP(S) / TCP Application Delivery Platform API Gateway 10,000+ Virtual Servers Multi-tenancy NGINX Plus - Commercial Real Time Activity Monitoring API (status) Dynamic Upstream Reconfiguration API (upstream_conf)
  • 30. 30 NGINX Plus Real Time Activity Monitoring
  • 32. 32 Performance NGINX - Open Source High Throughput High Number of Concurrent Connections (1 Million+) Content Caching at Edge Low CPU/Memory Utilization Fine Tunable Configuration HTTP2!!!
  • 34. 34 Availability NGINX - Open Source HA Configurable with keepalived (IP Syncronization over VRRP) NGINX Plus - Commercial NGINX HA Package for Easy Configuration Application Aware Health Checks for Upstreams
  • 35. 35 Transparency NGINX - Open Source Combined with Global DNS Can Handle Global Load Balancing (Route53, Google, GoDaddy etc) Reverse Proxy - Single Entry Point NGINX Plus - Commercial Session Persistence (Cookie, Session, Route)
  • 36. 36 Openness NGINX - Open Source Open Source / Third Party Modules nginScript - JavaScript Inside NGINX Configurations Dynamic Loadable Modules COMING SOON! NGINX Plus - Commercial Simple HTTP Based APIs API with JSON Interface
  • 38. 38 Secureness NGINX - Open Source Authentication via auth_request Module SSL Support Client Certificate Based Authentication Support Bandwidth Limiting Connection Limiting Access Control Lists (ACLs) LDAP Support Reverse Proxy - Easily ACL Backend Resources NGINX Plus - Commercial NTLM Support
  • 39. 39 Thank you all again for coming! Twitter @webopsx Kevin Jones http://www.slideshare.net/KevinJones62 Q&A?
  • 40. 40 http://www.aosabook.org/en/distsys.html http://arxiv.org/pdf/0911.4395v1.pdf http://book.mixu.net/distsys/ http://the-paper-trail.org/blog/distributed-systems-theory-for-the-distributed-systems-engineer/ http://www.fit.vutbr.cz/~rabj/pdie/lecture_1.pdf http://www.cl.cam.ac.uk/~jac22/books/ods/ods/node18.html http://www.hpcs.cs.tsukuba.ac.jp/~tatebe/lecture/h23/dsys/dsd-tutorial.html http://cse.csusb.edu/tongyu/courses/cs660/notes/chap1.php http://www.opengroup.org/cloud/cloud/cloud_iop/cloud_port.htm http://www.toptal.com/security/10-most-common-web-security-vulnerabilities http://arxiv.org/pdf/1211.2032.pdf https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html http://nginx.org/en/docs/ http://www.aosabook.org/en/nginx.html https://www.nginx.com/resources/admin-guide/ https://www.nginx.com/blog/nginx-plus-authenticate-users/ References