SlideShare ist ein Scribd-Unternehmen logo
1 von 23
© AKAMAI - EDGE 2017
Configs, Configs, Everywhere!
Limor Sinay
Ilia Bromberg
Les Waltman
© AKAMAI - EDGE 2017
Limor Sinay
Manager, Pre-Sales
Commerce East
Ilia Bromberg
Solution Engineer,
Commerce East
Les Waltman
Solution Engineer,
Emerging
Panel Introductions
© AKAMAI - EDGE 2017
WHY ARE YOU
WHERE YOU ARE?
© AKAMAI - EDGE 2017
Options to Consider
1. Consolidate Configurations
2. Using Variables
3. SaaS Provider Option
4. Dev Ops Approach (API/CLI)
© AKAMAI - EDGE 2017
Consolidate Configurations by Cloning Configs
Create a Template/Proto Config
• Could be with excessive
behaviors that may later be
customized or removed
Best Practices
• Establish team rules!
• You might not want everything
• Can’t always use Fast Activate
Cons
• Useful for set it and forget it
sites.
• Simple configurations only
• Still no easy way of maintaining
multiple configs with updates
© AKAMAI - EDGE 2017
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Using Variables
* Special thanks to Pierre Lermant
© AKAMAI - EDGE 2017
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Example: Hostname section, Production
● This section is different for each configuration
• For the test env., Property Hostname would read tst.mainsitedemo.com
● Everything else (all Variables and Rules) is the exact same for all
environments
© AKAMAI - EDGE 2017
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Example: Variable section
Note: you may want to set the PRD_ORIGIN variable to Hidden
© AKAMAI - EDGE 2017
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Example: Environment Specific Default rule
We grab first three
characters of
incoming hostname
and set the ENV
variable
© AKAMAI - EDGE 2017
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Example: Environment Specific Production child rule
We match the ENV
variable with “www”
and set origin
accordingly
© AKAMAI - EDGE 2017
Avoid data theft and downtime by extending the
security perimeter outside the data-center and
protect from increasing frequency, scale and
sophistication of web attacks.
Example: Override Test rule
Test environment
TTL override
© AKAMAI - EDGE 2017
Variable Configurations - summary
• Useful technique to add UAT / PROD / TST environments
along with WWW
• Requires a consistent naming convention being enforced
throughout organization
© AKAMAI - EDGE 2017
SaaS Provider Option
Automate onboards with SaaS Provider Option
SaaS Dynamic Origin: With the SaaS Provider Option, you can easily
configure a single rule or pattern that allows Akamai to discover the primary
origin data center serving your SaaS application for a particular SaaS
customer.
Reporting: SaaS-specific reports provide data about each of your SaaS
customers and their associated SaaS applications.
APIs: Using programmatic APIs, SaaS providers can
• Register new applications or customers (set up the valid IDs and
readable names for the ID used to define SaaS applications and
customers)
• Configure IP and/or Geo blocking settings
© AKAMAI - EDGE 2017
Configuring SaaS Dynamic Origin
Select the request component to use
when constructing the origin DNS
record.
Options include
Hostname: uses information contained in
the host header.
Path: uses information in the directory
structure (after the hostname).
Query String: uses information contained in
a query string parameter.
Cookie: uses information from a specific
cookie.
© AKAMAI - EDGE 2017
Configuring SaaS Definitions
Select the request component to use
when constructing the SaaS
customer, application, or user
identifier. Options include:
Path: (Default for customer and
application IDs) uses information in the
directory structure (after the hostname).
Hostname: uses information contained in
the host header.
Query String: uses information contained
in a query string parameter.
Cookie: uses information from a specific
cookie.
© AKAMAI - EDGE 2017
DevOps Approaches
• Programmatically control your configurations
• Akamai property configurations can be built or cloned as part of your CI-CD
workflow
• Configurations can be pragmatically removed when no longer required
• Remotely push configs to Staging or Production
• Version Akamai configurations with your versioning
• Tools: Property Manager API or Akamai CLI
© AKAMAI - EDGE 2017
Property Manager API (PAPI)
• Very flexible
• Can do most functions of
• Requires in-depth knowledge of Akamai structure and terminology
(contacts, groups, products, rule trees, etc)
• Can be used to push configurations to Staging and Production
• Performs pragmatic calls, may require coding to create logic to
complete desired calls
© AKAMAI - EDGE 2017
Property Manager API (PAPI) - Example
List Property Versions
Requests
GET /papi/v1/properties/prp_175780/versions?contractId=ctr_1–1TJZFW&groupId=grp_15166
Response
{
"versions": {
"items": [
{
"updatedByUser": "amenai",
"stagingStatus": "ACTIVE",
"propertyVersion": 2,
"note": "updated caching",
"updatedDate": "2017-05-10T19:06:13Z",
"etag": "5891b5b522d5df08",
"productionStatus": "INACTIVE",
"productId": "prd_Alta"
},
{
© AKAMAI - EDGE 2017
Akamai CLI
• Extensible
• Designed to address most common DevOps use cases
• Task oriented, doesn’t require programming logic
• Currently in Beta
• Can be used to push configurations to Staging and Production
• Easy to use
• Low time to value
© AKAMAI - EDGE 2017
Akamai CLI - Example
Modify Origin
Request
$ akamai property modify lw-dsdjoe.waltman.ca --origin joe.joe.com
Response
Modifying property lw-dsdjoe.waltman.ca
... retrieved rules formats: 862.818ms
... searching propertyName for lw-dsdjoe.waltman.ca
... searching hostname for lw-dsdjoe.waltman.ca
... searching edgeHostname for lw-dsdjoe.waltman.ca
Initializing property cache
Init PropertyManager cache (hostnames and property list)
... retrieving list of Group Ids
... retrieving properties from 111 groups
... retrieving property (lw-dsdjoe.waltman.ca) v1
... retrieving: 3247.549ms
... updating property (lw-dsdjoe.waltman.ca) v1
... updating: 7732.674ms
Modify: 2.2295666666666665 mins
© AKAMAI - EDGE 2017
Akamai CLI – The power of Akamai at your keyboard
Join our discussion today at 4:30
© AKAMAI - EDGE 2017
Bonus Technique for the Adventurous Among Us
Using advanced metadata to match on SAN hostname to automatically add
sites to config.
Can be achieved by using
<match:hoit token="**.example.com">
or
<match:tls-ext.server-name> - requires SNI certificate
Pros: very elegant solution, adding a host name to SAN cert auto-magically
adds it to configuration
Cons: requires PS to implement, cert has to be carefully maintained
© AKAMAI - EDGE 2017

Weitere ähnliche Inhalte

Was ist angesagt?

A Leader’s Guide to DevOps Practices and Culture
A Leader’s Guide to DevOps Practices and CultureA Leader’s Guide to DevOps Practices and Culture
A Leader’s Guide to DevOps Practices and CultureVMware Tanzu
 
State of Load Balancing 2020
State of Load Balancing 2020State of Load Balancing 2020
State of Load Balancing 2020Avi Networks
 
Edge 2016 solving everyday problems with next generation mapping
Edge 2016 solving everyday problems with next generation mappingEdge 2016 solving everyday problems with next generation mapping
Edge 2016 solving everyday problems with next generation mappingakamaidevrel
 
App-solute Testing: Making App Testing with Akamai Easy
App-solute Testing: Making App Testing with Akamai EasyApp-solute Testing: Making App Testing with Akamai Easy
App-solute Testing: Making App Testing with Akamai EasyAkamai Developers & Admins
 
Optimizing Network Performance for Amazon EC2 Instances (CMP308-R1) - AWS re:...
Optimizing Network Performance for Amazon EC2 Instances (CMP308-R1) - AWS re:...Optimizing Network Performance for Amazon EC2 Instances (CMP308-R1) - AWS re:...
Optimizing Network Performance for Amazon EC2 Instances (CMP308-R1) - AWS re:...Amazon Web Services
 
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress RouterMaking Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress RouterVMware Tanzu
 
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...NGINX, Inc.
 
Design & Secure Your Cloud Infrastructure
Design & Secure Your Cloud Infrastructure Design & Secure Your Cloud Infrastructure
Design & Secure Your Cloud Infrastructure Anoop Nair
 
Containerize Legacy .NET Framework Web Apps for Cloud Migration (WIN305) - AW...
Containerize Legacy .NET Framework Web Apps for Cloud Migration (WIN305) - AW...Containerize Legacy .NET Framework Web Apps for Cloud Migration (WIN305) - AW...
Containerize Legacy .NET Framework Web Apps for Cloud Migration (WIN305) - AW...Amazon Web Services
 
Edge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowEdge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowakamaidevrel
 
Deep Dive on Amazon EC2 Instances & Performance Optimization Best Practices (...
Deep Dive on Amazon EC2 Instances & Performance Optimization Best Practices (...Deep Dive on Amazon EC2 Instances & Performance Optimization Best Practices (...
Deep Dive on Amazon EC2 Instances & Performance Optimization Best Practices (...Amazon Web Services
 
Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System (CMP303-R1) ...
Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System (CMP303-R1) ...Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System (CMP303-R1) ...
Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System (CMP303-R1) ...Amazon Web Services
 
Fundamentals of microservices
Fundamentals of microservicesFundamentals of microservices
Fundamentals of microservicesNGINX, Inc.
 
Advanced Web Application Security with an Intelligent WAF
Advanced Web Application Security with an Intelligent WAFAdvanced Web Application Security with an Intelligent WAF
Advanced Web Application Security with an Intelligent WAFAvi Networks
 
Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Proact Netherlands B.V.
 
How Zalando integrates Kubernetes with AWS
How Zalando integrates Kubernetes with AWSHow Zalando integrates Kubernetes with AWS
How Zalando integrates Kubernetes with AWSUri Savelchev
 
Akamai Korea - Tech Day (2015/03/11) DNS
Akamai Korea - Tech Day (2015/03/11) DNSAkamai Korea - Tech Day (2015/03/11) DNS
Akamai Korea - Tech Day (2015/03/11) DNSSangJin Kang
 
Running Kubernetes Across Multiple AWS Accounts (CON409) - AWS re:Invent 2018
Running Kubernetes Across Multiple AWS Accounts (CON409) - AWS re:Invent 2018Running Kubernetes Across Multiple AWS Accounts (CON409) - AWS re:Invent 2018
Running Kubernetes Across Multiple AWS Accounts (CON409) - AWS re:Invent 2018Amazon Web Services
 

Was ist angesagt? (20)

A Leader’s Guide to DevOps Practices and Culture
A Leader’s Guide to DevOps Practices and CultureA Leader’s Guide to DevOps Practices and Culture
A Leader’s Guide to DevOps Practices and Culture
 
Azure F5 Solutions
Azure F5 SolutionsAzure F5 Solutions
Azure F5 Solutions
 
State of Load Balancing 2020
State of Load Balancing 2020State of Load Balancing 2020
State of Load Balancing 2020
 
Edge 2016 solving everyday problems with next generation mapping
Edge 2016 solving everyday problems with next generation mappingEdge 2016 solving everyday problems with next generation mapping
Edge 2016 solving everyday problems with next generation mapping
 
App-solute Testing: Making App Testing with Akamai Easy
App-solute Testing: Making App Testing with Akamai EasyApp-solute Testing: Making App Testing with Akamai Easy
App-solute Testing: Making App Testing with Akamai Easy
 
Optimizing Network Performance for Amazon EC2 Instances (CMP308-R1) - AWS re:...
Optimizing Network Performance for Amazon EC2 Instances (CMP308-R1) - AWS re:...Optimizing Network Performance for Amazon EC2 Instances (CMP308-R1) - AWS re:...
Optimizing Network Performance for Amazon EC2 Instances (CMP308-R1) - AWS re:...
 
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress RouterMaking Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
Making Microservices Smarter with Istio, Envoy and Pivotal Ingress Router
 
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
Deep Dive: Automating the Application and Security Pipeline with NGINX and An...
 
Design & Secure Your Cloud Infrastructure
Design & Secure Your Cloud Infrastructure Design & Secure Your Cloud Infrastructure
Design & Secure Your Cloud Infrastructure
 
Containerize Legacy .NET Framework Web Apps for Cloud Migration (WIN305) - AW...
Containerize Legacy .NET Framework Web Apps for Cloud Migration (WIN305) - AW...Containerize Legacy .NET Framework Web Apps for Cloud Migration (WIN305) - AW...
Containerize Legacy .NET Framework Web Apps for Cloud Migration (WIN305) - AW...
 
Edge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is nowEdge 2016 IPv6 is here: the future is now
Edge 2016 IPv6 is here: the future is now
 
SAPRouter
SAPRouterSAPRouter
SAPRouter
 
Deep Dive on Amazon EC2 Instances & Performance Optimization Best Practices (...
Deep Dive on Amazon EC2 Instances & Performance Optimization Best Practices (...Deep Dive on Amazon EC2 Instances & Performance Optimization Best Practices (...
Deep Dive on Amazon EC2 Instances & Performance Optimization Best Practices (...
 
Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System (CMP303-R1) ...
Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System (CMP303-R1) ...Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System (CMP303-R1) ...
Powering Next-Gen EC2 Instances: Deep Dive into the Nitro System (CMP303-R1) ...
 
Fundamentals of microservices
Fundamentals of microservicesFundamentals of microservices
Fundamentals of microservices
 
Advanced Web Application Security with an Intelligent WAF
Advanced Web Application Security with an Intelligent WAFAdvanced Web Application Security with an Intelligent WAF
Advanced Web Application Security with an Intelligent WAF
 
Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?Hoe is 80% van uw datacenter beheer te automatiseren?
Hoe is 80% van uw datacenter beheer te automatiseren?
 
How Zalando integrates Kubernetes with AWS
How Zalando integrates Kubernetes with AWSHow Zalando integrates Kubernetes with AWS
How Zalando integrates Kubernetes with AWS
 
Akamai Korea - Tech Day (2015/03/11) DNS
Akamai Korea - Tech Day (2015/03/11) DNSAkamai Korea - Tech Day (2015/03/11) DNS
Akamai Korea - Tech Day (2015/03/11) DNS
 
Running Kubernetes Across Multiple AWS Accounts (CON409) - AWS re:Invent 2018
Running Kubernetes Across Multiple AWS Accounts (CON409) - AWS re:Invent 2018Running Kubernetes Across Multiple AWS Accounts (CON409) - AWS re:Invent 2018
Running Kubernetes Across Multiple AWS Accounts (CON409) - AWS re:Invent 2018
 

Andere mochten auch

Connecting Web Performance to Business Results Using mPulse
Connecting Web Performance to Business Results Using mPulseConnecting Web Performance to Business Results Using mPulse
Connecting Web Performance to Business Results Using mPulseAkamai Developers & Admins
 
Bot Manager + Cloudlet Strengthen Mitigation Capability
Bot Manager + Cloudlet Strengthen Mitigation CapabilityBot Manager + Cloudlet Strengthen Mitigation Capability
Bot Manager + Cloudlet Strengthen Mitigation CapabilityAkamai Developers & Admins
 
Secure DevOps Workflow at Dell with Enterprise Application Access (EAA)
Secure DevOps Workflow at Dell with Enterprise Application Access (EAA)Secure DevOps Workflow at Dell with Enterprise Application Access (EAA)
Secure DevOps Workflow at Dell with Enterprise Application Access (EAA)Akamai Developers & Admins
 
Ad Monetization Technologies & Advanced Media Workflows
Ad Monetization Technologies & Advanced Media WorkflowsAd Monetization Technologies & Advanced Media Workflows
Ad Monetization Technologies & Advanced Media WorkflowsAkamai Developers & Admins
 
Performance and Scalability with the Application Load Balancer Cloudlet
Performance and Scalability with the Application Load Balancer CloudletPerformance and Scalability with the Application Load Balancer Cloudlet
Performance and Scalability with the Application Load Balancer CloudletAkamai Developers & Admins
 
Visualizing Cellular Audience for Streaming KPI's
Visualizing Cellular Audience for Streaming KPI'sVisualizing Cellular Audience for Streaming KPI's
Visualizing Cellular Audience for Streaming KPI'sAkamai Developers & Admins
 
Getting Real-Time Middle-Mile Visibility in Your CDN Behavior with DataStream
Getting Real-Time Middle-Mile Visibility in Your CDN Behavior with DataStreamGetting Real-Time Middle-Mile Visibility in Your CDN Behavior with DataStream
Getting Real-Time Middle-Mile Visibility in Your CDN Behavior with DataStreamAkamai Developers & Admins
 
From Development to Deployment - Use Akamai to Facilitate Workflow Automation
From Development to Deployment - Use Akamai to Facilitate Workflow AutomationFrom Development to Deployment - Use Akamai to Facilitate Workflow Automation
From Development to Deployment - Use Akamai to Facilitate Workflow AutomationAkamai Developers & Admins
 
How BAMTECH Media Delivers 50,000 Live Events via APIs
How BAMTECH Media Delivers 50,000 Live Events via APIsHow BAMTECH Media Delivers 50,000 Live Events via APIs
How BAMTECH Media Delivers 50,000 Live Events via APIsAkamai Developers & Admins
 
Leveraging Akamai to Make Your Cloud Transformation Initiatives Successful
Leveraging Akamai to Make Your Cloud Transformation Initiatives SuccessfulLeveraging Akamai to Make Your Cloud Transformation Initiatives Successful
Leveraging Akamai to Make Your Cloud Transformation Initiatives SuccessfulAkamai Developers & Admins
 

Andere mochten auch (13)

Connecting Web Performance to Business Results Using mPulse
Connecting Web Performance to Business Results Using mPulseConnecting Web Performance to Business Results Using mPulse
Connecting Web Performance to Business Results Using mPulse
 
Bot Manager + Cloudlet Strengthen Mitigation Capability
Bot Manager + Cloudlet Strengthen Mitigation CapabilityBot Manager + Cloudlet Strengthen Mitigation Capability
Bot Manager + Cloudlet Strengthen Mitigation Capability
 
Secure DevOps Workflow at Dell with Enterprise Application Access (EAA)
Secure DevOps Workflow at Dell with Enterprise Application Access (EAA)Secure DevOps Workflow at Dell with Enterprise Application Access (EAA)
Secure DevOps Workflow at Dell with Enterprise Application Access (EAA)
 
Akamai as Code
Akamai as CodeAkamai as Code
Akamai as Code
 
Ad Monetization Technologies & Advanced Media Workflows
Ad Monetization Technologies & Advanced Media WorkflowsAd Monetization Technologies & Advanced Media Workflows
Ad Monetization Technologies & Advanced Media Workflows
 
Performance and Scalability with the Application Load Balancer Cloudlet
Performance and Scalability with the Application Load Balancer CloudletPerformance and Scalability with the Application Load Balancer Cloudlet
Performance and Scalability with the Application Load Balancer Cloudlet
 
Visualizing Cellular Audience for Streaming KPI's
Visualizing Cellular Audience for Streaming KPI'sVisualizing Cellular Audience for Streaming KPI's
Visualizing Cellular Audience for Streaming KPI's
 
Getting Real-Time Middle-Mile Visibility in Your CDN Behavior with DataStream
Getting Real-Time Middle-Mile Visibility in Your CDN Behavior with DataStreamGetting Real-Time Middle-Mile Visibility in Your CDN Behavior with DataStream
Getting Real-Time Middle-Mile Visibility in Your CDN Behavior with DataStream
 
From Development to Deployment - Use Akamai to Facilitate Workflow Automation
From Development to Deployment - Use Akamai to Facilitate Workflow AutomationFrom Development to Deployment - Use Akamai to Facilitate Workflow Automation
From Development to Deployment - Use Akamai to Facilitate Workflow Automation
 
Assessing Your Own Site Configuration
Assessing Your Own Site ConfigurationAssessing Your Own Site Configuration
Assessing Your Own Site Configuration
 
How BAMTECH Media Delivers 50,000 Live Events via APIs
How BAMTECH Media Delivers 50,000 Live Events via APIsHow BAMTECH Media Delivers 50,000 Live Events via APIs
How BAMTECH Media Delivers 50,000 Live Events via APIs
 
Leveraging Akamai to Make Your Cloud Transformation Initiatives Successful
Leveraging Akamai to Make Your Cloud Transformation Initiatives SuccessfulLeveraging Akamai to Make Your Cloud Transformation Initiatives Successful
Leveraging Akamai to Make Your Cloud Transformation Initiatives Successful
 
SlideShare 101
SlideShare 101SlideShare 101
SlideShare 101
 

Ähnlich wie Akamai configs consolidation techniques

Application Modernization with PKS / Kubernetes
Application Modernization with PKS / KubernetesApplication Modernization with PKS / Kubernetes
Application Modernization with PKS / KubernetesPaul Czarkowski
 
Check Point automatizace a orchestrace
Check Point automatizace a orchestraceCheck Point automatizace a orchestrace
Check Point automatizace a orchestraceMarketingArrowECS_CZ
 
kreuzwerker AWS Modernizing Legacy Operations with Containerized Solutions 20...
kreuzwerker AWS Modernizing Legacy Operations with Containerized Solutions 20...kreuzwerker AWS Modernizing Legacy Operations with Containerized Solutions 20...
kreuzwerker AWS Modernizing Legacy Operations with Containerized Solutions 20...kreuzwerker GmbH
 
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...Amazon Web Services
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedAkamai Developers & Admins
 
DevSecOps 的規模化實踐 (Level: 300-400)
DevSecOps 的規模化實踐 (Level: 300-400)DevSecOps 的規模化實踐 (Level: 300-400)
DevSecOps 的規模化實踐 (Level: 300-400)Amazon Web Services
 
Building Well Architected .NET Apps (WIN304) - AWS re:Invent 2018
Building Well Architected .NET Apps (WIN304) - AWS re:Invent 2018Building Well Architected .NET Apps (WIN304) - AWS re:Invent 2018
Building Well Architected .NET Apps (WIN304) - AWS re:Invent 2018Amazon Web Services
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...Amazon Web Services
 
CI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and FargateCI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and FargateAmazon Web Services
 
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsSAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsChris Kernaghan
 
Adobe Ask the AEM Community Expert Session Oct 2016
Adobe Ask the AEM Community Expert Session Oct 2016Adobe Ask the AEM Community Expert Session Oct 2016
Adobe Ask the AEM Community Expert Session Oct 2016AdobeMarketingCloud
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersAmazon Web Services
 
Architect Your Legacy Microsoft Apps into Modern Cloud Workloads
 Architect Your Legacy Microsoft Apps into Modern Cloud Workloads Architect Your Legacy Microsoft Apps into Modern Cloud Workloads
Architect Your Legacy Microsoft Apps into Modern Cloud WorkloadsAmazon Web Services
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Amazon Web Services
 
Scalable deployment options in WSO2 API Manager
Scalable deployment options in WSO2 API ManagerScalable deployment options in WSO2 API Manager
Scalable deployment options in WSO2 API ManagerWSO2
 
Pivotal Platform - December Release A First Look
Pivotal Platform - December Release A First LookPivotal Platform - December Release A First Look
Pivotal Platform - December Release A First LookVMware Tanzu
 

Ähnlich wie Akamai configs consolidation techniques (20)

Application Modernization with PKS / Kubernetes
Application Modernization with PKS / KubernetesApplication Modernization with PKS / Kubernetes
Application Modernization with PKS / Kubernetes
 
PAPI and Promotional Deployment
PAPI and Promotional DeploymentPAPI and Promotional Deployment
PAPI and Promotional Deployment
 
Check Point automatizace a orchestrace
Check Point automatizace a orchestraceCheck Point automatizace a orchestrace
Check Point automatizace a orchestrace
 
kreuzwerker AWS Modernizing Legacy Operations with Containerized Solutions 20...
kreuzwerker AWS Modernizing Legacy Operations with Containerized Solutions 20...kreuzwerker AWS Modernizing Legacy Operations with Containerized Solutions 20...
kreuzwerker AWS Modernizing Legacy Operations with Containerized Solutions 20...
 
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
How Rovio Uses Amazon CloudFront for Secure API Acceleration (CTD315) - AWS r...
 
Cloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to SophisticatedCloud Delivery: The Path from Simple to Sophisticated
Cloud Delivery: The Path from Simple to Sophisticated
 
DevSecOps 的規模化實踐 (Level: 300-400)
DevSecOps 的規模化實踐 (Level: 300-400)DevSecOps 的規模化實踐 (Level: 300-400)
DevSecOps 的規模化實踐 (Level: 300-400)
 
GPSTEC307_Too Many Tools
GPSTEC307_Too Many ToolsGPSTEC307_Too Many Tools
GPSTEC307_Too Many Tools
 
Building Well Architected .NET Apps (WIN304) - AWS re:Invent 2018
Building Well Architected .NET Apps (WIN304) - AWS re:Invent 2018Building Well Architected .NET Apps (WIN304) - AWS re:Invent 2018
Building Well Architected .NET Apps (WIN304) - AWS re:Invent 2018
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
 
CI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and FargateCI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and Fargate
 
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deploymentsSAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
SAP Teched 2012 Session Tec3438 Automate IaaS SAP deployments
 
Adobe Ask the AEM Community Expert Session Oct 2016
Adobe Ask the AEM Community Expert Session Oct 2016Adobe Ask the AEM Community Expert Session Oct 2016
Adobe Ask the AEM Community Expert Session Oct 2016
 
S903 palla
S903 pallaS903 palla
S903 palla
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 
Architect Your Legacy Microsoft Apps into Modern Cloud Workloads
 Architect Your Legacy Microsoft Apps into Modern Cloud Workloads Architect Your Legacy Microsoft Apps into Modern Cloud Workloads
Architect Your Legacy Microsoft Apps into Modern Cloud Workloads
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
Scalable deployment options in WSO2 API Manager
Scalable deployment options in WSO2 API ManagerScalable deployment options in WSO2 API Manager
Scalable deployment options in WSO2 API Manager
 
Pivotal Platform - December Release A First Look
Pivotal Platform - December Release A First LookPivotal Platform - December Release A First Look
Pivotal Platform - December Release A First Look
 

Mehr von Akamai Developers & Admins

AWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAkamai Developers & Admins
 
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAkamai Developers & Admins
 
Fluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realFluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realAkamai Developers & Admins
 
Integrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineIntegrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineAkamai Developers & Admins
 
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai Developers & Admins
 
Getting Started with User and API Management Features
Getting Started with User and API Management FeaturesGetting Started with User and API Management Features
Getting Started with User and API Management FeaturesAkamai Developers & Admins
 
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeEdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeAkamai Developers & Admins
 
Provision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xProvision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xAkamai Developers & Admins
 

Mehr von Akamai Developers & Admins (20)

Mitigate Security Threats with SIEM
Mitigate Security Threats with SIEMMitigate Security Threats with SIEM
Mitigate Security Threats with SIEM
 
Manage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with TerraformManage Your Akamai-as-Code with Terraform
Manage Your Akamai-as-Code with Terraform
 
Akamai-as-Code with The Washington Post
Akamai-as-Code with The Washington PostAkamai-as-Code with The Washington Post
Akamai-as-Code with The Washington Post
 
Set up a Development Environment in 5 Minutes
Set up a Development Environment in 5 MinutesSet up a Development Environment in 5 Minutes
Set up a Development Environment in 5 Minutes
 
AWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scaleAWS re:invent: The secret to building and delivering amazing apps at scale
AWS re:invent: The secret to building and delivering amazing apps at scale
 
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scaleAWS re:invent talk: The secrets to building and delivering amazing apps at scale
AWS re:invent talk: The secrets to building and delivering amazing apps at scale
 
10 things you can do at the edge
10 things you can do at the edge10 things you can do at the edge
10 things you can do at the edge
 
How the internet is reshaping our lives
How the internet is reshaping our livesHow the internet is reshaping our lives
How the internet is reshaping our lives
 
Velocity + Fluent 2018: API Performance
Velocity + Fluent 2018: API PerformanceVelocity + Fluent 2018: API Performance
Velocity + Fluent 2018: API Performance
 
Fluent 2018: Measuring What Matters
Fluent 2018: Measuring What MattersFluent 2018: Measuring What Matters
Fluent 2018: Measuring What Matters
 
Fluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting realFluent 2018: When third parties stop being polite... and start getting real
Fluent 2018: When third parties stop being polite... and start getting real
 
Integrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery PipelineIntegrating Security Controls into the Development and Delivery Pipeline
Integrating Security Controls into the Development and Delivery Pipeline
 
Automation at the Edge
Automation at the EdgeAutomation at the Edge
Automation at the Edge
 
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World TourAkamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
Akamai for Dev Ops Current Capabilities - Atlanta DevOps World Tour
 
Getting Started with User and API Management Features
Getting Started with User and API Management FeaturesGetting Started with User and API Management Features
Getting Started with User and API Management Features
 
Akamai Developer General Session
Akamai Developer General SessionAkamai Developer General Session
Akamai Developer General Session
 
Akamai Admin General Session
Akamai Admin General SessionAkamai Admin General Session
Akamai Admin General Session
 
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the EdgeEdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
EdgeWorkers: Enabling Autonomous, Developer Friendly Programming at the Edge
 
Optimizing your API to Perform at Scale
Optimizing your API to Perform at ScaleOptimizing your API to Perform at Scale
Optimizing your API to Perform at Scale
 
Provision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.xProvision Your Own Apple TV channel with MSL 4.x
Provision Your Own Apple TV channel with MSL 4.x
 

Kürzlich hochgeladen

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Kürzlich hochgeladen (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Akamai configs consolidation techniques

  • 1. © AKAMAI - EDGE 2017 Configs, Configs, Everywhere! Limor Sinay Ilia Bromberg Les Waltman
  • 2. © AKAMAI - EDGE 2017 Limor Sinay Manager, Pre-Sales Commerce East Ilia Bromberg Solution Engineer, Commerce East Les Waltman Solution Engineer, Emerging Panel Introductions
  • 3. © AKAMAI - EDGE 2017 WHY ARE YOU WHERE YOU ARE?
  • 4. © AKAMAI - EDGE 2017 Options to Consider 1. Consolidate Configurations 2. Using Variables 3. SaaS Provider Option 4. Dev Ops Approach (API/CLI)
  • 5. © AKAMAI - EDGE 2017 Consolidate Configurations by Cloning Configs Create a Template/Proto Config • Could be with excessive behaviors that may later be customized or removed Best Practices • Establish team rules! • You might not want everything • Can’t always use Fast Activate Cons • Useful for set it and forget it sites. • Simple configurations only • Still no easy way of maintaining multiple configs with updates
  • 6. © AKAMAI - EDGE 2017 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Using Variables * Special thanks to Pierre Lermant
  • 7. © AKAMAI - EDGE 2017 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Example: Hostname section, Production ● This section is different for each configuration • For the test env., Property Hostname would read tst.mainsitedemo.com ● Everything else (all Variables and Rules) is the exact same for all environments
  • 8. © AKAMAI - EDGE 2017 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Example: Variable section Note: you may want to set the PRD_ORIGIN variable to Hidden
  • 9. © AKAMAI - EDGE 2017 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Example: Environment Specific Default rule We grab first three characters of incoming hostname and set the ENV variable
  • 10. © AKAMAI - EDGE 2017 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Example: Environment Specific Production child rule We match the ENV variable with “www” and set origin accordingly
  • 11. © AKAMAI - EDGE 2017 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Example: Override Test rule Test environment TTL override
  • 12. © AKAMAI - EDGE 2017 Variable Configurations - summary • Useful technique to add UAT / PROD / TST environments along with WWW • Requires a consistent naming convention being enforced throughout organization
  • 13. © AKAMAI - EDGE 2017 SaaS Provider Option Automate onboards with SaaS Provider Option SaaS Dynamic Origin: With the SaaS Provider Option, you can easily configure a single rule or pattern that allows Akamai to discover the primary origin data center serving your SaaS application for a particular SaaS customer. Reporting: SaaS-specific reports provide data about each of your SaaS customers and their associated SaaS applications. APIs: Using programmatic APIs, SaaS providers can • Register new applications or customers (set up the valid IDs and readable names for the ID used to define SaaS applications and customers) • Configure IP and/or Geo blocking settings
  • 14. © AKAMAI - EDGE 2017 Configuring SaaS Dynamic Origin Select the request component to use when constructing the origin DNS record. Options include Hostname: uses information contained in the host header. Path: uses information in the directory structure (after the hostname). Query String: uses information contained in a query string parameter. Cookie: uses information from a specific cookie.
  • 15. © AKAMAI - EDGE 2017 Configuring SaaS Definitions Select the request component to use when constructing the SaaS customer, application, or user identifier. Options include: Path: (Default for customer and application IDs) uses information in the directory structure (after the hostname). Hostname: uses information contained in the host header. Query String: uses information contained in a query string parameter. Cookie: uses information from a specific cookie.
  • 16. © AKAMAI - EDGE 2017 DevOps Approaches • Programmatically control your configurations • Akamai property configurations can be built or cloned as part of your CI-CD workflow • Configurations can be pragmatically removed when no longer required • Remotely push configs to Staging or Production • Version Akamai configurations with your versioning • Tools: Property Manager API or Akamai CLI
  • 17. © AKAMAI - EDGE 2017 Property Manager API (PAPI) • Very flexible • Can do most functions of • Requires in-depth knowledge of Akamai structure and terminology (contacts, groups, products, rule trees, etc) • Can be used to push configurations to Staging and Production • Performs pragmatic calls, may require coding to create logic to complete desired calls
  • 18. © AKAMAI - EDGE 2017 Property Manager API (PAPI) - Example List Property Versions Requests GET /papi/v1/properties/prp_175780/versions?contractId=ctr_1–1TJZFW&groupId=grp_15166 Response { "versions": { "items": [ { "updatedByUser": "amenai", "stagingStatus": "ACTIVE", "propertyVersion": 2, "note": "updated caching", "updatedDate": "2017-05-10T19:06:13Z", "etag": "5891b5b522d5df08", "productionStatus": "INACTIVE", "productId": "prd_Alta" }, {
  • 19. © AKAMAI - EDGE 2017 Akamai CLI • Extensible • Designed to address most common DevOps use cases • Task oriented, doesn’t require programming logic • Currently in Beta • Can be used to push configurations to Staging and Production • Easy to use • Low time to value
  • 20. © AKAMAI - EDGE 2017 Akamai CLI - Example Modify Origin Request $ akamai property modify lw-dsdjoe.waltman.ca --origin joe.joe.com Response Modifying property lw-dsdjoe.waltman.ca ... retrieved rules formats: 862.818ms ... searching propertyName for lw-dsdjoe.waltman.ca ... searching hostname for lw-dsdjoe.waltman.ca ... searching edgeHostname for lw-dsdjoe.waltman.ca Initializing property cache Init PropertyManager cache (hostnames and property list) ... retrieving list of Group Ids ... retrieving properties from 111 groups ... retrieving property (lw-dsdjoe.waltman.ca) v1 ... retrieving: 3247.549ms ... updating property (lw-dsdjoe.waltman.ca) v1 ... updating: 7732.674ms Modify: 2.2295666666666665 mins
  • 21. © AKAMAI - EDGE 2017 Akamai CLI – The power of Akamai at your keyboard Join our discussion today at 4:30
  • 22. © AKAMAI - EDGE 2017 Bonus Technique for the Adventurous Among Us Using advanced metadata to match on SAN hostname to automatically add sites to config. Can be achieved by using <match:hoit token="**.example.com"> or <match:tls-ext.server-name> - requires SNI certificate Pros: very elegant solution, adding a host name to SAN cert auto-magically adds it to configuration Cons: requires PS to implement, cert has to be carefully maintained
  • 23. © AKAMAI - EDGE 2017