f5 in five: the emergence of · f5 in five: the emergence of the cloud edge joel moses sr....

Post on 05-Apr-2020

4 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

F5 in Five: The Emergence of the Cloud EdgeJoel Moses Sr. Director, Solution Engineering

What Is the Cloud Edge?

What Is the Cloud Edge?(But first… history class!)

© 2016 F5 Networks

The Gold Rush!

4

© 2016 F5 Networks

The Gold Rush!

(Not unlike the cloud…)4

© 2016 F5 Networks

A gold mine is a hole in the ground with a liar at the top.

Old Western Adage

5

© 2016 F5 Networks

“Properly Kitted”

7

© 2016 F5 Networks

“Properly Kitted”Not just picks and shovels!

7

© 2016 F5 Networks

“Properly Kitted”Not just picks and shovels!Miners needed to be well-equipped, while still being light enough to move quickly.

7

© 2016 F5 Networks

“Properly Kitted”Not just picks and shovels!Miners needed to be well-equipped, while still being light enough to move quickly.They needed to eat well enough to have the energy to keep digging.

7

© 2016 F5 Networks

“Properly Kitted”Not just picks and shovels!Miners needed to be well-equipped, while still being light enough to move quickly.They needed to eat well enough to have the energy to keep digging.In the middle of nowhere, they had to be able to recognize and react to emergencies with the right tools.

7

© 2016 F5 Networks

“Properly Kitted”Not just picks and shovels!Miners needed to be well-equipped, while still being light enough to move quickly.They needed to eat well enough to have the energy to keep digging.In the middle of nowhere, they had to be able to recognize and react to emergencies with the right tools.Protection from the constant attack of the weather was a priority.

7

The Cloud Edge

The Cloud Edge(Getting properly kitted)

© 2016 F5 Networks

Applications Are Transforming

9

© 2016 F5 Networks

Applications Are Transforming

• Top 100 CIOs* • Currently 71% hybrid • Expect Azure to

eclipse AWS by 2019 • Majority of workloads

in public cloud/IaaS by 2020

• Majority of AWS customers connect via colocation

The Future Is Cloudy

9

© 2016 F5 Networks

Applications Are Transforming

• Top 100 CIOs* • Currently 71% hybrid • Expect Azure to

eclipse AWS by 2019 • Majority of workloads

in public cloud/IaaS by 2020

• Majority of AWS customers connect via colocation

The Future Is Cloudy

• Modular application construction is now dominant

• Emergence of development integrated with operations

• Shared ownership of applications is beginning to take root

DevOps Is Rising

9

© 2016 F5 Networks

Applications Are Transforming

• Top 100 CIOs* • Currently 71% hybrid • Expect Azure to

eclipse AWS by 2019 • Majority of workloads

in public cloud/IaaS by 2020

• Majority of AWS customers connect via colocation

The Future Is Cloudy

• Modular application construction is now dominant

• Emergence of development integrated with operations

• Shared ownership of applications is beginning to take root

DevOps Is Rising

• Containerized “microservices” gaining popularity

• Orchestration is now a part of the application landscape • Docker, Kubernetes,

Mesos, OpenShift • Analytics now

commonly built into applications

Technology Is Changing

* Morgan Stanley 2016 CIO Analysis

9

© 2016 F5 Networks

Organizations Are Transforming

Desired attributes Predictable, stable, centralized

Key influencers NetOps, IT management, SecOps

Application types Packaged, regulated, compliant

Established IT (Mode 1)

Desired attributes Dynamic, agile, distributed

Key influencers Application teams, DevOps, cloud architects

Application types Born in the cloud, custom, web-based

Emerging IT (Mode 2)

* Derived from Gartner G00301285 (March 24th 2016)

10

© 2016 F5 Networks

Everyone’s Staking a Claim

DevOps

NetOps

VM

VMVMVM

VMVMVM

MSP Colocation

Private CloudApplication

Application

Corporate Data Center

Private Cloud

Silverline

DDoS

BIG-IP SecOps

FW

VMVMVM

VMVMVM

11

© 2016 F5 Networks

Everyone’s Staking a Claim

DevOps

NetOps

VM

VMVMVM

VMVMVM

MSP Colocation

Private CloudApplication

Application

Corporate Data Center

Private Cloud

Silverline

DDoS

BIG-IP SecOps

FW

VMVMVM

VMVMVM

11

© 2016 F5 Networks

Everyone’s Staking a Claim

DevOps

NetOps

VM

VMVMVM

VMVMVM

MSP Colocation

Private CloudApplication

Application

Corporate Data Center

Private Cloud

Silverline

DDoS

BIG-IP SecOps

FW

VMVMVM

VMVMVM

11

© 2016 F5 Networks

Everyone’s Staking a Claim

DevOps

NetOps

VM

VMVMVM

VMVMVM

MSP Colocation

Private CloudApplication

Application

Corporate Data Center

Private Cloud

Silverline

DDoS

BIG-IP SecOps

FW

VMVMVM

VMVMVM

11

© 2016 F5 Networks

Everyone’s Staking a Claim

DevOps

NetOps

VM

VMVMVM

VMVMVM

MSP Colocation

Private CloudApplication

Application

Corporate Data Center

Private Cloud

Silverline

DDoS

BIG-IP SecOps

FW

VMVMVM

VMVMVM

12

© 2016 F5 Networks

Everyone’s Staking a Claim

DevOps

NetOps

VM

VMVMVM

VMVMVM

MSP Colocation

Private CloudApplication

Application

Corporate Data Center

Private Cloud

Silverline

DDoS

BIG-IP SecOps

FW

VMVMVM

VMVMVMNew challenges • Lack of security policy controls • Poor visibility into application

health/transactions • Inconsistent application services • Wildly divergent APIs • Cloud “lock-in” • Need to keep critical data

(e.g., security certs) on-premises

12

© 2016 F5 Networks

And Some of the Old Lessons…

13

© 2016 F5 Networks

Latency Reliability ConsistencyVisibility

And Some of the Old Lessons…

13

© 2016 F5 Networks

Emergence of the Cloud Edge

14

© 2016 F5 Networks

Emergence of the Cloud Edge

Enterprise Data Center

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS

Enterprise Data Center

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

Common Services

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

Services that are applied to an application aren’t going away

Common Services

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

Services that are applied to an application aren’t going away

Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds

NEXT-GEN FW

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

Common Services

CACHING/ACCELERATION

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

Services that are applied to an application aren’t going away

Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds

Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center

NEXT-GEN FW

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

Common Services

CACHING/ACCELERATION

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

Services that are applied to an application aren’t going away

Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds

Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center

Traditio

nal

Virtuali

zed

Multi-T

enan

t

Cloud O

ptimize

d

Private Cloud Maturity Continuum

NEXT-GEN FW

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

Common Services

CACHING/ACCELERATION

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

Services that are applied to an application aren’t going away

Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds

Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center

Traditio

nal

Virtuali

zed

Multi-T

enan

t

Cloud O

ptimize

d

Private Cloud Maturity Continuum

NEXT-GEN FW

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

Common Services

CACHING/ACCELERATION

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

Services that are applied to an application aren’t going away

Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds

Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center

Traditio

nal

Virtuali

zed

Multi-T

enan

t

Cloud O

ptimize

d

Private Cloud Maturity Continuum

NEXT-GEN FW

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

Common Services

CACHING/ACCELERATION

14

© 2016 F5 Networks

Emergence of the Cloud Edge

SaaS Public

Enterprise Data Center

Services that are applied to an application aren’t going away

Some of these services are hard to replicate, control, or run cheaply enough inside on-demand clouds

Creation of a “cloud edge” is a way to equally and equitably service SaaS and public cloud with the same services common to the enterprise data center

Traditio

nal

Virtuali

zed

Multi-T

enan

t

Cloud O

ptimize

d

Private Cloud Maturity Continuum

NEXT-GEN FW

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

Common Services

CACHING/ACCELERATION

14

© 2016 F5 Networks

A Service In Depth

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

15

© 2016 F5 Networks

DATA LEAKAGE PREVENTION

A Service In Depth

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

15

© 2016 F5 Networks

DATA LEAKAGE PREVENTION

A Service In Depth

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

Security tools like DLP “weigh” a lot and require intensive compute resources.

DATA LEAKAGE PREVENTION

15

© 2016 F5 Networks

DATA LEAKAGE PREVENTION

A Service In Depth

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

Security tools like DLP “weigh” a lot and require intensive compute resources.

DLP tools often need to be engaged in specific ways that some environments don’t support (ICAP).

DATA LEAKAGE PREVENTION

15

© 2016 F5 Networks

DATA LEAKAGE PREVENTION

A Service In Depth

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

Security tools like DLP “weigh” a lot and require intensive compute resources.

DLP tools often need to be engaged in specific ways that some environments don’t support (ICAP).

Many of these tools require a lot of manual interaction and aren’t easy to orchestrate into place.

DATA LEAKAGE PREVENTION

15

© 2016 F5 Networks

DATA LEAKAGE PREVENTION

A Service In Depth

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

Security tools like DLP “weigh” a lot and require intensive compute resources.

DLP tools often need to be engaged in specific ways that some environments don’t support (ICAP).

Many of these tools require a lot of manual interaction and aren’t easy to orchestrate into place.

…No wonder why no one smiled in those old photos.

DATA LEAKAGE PREVENTION

15

© 2016 F5 Networks

Origin of the Cloud Edge

SaaS Public

Enterprise Data Center

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

16

© 2016 F5 Networks

Origin of the Cloud Edge

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

16

© 2016 F5 Networks

Origin of the Cloud Edge

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

Higher latency and higher cost links

16

© 2016 F5 Networks

Origin of the Cloud Edge

NEXT-GEN FW

CACHING/ACCELERATION

WEB APPLICATION FIREWALL

INTRUSION PREVENTION

DATA LEAKAGE PREVENTION

Higher latency and higher cost links

Lower latency and lower cost links

16

© 2016 F5 Networks

Origin of the Cloud Edge

Higher latency and higher cost links

Lower latency and lower cost links

16

What Are You Going to Give Me?

© 2016 F5 Networks

Deploy any application, anywhere, with consistent application services and security

Traditional Data Center

Private Cloud

CoLo/Public Cloud

Consistent Policies Cloud Freedom

Fastest Time to Service Visibility

Lowest TCO

Workload Migration Workload M

igration

SaaS Apps

Managed Hosting

F5 Cloud Vision

SaaS

SaaS

SaaS

SaaS

SaaS

DIRECT CONNECT

BIG-IP

AWSGoogle

Azure

IBM

Rackspace

18

© 2016 F5 Networks

Deploy any application, anywhere, with consistent application services and security

F5 Cloud Vision

SaaS

SaaS

SaaS

SaaS

SaaS

DIRECT CONNECT

BIG-IP

AWSGoogle

Azure

IBM

Rackspace

Service Center

18

© 2016 F5 Networks

FreedomTo deploy any application, anywhere, with consistent application services and security

Private Cloud

Public Cloud

SaaS Apps

Traditional Data Center

F5 Cloud Vision

SaaS

SaaS

SaaS

SaaS

SaaS

DIRECT CONNECT

BIG-IP

AWSGoogle

Azure

IBM

Rackspace

Service Center

SaaS SaaS

Silverline

19

© 2016 F5 Networks

FreedomTo deploy any application, anywhere, with consistent application services and security

Private Cloud

Public Cloud

SaaS Apps

Traditional Data Center

F5 Cloud Vision

SaaS

SaaS

SaaS

SaaS

SaaS

DIRECT CONNECT

BIG-IP

AWSGoogle

Azure

IBM

Rackspace

Service Center

SaaS SaaS

Silverline

Service Interconnect

19

© 2016 F5 Networks

F5 Private CloudSolution packages and ecosystem

Visualization and Analytics—Horizon, App-IQ

Orchestration—Heat, iWorkflow, Chef, Puppet

Programmability—iApps LX, iRules LX, SDK/Eclipse

Certifications—Red Hat, Mirantis

SI Partnerships—HP Helion, IBM Blue Box, others

BIG-IP VEs

F5 private cloud solution packages: engineered, tested, certified

Microsoft AzureStack

Microsoft AzureStack

OpenStack

VMware NSX

Cisco APIC

20

© 2016 F5 Networks

F5 Cloud Participation

21

© 2016 F5 Networks

F5 Cloud Participation

Provide a comfortable, well-instrumented environment for DevOps

21

© 2016 F5 Networks

F5 Cloud Participation

Provide a comfortable, well-instrumented environment for DevOpsSupport applications with delivery techniques that are sized and managed correctly for them

21

© 2016 F5 Networks

F5 Cloud Participation

Provide a comfortable, well-instrumented environment for DevOpsSupport applications with delivery techniques that are sized and managed correctly for themEnable true agility through adoption of a service catalog (iWorkflow)

21

© 2016 F5 Networks

F5 Cloud Participation

Provide a comfortable, well-instrumented environment for DevOpsSupport applications with delivery techniques that are sized and managed correctly for themEnable true agility through adoption of a service catalog (iWorkflow)Embrace the open source model and contribute back to the community

21

© 2016 F5 Networks

F5 Visibility Tools

22

© 2016 F5 Networks

F5 Visibility Tools

22

© 2016 F5 Networks

F5 Visibility Tools

22

© 2016 F5 Networks

F5 Visibility Tools

22

© 2016 F5 Networks

F5 Visibility Tools

22

© 2016 F5 Networks

Data Center and Cloud Strategy

Established IT Emerging/DevOps IT

23

Q&A

• Add class to your personal schedule.

• Survey will pop up in Mobile App. • Answer the multiple choice. • Submit your question to complete. • Receive 5 points!

Give Feedback – Get Points!

top related