SlideShare uma empresa Scribd logo
1 de 9
Catch Me If You Can
Outrunning Environmental Adversity with Intelligence
at all layers of the OSI Model
Introductions
• Merlin Glynn mglynn@pivotal.io
• Sean Keery skeery@pivotal.io
• Keith Strini kstrini@pivotal.io
• Special Shout out to Raymond Lee
(BDS Team)
What if we could improve performance
& respond to environmental adversity?
APT - A set of stealthy and continuous computer hacking processes,
often orchestrated by human(s) targeting a specific entity.
DDOS – an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or
indefinitely interrupt or suspend services of a host connected to the
Internet
Spectrum of cyber vulnerability from DDOS to APT
Quality of service
The overall performance of a computer network, particularly
the performance seen by the users of the network. To
quantitatively measure quality of service, several related
aspects of the network service are often considered, such as
error rates, bit rate, throughput, transmission delay,
availability, jitter, etc.
• Bosh
• CF
• SDN
DSL
Agents:
Actual State
Strategy:
Desired
State
Dynamic
Analysis
Environment
Models
Goals
(SLA)
Predictions
(Metrics)
DSL
Library
Learning
What this Continuous Improvement
over Environmental Adversity looks
like..…
responses
DSLDSL
DSLDSLDSL
Realize
<<no-outage>>
<<predictive>>
<<reliable>>
Project Environment
Use Cases for Demo
• DDOS -> Recognize foreign IP/Add ACL via NSX Rest API
• QoS -> Detect network throughput deficiency/Add 1 .. N routes
• APT -> Recognize foreign IP+Load/Alert Forensics Team
Spin up new CF foundation/subnet/data subnet access
Add new route
Remove forensic route
Shutdown data subnet access from forensic foundation
Goal: uninterrupted production traffic/UX
• DDIL -> Detect network throughput/Identify best cell net throughput
Move highest priority workloads to cell
Add additional service chaining IAW compliancy outlines to
edge
Add 1..n routes
Where do we go from here ….
• Ways to evaluate each
deployment
• Utilize the inherent abilities of
the distributed architecture
• Machine learning where each
distributed component
maintains state, manages itself
In Conclusion…Why Now?
• The cyber vulnerability problem is
imminent
• The operations, networking and
development teams are finally
becoming cohesive units
• The capacity to process, interpret
and act upon petascale data on any
IaaS
• All of this is can already be built into
the very core of the foundation now
– (Diego abstractions, SDN API, Predictive
and ML, Streams, Bosh-Enaml).
enaml.pezapp.io

Mais conteúdo relacionado

Destaque

BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...BrightEdge Technologies
 
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)ABDUL MAJID KANDHIR
 
Sexual Dysfunction Presentation
Sexual Dysfunction PresentationSexual Dysfunction Presentation
Sexual Dysfunction Presentationimagemakers
 
Transportation | Maritime & Trade
Transportation | Maritime & TradeTransportation | Maritime & Trade
Transportation | Maritime & TradeIHS Markit
 
Marine board pp17_microcean
Marine board pp17_microceanMarine board pp17_microcean
Marine board pp17_microceanRainu Rajeev
 
臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221phlib1 phlib1
 
Femilift Presentation
Femilift PresentationFemilift Presentation
Femilift Presentationimagemakers
 
Event Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scriptsEvent Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scriptsPeatix
 
zSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contactszSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contactsDevOps for Enterprise Systems
 
peran perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusiaperan perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusiaPT. SASA
 
Frank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller
 
Fundraising events and social media, how to #win
Fundraising events and social media, how to #winFundraising events and social media, how to #win
Fundraising events and social media, how to #winJonathan Waddingham
 
The Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google AnalyticsThe Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google AnalyticsBarry Feldman
 
Template Script for Emcees
Template Script for EmceesTemplate Script for Emcees
Template Script for EmceesBrian Ybañez
 

Destaque (16)

BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
BrightEdge Share15 - CM203: Scaling Content: Production, Process & Culture - ...
 
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
ABDUL MAJID KANDHIR (CIVIL INSPECTOR)
 
Sexual Dysfunction Presentation
Sexual Dysfunction PresentationSexual Dysfunction Presentation
Sexual Dysfunction Presentation
 
Transportation | Maritime & Trade
Transportation | Maritime & TradeTransportation | Maritime & Trade
Transportation | Maritime & Trade
 
The Gran Assumpteur v16
The Gran Assumpteur v16The Gran Assumpteur v16
The Gran Assumpteur v16
 
Marine board pp17_microcean
Marine board pp17_microceanMarine board pp17_microcean
Marine board pp17_microcean
 
臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221臺灣公共衛生促進協會簡介20161221
臺灣公共衛生促進協會簡介20161221
 
Femilift Presentation
Femilift PresentationFemilift Presentation
Femilift Presentation
 
Event Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scriptsEvent Hacks: 7 beginner tips for emcee scripts
Event Hacks: 7 beginner tips for emcee scripts
 
Hotel Renovation
Hotel RenovationHotel Renovation
Hotel Renovation
 
zSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contactszSystems Enterprise Digital Transformation Conference -IBM contacts
zSystems Enterprise Digital Transformation Conference -IBM contacts
 
peran perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusiaperan perikanan dalam kehidupan manusia
peran perikanan dalam kehidupan manusia
 
Frank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-CreationFrank Piller: Open Innovation & Customer Co-Creation
Frank Piller: Open Innovation & Customer Co-Creation
 
Fundraising events and social media, how to #win
Fundraising events and social media, how to #winFundraising events and social media, how to #win
Fundraising events and social media, how to #win
 
The Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google AnalyticsThe Content Marketer’s A to-Z Guide to Google Analytics
The Content Marketer’s A to-Z Guide to Google Analytics
 
Template Script for Emcees
Template Script for EmceesTemplate Script for Emcees
Template Script for Emcees
 

Semelhante a Catch Me If You Can - Cloud Foundry Summit Europe 2016

PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPROIDEA
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliMarta Pacyga
 
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scaleVelocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scaleMichael Kehoe
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it worldChris Dwan
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesMegan Eskey
 
Modern apps with dcos
Modern apps with dcosModern apps with dcos
Modern apps with dcosSam Chen
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxLeahRachael
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on JanetJisc
 
20-datacenter-measurements.pptx
20-datacenter-measurements.pptx20-datacenter-measurements.pptx
20-datacenter-measurements.pptxSteve491226
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA AutomationCisco Canada
 
Why we got to Docker
Why we got to DockerWhy we got to Docker
Why we got to Dockerallingeek
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersIben Rodriguez
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosStenio Fernandes
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationTejaswi Agarwal
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureFiras Alsayied
 

Semelhante a Catch Me If You Can - Cloud Foundry Summit Europe 2016 (20)

PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf AliPLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
PLNOG15 :DDOS Attacks & Collateral Damage. Can we avoid it? Asraf Ali
 
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scaleVelocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
Velocity San Jose 2017: Traffic shifts: Avoiding disasters at scale
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 
2015 04 bio it world
2015 04 bio it world2015 04 bio it world
2015 04 bio it world
 
Cloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational PerspectivesCloud Computing: Architecture, IT Security and Operational Perspectives
Cloud Computing: Architecture, IT Security and Operational Perspectives
 
cloud computing
cloud computingcloud computing
cloud computing
 
Modern apps with dcos
Modern apps with dcosModern apps with dcos
Modern apps with dcos
 
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptxUNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
UNIT 4 - UNDERSTANDING THE NETWORK ARCHITECTURE.pptx
 
Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival Brad stack - Digital Health and Well-Being Festival
Brad stack - Digital Health and Well-Being Festival
 
Design of network
Design of networkDesign of network
Design of network
 
Future services on Janet
Future services on JanetFuture services on Janet
Future services on Janet
 
20-datacenter-measurements.pptx
20-datacenter-measurements.pptx20-datacenter-measurements.pptx
20-datacenter-measurements.pptx
 
Cluster and Grid Computing
Cluster and Grid ComputingCluster and Grid Computing
Cluster and Grid Computing
 
Reducing Cost with DNA Automation
Reducing Cost with DNA AutomationReducing Cost with DNA Automation
Reducing Cost with DNA Automation
 
Why we got to Docker
Why we got to DockerWhy we got to Docker
Why we got to Docker
 
New Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data CentersNew Threats, New Approaches in Modern Data Centers
New Threats, New Approaches in Modern Data Centers
 
Big Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking ScenariosBig Data Analytics and Advanced Computer Networking Scenarios
Big Data Analytics and Advanced Computer Networking Scenarios
 
ICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference PublicationICRTITCS-2012 Conference Publication
ICRTITCS-2012 Conference Publication
 
Investigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a SecureInvestigation, Design and Implementation of a Secure
Investigation, Design and Implementation of a Secure
 

Último

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 

Último (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Catch Me If You Can - Cloud Foundry Summit Europe 2016

  • 1. Catch Me If You Can Outrunning Environmental Adversity with Intelligence at all layers of the OSI Model
  • 2. Introductions • Merlin Glynn mglynn@pivotal.io • Sean Keery skeery@pivotal.io • Keith Strini kstrini@pivotal.io • Special Shout out to Raymond Lee (BDS Team)
  • 3. What if we could improve performance & respond to environmental adversity? APT - A set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specific entity. DDOS – an attempt to make a machine or network resource unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet Spectrum of cyber vulnerability from DDOS to APT Quality of service The overall performance of a computer network, particularly the performance seen by the users of the network. To quantitatively measure quality of service, several related aspects of the network service are often considered, such as error rates, bit rate, throughput, transmission delay, availability, jitter, etc.
  • 4. • Bosh • CF • SDN DSL Agents: Actual State Strategy: Desired State Dynamic Analysis Environment Models Goals (SLA) Predictions (Metrics) DSL Library Learning What this Continuous Improvement over Environmental Adversity looks like..… responses DSLDSL DSLDSLDSL Realize <<no-outage>> <<predictive>> <<reliable>>
  • 6. Use Cases for Demo • DDOS -> Recognize foreign IP/Add ACL via NSX Rest API • QoS -> Detect network throughput deficiency/Add 1 .. N routes • APT -> Recognize foreign IP+Load/Alert Forensics Team Spin up new CF foundation/subnet/data subnet access Add new route Remove forensic route Shutdown data subnet access from forensic foundation Goal: uninterrupted production traffic/UX • DDIL -> Detect network throughput/Identify best cell net throughput Move highest priority workloads to cell Add additional service chaining IAW compliancy outlines to edge Add 1..n routes
  • 7. Where do we go from here …. • Ways to evaluate each deployment • Utilize the inherent abilities of the distributed architecture • Machine learning where each distributed component maintains state, manages itself
  • 8. In Conclusion…Why Now? • The cyber vulnerability problem is imminent • The operations, networking and development teams are finally becoming cohesive units • The capacity to process, interpret and act upon petascale data on any IaaS • All of this is can already be built into the very core of the foundation now – (Diego abstractions, SDN API, Predictive and ML, Streams, Bosh-Enaml).

Notas do Editor

  1. Bullet -> Reactive to Proactive Detecting and analyzing the running behavior Predicting the effect different strategic actions would have on the distributed system when real problems are detected. Bullet -> Intermittency is too fast How often data should be observed The criticality of which data should be sent through intermittent connections. Bullet -> Difficult to exploit opportunities Manual Bosh management of virtualized resources in a server cluster across any IaaS. The overall effect of degraded communications affecting degraded performance in managing the system The more intermittent the communication, the greater the effect on Bosh’s management performance
  2. Bullet -> Co-deploying Co-deploying analytics and the analytics platform within the foundation. System metrics via the fire hose transmits this data from the foundation Interpret those metrics and then select strategies defined in foundation relevant DSLs that provides courses of action (COAs) on how the network it rides on, should adapt to changes. Bullet -> Bosh Adds SDN Components Allow Bosh to add new SDN components dynamically through a process of discovery Bosh continuously would monitor. New components would need to be added to allow Bosh to dynamically reconfigure by providing metadata about those individual components. As the degraded performance was detected and the ability to interact with the degrading foundation fell below desired thresholds, Bosh would execute strategies to heal, adapt, optimize, and defend the system against similarly future degradations. Bullet-> Liberating the control plane from the data plane, SDN enables the foundation to truly adapt (at almost all layers of the OSI model) to changing environment and threat circumstances. “Continuous Advantage” makes it difficult to cause substantial damage without launching a full assault against the infrastructure. To take advantage of this inherent resiliency, we must evolve the ability to take advantage of the dynamic possibilities of SDN into the next phase, coupling it with Predictive Analytics and ML to fully optimize and self-protect the enterprises we are in charge of running.
  3. Bullet -> Evaluate the deployment Determine violations of constraints that were defined for the specific foundation. If anomalies are detected or SLAs violated, programmatically adapt the architecture. DSL based strategies matched and evaluated to determine the best approach to solving the SLA or mitigating the anomaly. Choose the strategy to execute that effects changes to the foundation. System metrics via the fire hose transmits this data from the foundation Interpret those metrics and then select strategies defined in foundation relevant DSLs that provides courses of action (COAs) on how the network it rides on, should adapt to changes. Bullet -> Utilize the distributed architecture Each distributed component would have a state in which it could manage itself Once connectivity was restored, report a total system health back to Bosh. No matter how disconnected the systems become, the foundation would still be able to function. The challenge is the limitation on globally optimizing the foundation to holistically address performance degradation. Bullet -> Machine Learning Size and complexity of Cloud Foundry enterprises are beginning to outstrip the ability of humans to understand and control the maintenance The speed required for effective network optimization is ever increasing. In particular this degradation of performance by predicting the future communication states of the system. To address the effects of degraded communications, metrics could be queried against real time analytics to predict the future state of the system. The predicted constraints could then reason on future state values. In this way, Bosh can anticipate events that would require adaptation and issue commands before they are needed. This pre-emptive strategy would allow the foundation to operate in degraded environments by issuing adaptive strategies in communication windows before they are needed. Such learning approaches can also be applied to make decisions based upon currently monitored states and can be used to detect anomalous operation such as hidden APTs, among other capabilities.