SlideShare ist ein Scribd-Unternehmen logo
1 von 37
OpenStack Kilo Summit, Paris, Nov 2014 
Michael Cohen, Sumit Naiksatam, Prasad Vellanki, Stephen 
Wong
Agenda 
 Vision 
 GBP Model 
 GBP Architecture 
 Demo
IT exists to run applications 
automation 
infrastructure 
Scalable 
Uber-Easy 
Reliable 
Fast
IT exists to run application 
Reality: 
Based on worst 
principles 
borrowed from 
human 
middleware 
automation 
infrastructure
Micromanagement 
Do this sequence of things 
do do do do do do do do do do 
do do do do 
Automation has 
been an attempt 
at industrialization 
of 
micromanagemen 
t practices
heat automation 
detailed 
abstraction 
neutro 
n 
detailed 
abstraction 
nova 
detailed 
abstraction 
cinder 
detailed 
abstraction 
swift 
detailed 
abstraction 
glance 
……….. 
Detailed 
Interactions 
Do, do, do, do 
Detailed 
Interactions 
Do, do, do, do 
Detailed 
Interactions 
Do, do, do, do 
Detailed 
Interactions 
Do, do, do, do 
Detailed 
Interactions 
Do, do, do, do 
Detailed 
Interactions 
Do, do, do, do 
(over and over again) 
Lots of HOW 
Too much 
Unnecessa 
ry detail 
+ 
Closed 
Coupling
simplicity, at times, has 
heat automation 
detailed 
abstraction 
neutro 
n 
detailed 
abstraction 
nova 
detailed 
abstraction 
cinder 
complications 
detailed 
abstraction 
swift 
detailed 
abstraction 
glance 
complexity 
……….. 
domain details leak 
into the automation 
layer 
and its enforcement 
mechanisms 
It was OK when these things were very 
simple, but it breaks down as the featureset 
expands….
detailed 
abstraction 
neutro 
n 
detailed 
abstraction 
nova 
simplicity, at times, has 
domain detail 
complexity 
detailed 
abstraction 
cinder 
complications 
app guy 
detailed 
abstraction 
swift 
detailed 
abstraction 
glance 
……….. 
heat automation
but IT exists to run applications…. 
detailed 
abstraction 
neutro 
n 
detailed 
abstraction 
nova 
detailed 
abstraction 
cinder 
app guy 
detailed 
abstraction 
swift 
detailed 
abstraction 
glance 
……….. 
heat automation 
“I’d like to run this app 
that has the following 
requirements on 
infrastructure, services 
and other apps.. with 
these characteristics!” 
My app looks like this: 
intent 
of what app should 
be and what it needs 
Intent Is lost in unnecessary domain specific 
details
intent 
 Abstraction 
 Portability 
 Self-containment 
 No leakage of unnecessary knowledge across apps 
this is how I expose 
myself to other 
apps/components/s 
ervices 
This is how 
I need to 
consume 
infra 
This is my 
application 
component 
some other app 
some other app 
storage 
requirements 
compute 
requirements 
placement 
requirements 
image 
rules 
scaling 
rules 
booting/init 
rules 
v 
m 
v 
m 
…. 
v 
m 
some 
app/compo 
nent/service 
What 
apps/components/servic 
es do I depend on? 
Network and netsec 
are implicit 
a real application consists of many of these
enforcement: multi-surface policy 
problem 
intent 
capabilities and state 
ops constraints 
governance
neutro 
nova cinder swift glance 
n 
heat automation 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
governance 
app guy 
intent 
of what app 
should be and 
what it needs 
domain specific intent 
influence
neutro 
 Consistent continuous enforcement 
 Localized isolated domain specific decisions 
 Simplicity and Scale! 
 Under control of governance 
nova cinder swift glance 
n 
heat automation 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
governance 
intent 
of what app 
should be and 
what it needs 
domain specific intent 
influence
neutro 
nova cinder swift glance 
n 
heat automation 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
intent 
abstraction 
congress 
TOSCA 
group-based policy intent 
How do we get there?
…The Future… Policy driven 
registry 
(vm, containers, end-points 
with conditions) 
neutro 
n 
nova 
intent 
abstraction 
intent 
abstraction 
policy repository 
OpenStack 
.. 
.. 
end-points 
conditions 
business policy 
business 
policy 
enforcement 
conditions 
application 
intent 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
-------- 
--------
Agenda 
 Vision 
 GBP Model 
 GBP Architecture 
 Demo
Goal of OpenStack Abstractions 
Capture the “infrastructure needs” of an 
application independent of the 
complexities of how the underlying 
infrastructure is implemented.
Let us review the use-case 
2-tier (Web & App) PCI-compliant app deployed either in production or for dev 
a) Developer intent: 
● External to Web Tier: Open port 80, use LB 
● Web to DB Tier : Open port 8800 
● Existing Services : MySQL, Events correlation Bigdata App, Billing, and Monitoring 
b) Cloud operator intent: 
● Production : Allow internet access 
● Production : DMZ firewall inspects external traffic 
● Dev : Allow access to internal proxy 
● Remediation : Infected application must be quarantined 
c) Compliance Officer intent: 
● Security : PCI Firewall for Billing
How you build it today… 
 Create logical networks for app-tier and web-tier 
What subnets to use?  IT Trouble Ticket 
What routing to setup between these network?  IT Trouble Ticket 
On app tier, creates security groups to drop all traffic other than port 80, and 
 Monitoring traffic – creates Trouble Ticket for monitoring team to ask what ports to open 
 DB, Bigdata traffic – creates Trouble Ticket for DB/Bigdata team to ask what ports to open 
 Payment service traffic – creates Trouble Ticket for Payment team, hope PCI needs are met by those 
rules 
 May have to create FWaaS for requirements like auditing or stateful inspection 
Load balance traffic, create VIP using LBaaS 
Create Floating IP for VIP 
 Create Firewall using FWaaS for external traffic 
Creates Trouble Ticket for infra team to setup rules for external access 
Needs rules to drop all external traffic, not clear where to set that up? As routing rules? As FW rules? 
 One more Trouble Ticket! 
External traffic needs both FW and LbaaS rules now, how to order them? 
 Creates Trouble Ticket for support team on how to set them up to be ordered correctly 
 Need to quarantine infected VMs 
Create scripts to update security groups on demand for quarantine needs 
 Automate all of this as scripts, and whenever any of the dependencies change (infra 
or other apps), update the scripts as needed.
Where we are today… 
 We have good abstractions for representing logical 
networks/routers/services 
 However, our abstractions are very low level. We spread 
application description across multiple abstractions like: 
L2/L3 address allocation 
Routing rules 
Security Groups 
Service configuration 
 Requires manual reconciliation 
Can we do better?
What Abstractions are needed? 
2-tier (Web & App) PCI-compliant app deployed either in production or for dev 
a) Developer intent: The application must 
● Close all ports but 80 for the web tier 
● Use LB for access to the web tier 
● Allow no network communication to DB tier except from the web tier 
● Use existing user db for provisioning 
● Use existing bigdata app for events 
● Use existing payment service for billing 
● Use existing monitoring app for billing 
b) Cloud operator intent: 
● Applications deployed for production may have access to the internet. 
● Applications deployed for development should not have internet access. 
● Any traffic from internet must be inspected by a DMZ firewall. 
● Any infected application must be quarantined 
c) Compliance officer intent: 
● All traffic to the payment service must be inspected by an audited firewall rule set
Groups 
A new 2-tier PCI app (app tier and web tier) can be deployed either for production or for development. 
a) Developer intent: The application must 
● Close all ports but 80 for the web tier 
● Use LB for access to the web tier 
● Allow no network communication to DB tier except from the web tier 
● Use existing user db for provisioning 
● Use existing bigdata app for events 
● Use existing payment service for billing 
● Use existing monitoring app for billing 
b) Cloud operator intent: 
● Applications deployed for production may have access to the internet. 
● Applications deployed for development should not have internet access. 
● Any traffic from internet must be inspected by a DMZ firewall. 
● Any infected application must be quarantined 
c) Compliance officer intent: 
● All traffic to the payment service must be inspected by an audited firewall rule set 
Groups
Traffic Classifiers 
A new 2-tier PCI app (app tier and web tier) can be deployed either for production or for development. 
a) Developer intent: The application must 
● Close all ports but 80 for the web tier 
● Use LB for access to the web tier 
● Allow no network communication to DB tier except from the web tier 
● Use existing user db for provisioning 
● Use existing bigdata app for events 
● Use existing payment service for billing 
● Use existing monitoring app for billing 
b) Cloud operator intent: 
● Applications deployed for production may have access to the internet. 
● Applications deployed for development should not have internet access. 
● Any traffic from internet must be inspected by a DMZ firewall. 
● Any infected application must be quarantined 
c) Compliance officer intent: 
● All traffic to the payment service must be inspected by an audited firewall rule set 
Groups 
Classifiers
Policy Tags 
A new 2-tier PCI app (app tier and web tier) can be deployed either for production or for development. 
a) Developer intent: The application must 
● Close all ports but 80 for the web tier 
● Use LB for access to the web tier 
● Allow no network communication to DB tier except from the web tier 
● Use existing user db for provisioning 
● Use existing bigdata app for events 
● Use existing payment service for billing 
● Use existing monitoring app for billing 
b) Cloud operator intent: 
● Applications deployed for production may have access to the internet. 
● Applications deployed for development should not have internet access. 
● Any traffic from internet must be inspected by a DMZ firewall. 
● Any infected application must be quarantined 
c) Compliance officer intent: 
● All traffic to the payment service must be inspected by an audited firewall rule set 
Groups 
Classifiers 
Policy 
Tags
Policy Actions 
A new 2-tier PCI app (app tier and web tier) can be deployed either for production or for development. 
a) Developer intent: The application must 
● Close all ports but 80 for the web tier 
● Use LB for access to the web tier 
● Allow no network communication to DB tier except from the web tier 
● Use existing user db for provisioning 
● Use existing bigdata app for events 
● Use existing payment service for billing 
● Use existing monitoring app for billing 
b) Cloud operator intent: 
● Applications deployed for production may have access to the internet. 
● Applications deployed for development should not have internet access. 
● Any traffic from internet must be inspected by a DMZ firewall. 
● Any infected application must be quarantined 
c) Compliance officer intent: 
● All traffic to the payment service must be inspected by an audited firewall rule set 
Groups 
Classifiers 
Policy 
Tags 
Actions
Group-Based Policy Model 
Policy 
Tags 
Policy Rules Set 
Policy Rule 
Policy Rule 
Policy Rule 
Group 
Classifier 
Classifier 
Action 
Action 
Service Chain
Agenda 
 Vision 
 GBP Model 
 GBP Architecture 
 Demo
Architecture Approach 
o Simplification of automation 
o Capture user intent declaratively 
o Separation of concerns by role 
o Reusable constructs
Architecture 
1. Neutron Driver 
supports any 
existing Neutron 
plugin / ML2 
driver 
2. ODL Driver 
Other infrastructure components 
(future) supports 
ODL GBP 
Swift … 
3. Native drivers will 
be supplied by 
vendors 
CLI Horizon Heat 
Group Policy 
Neutron Driver GBP Drivers 
Neutron 
Existing 
Plugins and 
ML2 Drivers 
Group Policy 
Nova Cinder 
To be defined
Application Policy 
My App 
Servers 
App Server 
RuleSet 
High Availability 
Service Chain 
My Web 
Servers 
Web Server RuleSet
Existing Application Consumer 
Policy 
My App 
Servers 
App Server 
RuleSet 
High Availability 
Service Chain 
My Web 
Servers 
Web Server RuleSet 
App DB 
RuleSet 
App 
Database 
User DB 
RuleSet 
User 
Database 
Payment 
RuleSet 
Payment 
Service 
Monitoring DB RuleSet 
Monitoring 
Service 
Monitoring 
V2 Service 
Existing Applications Security Service Chain
Infrastructure Policy Layering 
My App 
Servers 
App Server 
RuleSet 
My Web 
Servers 
Web Server RuleSet 
App DB 
RuleSet 
App 
Database 
User DB 
RuleSet 
User 
Database 
Payment 
RuleSet 
Payment 
Service 
Monitoring DB RuleSet 
Monitoring 
Service 
Monitoring 
V2 Service 
Existing Applications 
Outsid 
e 
Acces 
s 
Security Service Chain 
High Availability 
Security Service Chain 
Service Chain 
GBP renders 
the Services 
into a 
composed 
Chain
Agenda 
 Vision 
 GBP Model 
 GBP Architecture 
 Demo
Demo
DEMO
References 
 GBP wiki page to get more information on how to 
install and work with GBP: 
https://wiki.openstack.org/wiki/GroupBasedPolicy 
 GBP Design Summit Session: 
Tuesday November 4, 2014 12:05 - 12:45 
Dufy (Le Meridien) 
http://kilodesignsummit.sched.org/event/98dc4255384e340 
682137c8a7ee7e60d#.VFKCJYt4r4w 
 Try it out 
https://wiki.openstack.org/wiki/GroupBasedPolicy/InstallDe 
vstack

Weitere ähnliche Inhalte

Was ist angesagt?

Machine learning for optical networking: hype, reality and use cases
Machine learning for optical networking: hype, reality and use casesMachine learning for optical networking: hype, reality and use cases
Machine learning for optical networking: hype, reality and use casesADVA
 
CENGN - OpenStack MeetUp - March 2017
CENGN - OpenStack MeetUp - March 2017CENGN - OpenStack MeetUp - March 2017
CENGN - OpenStack MeetUp - March 2017Stacy Véronneau
 
Opinion: Why do so many new RAN players love Open RAN
Opinion: Why do so many new RAN players love Open RANOpinion: Why do so many new RAN players love Open RAN
Opinion: Why do so many new RAN players love Open RAN3G4G
 
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini SummitF5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summitkimw001
 
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...PLUMgrid
 
NFV +SDN (Network Function Virtualization)
NFV +SDN (Network Function Virtualization)NFV +SDN (Network Function Virtualization)
NFV +SDN (Network Function Virtualization)Hamidreza Bolhasani
 
IO Visor Summit 2017: Welcome & Overview via Pere Monclus
IO Visor Summit 2017: Welcome & Overview via Pere MonclusIO Visor Summit 2017: Welcome & Overview via Pere Monclus
IO Visor Summit 2017: Welcome & Overview via Pere MonclusIO Visor Project
 
MEF Presto for SDN-enabled service lifecycle automation
MEF Presto for SDN-enabled service lifecycle automationMEF Presto for SDN-enabled service lifecycle automation
MEF Presto for SDN-enabled service lifecycle automationADVA
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...Mistral Solutions
 
NFV Cloud DataCenter Adaptation & Tobe evolution ways
NFV Cloud DataCenter Adaptation & Tobe evolution waysNFV Cloud DataCenter Adaptation & Tobe evolution ways
NFV Cloud DataCenter Adaptation & Tobe evolution waysHongsik Choi
 
Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)SDNRG ITB
 
Practical and Incremental Convergence between SDN and Middleboxes
Practical and Incremental Convergence between SDN and MiddleboxesPractical and Incremental Convergence between SDN and Middleboxes
Practical and Incremental Convergence between SDN and MiddleboxesOpen Networking Summits
 
Summit 16: Open-O Mini-Summit - Orchestrating Network Connectivity Services
Summit 16: Open-O Mini-Summit - Orchestrating Network Connectivity ServicesSummit 16: Open-O Mini-Summit - Orchestrating Network Connectivity Services
Summit 16: Open-O Mini-Summit - Orchestrating Network Connectivity ServicesOPNFV
 
Is SDN ready for primetime?
Is SDN ready for primetime?Is SDN ready for primetime?
Is SDN ready for primetime?APNIC
 
Telecom Infra Project study notes
Telecom Infra Project study notesTelecom Infra Project study notes
Telecom Infra Project study notesRichard Kuo
 
Chapter 7
Chapter 7 Chapter 7
Chapter 7 ali raza
 
Connecting the smart factory to the cloud with MQTT and Sparkplug
Connecting the smart factory to the cloud with MQTT and SparkplugConnecting the smart factory to the cloud with MQTT and Sparkplug
Connecting the smart factory to the cloud with MQTT and SparkplugIan Skerrett
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Canada
 

Was ist angesagt? (20)

Machine learning for optical networking: hype, reality and use cases
Machine learning for optical networking: hype, reality and use casesMachine learning for optical networking: hype, reality and use cases
Machine learning for optical networking: hype, reality and use cases
 
CENGN - OpenStack MeetUp - March 2017
CENGN - OpenStack MeetUp - March 2017CENGN - OpenStack MeetUp - March 2017
CENGN - OpenStack MeetUp - March 2017
 
Opinion: Why do so many new RAN players love Open RAN
Opinion: Why do so many new RAN players love Open RANOpinion: Why do so many new RAN players love Open RAN
Opinion: Why do so many new RAN players love Open RAN
 
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini SummitF5 Networks -  - OpenStack Summit 2016/Red Hat NFV Mini Summit
F5 Networks - - OpenStack Summit 2016/Red Hat NFV Mini Summit
 
NFV Open Source projects
NFV Open Source projectsNFV Open Source projects
NFV Open Source projects
 
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
See Your OpenStack Network Like Never Before with Real-time Visibility and Mo...
 
NFV +SDN (Network Function Virtualization)
NFV +SDN (Network Function Virtualization)NFV +SDN (Network Function Virtualization)
NFV +SDN (Network Function Virtualization)
 
IO Visor Summit 2017: Welcome & Overview via Pere Monclus
IO Visor Summit 2017: Welcome & Overview via Pere MonclusIO Visor Summit 2017: Welcome & Overview via Pere Monclus
IO Visor Summit 2017: Welcome & Overview via Pere Monclus
 
MEF Presto for SDN-enabled service lifecycle automation
MEF Presto for SDN-enabled service lifecycle automationMEF Presto for SDN-enabled service lifecycle automation
MEF Presto for SDN-enabled service lifecycle automation
 
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
IoT based Industrial Gateway (IoT-SDK) built around Sitara™ AM437x processors...
 
NFV Cloud DataCenter Adaptation & Tobe evolution ways
NFV Cloud DataCenter Adaptation & Tobe evolution waysNFV Cloud DataCenter Adaptation & Tobe evolution ways
NFV Cloud DataCenter Adaptation & Tobe evolution ways
 
NFV Tutorial
NFV TutorialNFV Tutorial
NFV Tutorial
 
Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)Brocade Software Networking (SDN NFV Day ITB 2016)
Brocade Software Networking (SDN NFV Day ITB 2016)
 
Practical and Incremental Convergence between SDN and Middleboxes
Practical and Incremental Convergence between SDN and MiddleboxesPractical and Incremental Convergence between SDN and Middleboxes
Practical and Incremental Convergence between SDN and Middleboxes
 
Summit 16: Open-O Mini-Summit - Orchestrating Network Connectivity Services
Summit 16: Open-O Mini-Summit - Orchestrating Network Connectivity ServicesSummit 16: Open-O Mini-Summit - Orchestrating Network Connectivity Services
Summit 16: Open-O Mini-Summit - Orchestrating Network Connectivity Services
 
Is SDN ready for primetime?
Is SDN ready for primetime?Is SDN ready for primetime?
Is SDN ready for primetime?
 
Telecom Infra Project study notes
Telecom Infra Project study notesTelecom Infra Project study notes
Telecom Infra Project study notes
 
Chapter 7
Chapter 7 Chapter 7
Chapter 7
 
Connecting the smart factory to the cloud with MQTT and Sparkplug
Connecting the smart factory to the cloud with MQTT and SparkplugConnecting the smart factory to the cloud with MQTT and Sparkplug
Connecting the smart factory to the cloud with MQTT and Sparkplug
 
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network IntuitiveCisco Connect Toronto 2017 - Introducing the Network Intuitive
Cisco Connect Toronto 2017 - Introducing the Network Intuitive
 

Andere mochten auch

OCP Engineering Workshop at UNH
OCP Engineering Workshop at UNH OCP Engineering Workshop at UNH
OCP Engineering Workshop at UNH 호용 류
 
А.Арендарчук -- концептуальные схемы ресурсоснабжения
А.Арендарчук -- концептуальные схемы ресурсоснабженияА.Арендарчук -- концептуальные схемы ресурсоснабжения
А.Арендарчук -- концептуальные схемы ресурсоснабженияAnatoly Levenchuk
 
Cloud, SDN, NFV
Cloud, SDN, NFVCloud, SDN, NFV
Cloud, SDN, NFVIgor D.C.
 
OpenStack and nfvo
OpenStack and nfvoOpenStack and nfvo
OpenStack and nfvoKanagaraj M
 
Paris beauty scripts
Paris beauty scripts Paris beauty scripts
Paris beauty scripts Proma Das
 
SAFE Final Report_12-07_Final_Corrected
SAFE Final Report_12-07_Final_CorrectedSAFE Final Report_12-07_Final_Corrected
SAFE Final Report_12-07_Final_CorrectedShira Yashphe
 
Seguridad para slideshare
Seguridad para slideshareSeguridad para slideshare
Seguridad para slideshareIratxe Comercio
 
VilanovaDIBA14 Wilson Greatbach Raül Peiró
VilanovaDIBA14 Wilson Greatbach Raül Peiró VilanovaDIBA14 Wilson Greatbach Raül Peiró
VilanovaDIBA14 Wilson Greatbach Raül Peiró RPR2015
 
Matter #2 6th gradeppt
Matter #2 6th gradepptMatter #2 6th gradeppt
Matter #2 6th gradepptpwalpole
 
Chemical injuries of eye
Chemical injuries of eyeChemical injuries of eye
Chemical injuries of eyesonia Daga
 
Achieving Cost and Resource Efficiency through Docker, OpenShift and Kubernetes
Achieving Cost and Resource Efficiency through Docker, OpenShift and KubernetesAchieving Cost and Resource Efficiency through Docker, OpenShift and Kubernetes
Achieving Cost and Resource Efficiency through Docker, OpenShift and KubernetesDean Delamont
 
Who am I? Who is HUB?
Who am I? Who is HUB?Who am I? Who is HUB?
Who am I? Who is HUB?Nathan Burtt
 

Andere mochten auch (15)

Revista maig 2013
Revista maig 2013Revista maig 2013
Revista maig 2013
 
OCP Engineering Workshop at UNH
OCP Engineering Workshop at UNH OCP Engineering Workshop at UNH
OCP Engineering Workshop at UNH
 
А.Арендарчук -- концептуальные схемы ресурсоснабжения
А.Арендарчук -- концептуальные схемы ресурсоснабженияА.Арендарчук -- концептуальные схемы ресурсоснабжения
А.Арендарчук -- концептуальные схемы ресурсоснабжения
 
Cloud, SDN, NFV
Cloud, SDN, NFVCloud, SDN, NFV
Cloud, SDN, NFV
 
OpenStack and nfvo
OpenStack and nfvoOpenStack and nfvo
OpenStack and nfvo
 
Paris beauty scripts
Paris beauty scripts Paris beauty scripts
Paris beauty scripts
 
SAFE Final Report_12-07_Final_Corrected
SAFE Final Report_12-07_Final_CorrectedSAFE Final Report_12-07_Final_Corrected
SAFE Final Report_12-07_Final_Corrected
 
Seguridad para slideshare
Seguridad para slideshareSeguridad para slideshare
Seguridad para slideshare
 
actividad
actividad actividad
actividad
 
VilanovaDIBA14 Wilson Greatbach Raül Peiró
VilanovaDIBA14 Wilson Greatbach Raül Peiró VilanovaDIBA14 Wilson Greatbach Raül Peiró
VilanovaDIBA14 Wilson Greatbach Raül Peiró
 
Domestic tp
Domestic tpDomestic tp
Domestic tp
 
Matter #2 6th gradeppt
Matter #2 6th gradepptMatter #2 6th gradeppt
Matter #2 6th gradeppt
 
Chemical injuries of eye
Chemical injuries of eyeChemical injuries of eye
Chemical injuries of eye
 
Achieving Cost and Resource Efficiency through Docker, OpenShift and Kubernetes
Achieving Cost and Resource Efficiency through Docker, OpenShift and KubernetesAchieving Cost and Resource Efficiency through Docker, OpenShift and Kubernetes
Achieving Cost and Resource Efficiency through Docker, OpenShift and Kubernetes
 
Who am I? Who is HUB?
Who am I? Who is HUB?Who am I? Who is HUB?
Who am I? Who is HUB?
 

Ähnlich wie Open stack gbp final sn-4-slideshare

apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...apidays
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Canturk Isci
 
Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Ankit Gupta
 
20160221 va interconnect_pub
20160221 va interconnect_pub20160221 va interconnect_pub
20160221 va interconnect_pubCanturk Isci
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerManageEngine
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays
 
Operational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarOperational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarCanturk Isci
 
Monitoring as an entry point for collaboration
Monitoring as an entry point for collaborationMonitoring as an entry point for collaboration
Monitoring as an entry point for collaborationJulien Pivotto
 
How to build streaming data pipelines with Akka Streams, Flink, and Spark usi...
How to build streaming data pipelines with Akka Streams, Flink, and Spark usi...How to build streaming data pipelines with Akka Streams, Flink, and Spark usi...
How to build streaming data pipelines with Akka Streams, Flink, and Spark usi...Lightbend
 
DevOps Spain 2019. Beatriz Martínez-IBM
DevOps Spain 2019. Beatriz Martínez-IBMDevOps Spain 2019. Beatriz Martínez-IBM
DevOps Spain 2019. Beatriz Martínez-IBMatSistemas
 
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...apidays
 
Reactive Application Using METEOR
Reactive Application Using METEORReactive Application Using METEOR
Reactive Application Using METEORNodeXperts
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOTONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOTIRJET Journal
 
3 reasons to pick a time series platform for monitoring dev ops driven contai...
3 reasons to pick a time series platform for monitoring dev ops driven contai...3 reasons to pick a time series platform for monitoring dev ops driven contai...
3 reasons to pick a time series platform for monitoring dev ops driven contai...DevOps.com
 
Technical Webinar with AWS - Everything You Need to Measure in Your Migration
Technical Webinar with AWS - Everything You Need to Measure in Your MigrationTechnical Webinar with AWS - Everything You Need to Measure in Your Migration
Technical Webinar with AWS - Everything You Need to Measure in Your MigrationNew Relic
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Liz Warner
 

Ähnlich wie Open stack gbp final sn-4-slideshare (20)

GuideIT High Level Consulting Framework
GuideIT High Level Consulting FrameworkGuideIT High Level Consulting Framework
GuideIT High Level Consulting Framework
 
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
apidays LIVE New York 2021 - Simplify Open Policy Agent with Styra DAS by Tim...
 
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.xEMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
EMEA Airheads_ Aruba AppRF – AOS 6.x & 8.x
 
Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016Agentless System Crawler - InterConnect 2016
Agentless System Crawler - InterConnect 2016
 
Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Week 4 lecture material cc (1)
Week 4 lecture material cc (1)
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
20160221 va interconnect_pub
20160221 va interconnect_pub20160221 va interconnect_pub
20160221 va interconnect_pub
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
apidays LIVE New York 2021 - Microservice Authorization with Open Policy Agen...
 
Operational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU SeminarOperational Visibiliy and Analytics - BU Seminar
Operational Visibiliy and Analytics - BU Seminar
 
Monitoring as an entry point for collaboration
Monitoring as an entry point for collaborationMonitoring as an entry point for collaboration
Monitoring as an entry point for collaboration
 
How to build streaming data pipelines with Akka Streams, Flink, and Spark usi...
How to build streaming data pipelines with Akka Streams, Flink, and Spark usi...How to build streaming data pipelines with Akka Streams, Flink, and Spark usi...
How to build streaming data pipelines with Akka Streams, Flink, and Spark usi...
 
DevOps Spain 2019. Beatriz Martínez-IBM
DevOps Spain 2019. Beatriz Martínez-IBMDevOps Spain 2019. Beatriz Martínez-IBM
DevOps Spain 2019. Beatriz Martínez-IBM
 
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
Apidays Paris 2023 - Kafka in Event-Driven Architectures, Hassane Moustapha, ...
 
Reactive Application Using METEOR
Reactive Application Using METEORReactive Application Using METEOR
Reactive Application Using METEOR
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOTONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
ONLINE FOOD ORDERS THROUGH WHATSAPP AUTOMATION BOT
 
3 reasons to pick a time series platform for monitoring dev ops driven contai...
3 reasons to pick a time series platform for monitoring dev ops driven contai...3 reasons to pick a time series platform for monitoring dev ops driven contai...
3 reasons to pick a time series platform for monitoring dev ops driven contai...
 
Technical Webinar with AWS - Everything You Need to Measure in Your Migration
Technical Webinar with AWS - Everything You Need to Measure in Your MigrationTechnical Webinar with AWS - Everything You Need to Measure in Your Migration
Technical Webinar with AWS - Everything You Need to Measure in Your Migration
 
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
Service Assurance Constructs for Achieving Network Transformation - Sunku Ran...
 

Mehr von Sumit Naiksatam

Network Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronNetwork Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronSumit Naiksatam
 
OpenStack Neutron Service Chaining and Insertion
OpenStack Neutron Service Chaining and InsertionOpenStack Neutron Service Chaining and Insertion
OpenStack Neutron Service Chaining and InsertionSumit Naiksatam
 
Quantum services' chaining open stack havana design summit, portland 2013
Quantum services' chaining   open stack havana design summit, portland 2013Quantum services' chaining   open stack havana design summit, portland 2013
Quantum services' chaining open stack havana design summit, portland 2013Sumit Naiksatam
 
Quantum firewall as a service open stack havana design summit, portland 2013
Quantum firewall as a service   open stack havana design summit, portland 2013Quantum firewall as a service   open stack havana design summit, portland 2013
Quantum firewall as a service open stack havana design summit, portland 2013Sumit Naiksatam
 
Quantum L3 (forwarding) model - OpenStack Folsom Design Summit
Quantum L3 (forwarding) model - OpenStack Folsom Design SummitQuantum L3 (forwarding) model - OpenStack Folsom Design Summit
Quantum L3 (forwarding) model - OpenStack Folsom Design SummitSumit Naiksatam
 

Mehr von Sumit Naiksatam (6)

Network Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack NeutronNetwork Policy Abstractions in OpenStack Neutron
Network Policy Abstractions in OpenStack Neutron
 
OpenStack Neutron Service Chaining and Insertion
OpenStack Neutron Service Chaining and InsertionOpenStack Neutron Service Chaining and Insertion
OpenStack Neutron Service Chaining and Insertion
 
Quantum services' chaining open stack havana design summit, portland 2013
Quantum services' chaining   open stack havana design summit, portland 2013Quantum services' chaining   open stack havana design summit, portland 2013
Quantum services' chaining open stack havana design summit, portland 2013
 
Quantum firewall as a service open stack havana design summit, portland 2013
Quantum firewall as a service   open stack havana design summit, portland 2013Quantum firewall as a service   open stack havana design summit, portland 2013
Quantum firewall as a service open stack havana design summit, portland 2013
 
Quantum L3 (forwarding) model - OpenStack Folsom Design Summit
Quantum L3 (forwarding) model - OpenStack Folsom Design SummitQuantum L3 (forwarding) model - OpenStack Folsom Design Summit
Quantum L3 (forwarding) model - OpenStack Folsom Design Summit
 
OpenStack Quantum
OpenStack QuantumOpenStack Quantum
OpenStack Quantum
 

Kürzlich hochgeladen

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Open stack gbp final sn-4-slideshare

  • 1. OpenStack Kilo Summit, Paris, Nov 2014 Michael Cohen, Sumit Naiksatam, Prasad Vellanki, Stephen Wong
  • 2. Agenda  Vision  GBP Model  GBP Architecture  Demo
  • 3. IT exists to run applications automation infrastructure Scalable Uber-Easy Reliable Fast
  • 4. IT exists to run application Reality: Based on worst principles borrowed from human middleware automation infrastructure
  • 5. Micromanagement Do this sequence of things do do do do do do do do do do do do do do Automation has been an attempt at industrialization of micromanagemen t practices
  • 6. heat automation detailed abstraction neutro n detailed abstraction nova detailed abstraction cinder detailed abstraction swift detailed abstraction glance ……….. Detailed Interactions Do, do, do, do Detailed Interactions Do, do, do, do Detailed Interactions Do, do, do, do Detailed Interactions Do, do, do, do Detailed Interactions Do, do, do, do Detailed Interactions Do, do, do, do (over and over again) Lots of HOW Too much Unnecessa ry detail + Closed Coupling
  • 7. simplicity, at times, has heat automation detailed abstraction neutro n detailed abstraction nova detailed abstraction cinder complications detailed abstraction swift detailed abstraction glance complexity ……….. domain details leak into the automation layer and its enforcement mechanisms It was OK when these things were very simple, but it breaks down as the featureset expands….
  • 8. detailed abstraction neutro n detailed abstraction nova simplicity, at times, has domain detail complexity detailed abstraction cinder complications app guy detailed abstraction swift detailed abstraction glance ……….. heat automation
  • 9. but IT exists to run applications…. detailed abstraction neutro n detailed abstraction nova detailed abstraction cinder app guy detailed abstraction swift detailed abstraction glance ……….. heat automation “I’d like to run this app that has the following requirements on infrastructure, services and other apps.. with these characteristics!” My app looks like this: intent of what app should be and what it needs Intent Is lost in unnecessary domain specific details
  • 10. intent  Abstraction  Portability  Self-containment  No leakage of unnecessary knowledge across apps this is how I expose myself to other apps/components/s ervices This is how I need to consume infra This is my application component some other app some other app storage requirements compute requirements placement requirements image rules scaling rules booting/init rules v m v m …. v m some app/compo nent/service What apps/components/servic es do I depend on? Network and netsec are implicit a real application consists of many of these
  • 11. enforcement: multi-surface policy problem intent capabilities and state ops constraints governance
  • 12. neutro nova cinder swift glance n heat automation intent abstraction intent abstraction intent abstraction intent abstraction intent abstraction governance app guy intent of what app should be and what it needs domain specific intent influence
  • 13. neutro  Consistent continuous enforcement  Localized isolated domain specific decisions  Simplicity and Scale!  Under control of governance nova cinder swift glance n heat automation intent abstraction intent abstraction intent abstraction intent abstraction intent abstraction governance intent of what app should be and what it needs domain specific intent influence
  • 14. neutro nova cinder swift glance n heat automation intent abstraction intent abstraction intent abstraction intent abstraction intent abstraction congress TOSCA group-based policy intent How do we get there?
  • 15. …The Future… Policy driven registry (vm, containers, end-points with conditions) neutro n nova intent abstraction intent abstraction policy repository OpenStack .. .. end-points conditions business policy business policy enforcement conditions application intent -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- -------- --------
  • 16. Agenda  Vision  GBP Model  GBP Architecture  Demo
  • 17. Goal of OpenStack Abstractions Capture the “infrastructure needs” of an application independent of the complexities of how the underlying infrastructure is implemented.
  • 18. Let us review the use-case 2-tier (Web & App) PCI-compliant app deployed either in production or for dev a) Developer intent: ● External to Web Tier: Open port 80, use LB ● Web to DB Tier : Open port 8800 ● Existing Services : MySQL, Events correlation Bigdata App, Billing, and Monitoring b) Cloud operator intent: ● Production : Allow internet access ● Production : DMZ firewall inspects external traffic ● Dev : Allow access to internal proxy ● Remediation : Infected application must be quarantined c) Compliance Officer intent: ● Security : PCI Firewall for Billing
  • 19. How you build it today…  Create logical networks for app-tier and web-tier What subnets to use?  IT Trouble Ticket What routing to setup between these network?  IT Trouble Ticket On app tier, creates security groups to drop all traffic other than port 80, and  Monitoring traffic – creates Trouble Ticket for monitoring team to ask what ports to open  DB, Bigdata traffic – creates Trouble Ticket for DB/Bigdata team to ask what ports to open  Payment service traffic – creates Trouble Ticket for Payment team, hope PCI needs are met by those rules  May have to create FWaaS for requirements like auditing or stateful inspection Load balance traffic, create VIP using LBaaS Create Floating IP for VIP  Create Firewall using FWaaS for external traffic Creates Trouble Ticket for infra team to setup rules for external access Needs rules to drop all external traffic, not clear where to set that up? As routing rules? As FW rules?  One more Trouble Ticket! External traffic needs both FW and LbaaS rules now, how to order them?  Creates Trouble Ticket for support team on how to set them up to be ordered correctly  Need to quarantine infected VMs Create scripts to update security groups on demand for quarantine needs  Automate all of this as scripts, and whenever any of the dependencies change (infra or other apps), update the scripts as needed.
  • 20. Where we are today…  We have good abstractions for representing logical networks/routers/services  However, our abstractions are very low level. We spread application description across multiple abstractions like: L2/L3 address allocation Routing rules Security Groups Service configuration  Requires manual reconciliation Can we do better?
  • 21. What Abstractions are needed? 2-tier (Web & App) PCI-compliant app deployed either in production or for dev a) Developer intent: The application must ● Close all ports but 80 for the web tier ● Use LB for access to the web tier ● Allow no network communication to DB tier except from the web tier ● Use existing user db for provisioning ● Use existing bigdata app for events ● Use existing payment service for billing ● Use existing monitoring app for billing b) Cloud operator intent: ● Applications deployed for production may have access to the internet. ● Applications deployed for development should not have internet access. ● Any traffic from internet must be inspected by a DMZ firewall. ● Any infected application must be quarantined c) Compliance officer intent: ● All traffic to the payment service must be inspected by an audited firewall rule set
  • 22. Groups A new 2-tier PCI app (app tier and web tier) can be deployed either for production or for development. a) Developer intent: The application must ● Close all ports but 80 for the web tier ● Use LB for access to the web tier ● Allow no network communication to DB tier except from the web tier ● Use existing user db for provisioning ● Use existing bigdata app for events ● Use existing payment service for billing ● Use existing monitoring app for billing b) Cloud operator intent: ● Applications deployed for production may have access to the internet. ● Applications deployed for development should not have internet access. ● Any traffic from internet must be inspected by a DMZ firewall. ● Any infected application must be quarantined c) Compliance officer intent: ● All traffic to the payment service must be inspected by an audited firewall rule set Groups
  • 23. Traffic Classifiers A new 2-tier PCI app (app tier and web tier) can be deployed either for production or for development. a) Developer intent: The application must ● Close all ports but 80 for the web tier ● Use LB for access to the web tier ● Allow no network communication to DB tier except from the web tier ● Use existing user db for provisioning ● Use existing bigdata app for events ● Use existing payment service for billing ● Use existing monitoring app for billing b) Cloud operator intent: ● Applications deployed for production may have access to the internet. ● Applications deployed for development should not have internet access. ● Any traffic from internet must be inspected by a DMZ firewall. ● Any infected application must be quarantined c) Compliance officer intent: ● All traffic to the payment service must be inspected by an audited firewall rule set Groups Classifiers
  • 24. Policy Tags A new 2-tier PCI app (app tier and web tier) can be deployed either for production or for development. a) Developer intent: The application must ● Close all ports but 80 for the web tier ● Use LB for access to the web tier ● Allow no network communication to DB tier except from the web tier ● Use existing user db for provisioning ● Use existing bigdata app for events ● Use existing payment service for billing ● Use existing monitoring app for billing b) Cloud operator intent: ● Applications deployed for production may have access to the internet. ● Applications deployed for development should not have internet access. ● Any traffic from internet must be inspected by a DMZ firewall. ● Any infected application must be quarantined c) Compliance officer intent: ● All traffic to the payment service must be inspected by an audited firewall rule set Groups Classifiers Policy Tags
  • 25. Policy Actions A new 2-tier PCI app (app tier and web tier) can be deployed either for production or for development. a) Developer intent: The application must ● Close all ports but 80 for the web tier ● Use LB for access to the web tier ● Allow no network communication to DB tier except from the web tier ● Use existing user db for provisioning ● Use existing bigdata app for events ● Use existing payment service for billing ● Use existing monitoring app for billing b) Cloud operator intent: ● Applications deployed for production may have access to the internet. ● Applications deployed for development should not have internet access. ● Any traffic from internet must be inspected by a DMZ firewall. ● Any infected application must be quarantined c) Compliance officer intent: ● All traffic to the payment service must be inspected by an audited firewall rule set Groups Classifiers Policy Tags Actions
  • 26. Group-Based Policy Model Policy Tags Policy Rules Set Policy Rule Policy Rule Policy Rule Group Classifier Classifier Action Action Service Chain
  • 27. Agenda  Vision  GBP Model  GBP Architecture  Demo
  • 28. Architecture Approach o Simplification of automation o Capture user intent declaratively o Separation of concerns by role o Reusable constructs
  • 29. Architecture 1. Neutron Driver supports any existing Neutron plugin / ML2 driver 2. ODL Driver Other infrastructure components (future) supports ODL GBP Swift … 3. Native drivers will be supplied by vendors CLI Horizon Heat Group Policy Neutron Driver GBP Drivers Neutron Existing Plugins and ML2 Drivers Group Policy Nova Cinder To be defined
  • 30. Application Policy My App Servers App Server RuleSet High Availability Service Chain My Web Servers Web Server RuleSet
  • 31. Existing Application Consumer Policy My App Servers App Server RuleSet High Availability Service Chain My Web Servers Web Server RuleSet App DB RuleSet App Database User DB RuleSet User Database Payment RuleSet Payment Service Monitoring DB RuleSet Monitoring Service Monitoring V2 Service Existing Applications Security Service Chain
  • 32. Infrastructure Policy Layering My App Servers App Server RuleSet My Web Servers Web Server RuleSet App DB RuleSet App Database User DB RuleSet User Database Payment RuleSet Payment Service Monitoring DB RuleSet Monitoring Service Monitoring V2 Service Existing Applications Outsid e Acces s Security Service Chain High Availability Security Service Chain Service Chain GBP renders the Services into a composed Chain
  • 33. Agenda  Vision  GBP Model  GBP Architecture  Demo
  • 34. Demo
  • 35. DEMO
  • 36.
  • 37. References  GBP wiki page to get more information on how to install and work with GBP: https://wiki.openstack.org/wiki/GroupBasedPolicy  GBP Design Summit Session: Tuesday November 4, 2014 12:05 - 12:45 Dufy (Le Meridien) http://kilodesignsummit.sched.org/event/98dc4255384e340 682137c8a7ee7e60d#.VFKCJYt4r4w  Try it out https://wiki.openstack.org/wiki/GroupBasedPolicy/InstallDe vstack

Hinweis der Redaktion

  1. Before we start on the topic of policy, I think we need to level set ourselves on why we are all here. We manage infrastructure and infrastructure EXISTS to run applications. An applications need to be deliverable in a way that is scalable, easy, reliable, and fast! ----- Meeting Notes (10/14/14 11:18) ----- we must automate application processes and well in infrastructure underneath.
  2. So, we did what smart people do – we developed automation. But our automation tools to date are mostly borrowed from human middleware. We took the things we used to type into our consoles and we embedded them in cripts and tools. Even our APIs are so level as they are not much help here. The end result is indeed automated but hardly scalable, easy, reliable.
  3. How many of you like being micromanaged? Do you think tools do better micromanaged as well? In reality what we’ve done is the industrialization of these bad practices. ----- Meeting Notes (10/14/14 11:20) ----- this is not the answer
  4. Now lets think about this in openStack. OpenStack was designed to offer a set of abstraction layers across different types of systems and architectures. But the abstractions today are still too detailed and low level for automation: networking I’m specifying L2/L3, Devops is great until its time to manage BGP… The result is to close a coupling between the automation and the underlying infrastructure. ----- Meeting Notes (10/14/14 11:30) ----- couple
  5. ----- Meeting Notes (10/14/14 11:30) ----- What is happening is that the details are leaking from the individuals systems trhough to the automation. This was ok when systems were simple but more and more domain details leak into the automation. This introduces complexity and reduces effectiviness. Complexity is the the enemy of automation and scale.
  6. And who does this impact the most? The poor application guy who has to define his services and build automation against them. He needs to understands a lot about how each of these detailed layers works and interacts. It is NOT easy or fast
  7. But remember IT exists to run applications. APplication guy know how his application looks. He knows how it interacts with other things. By the time you get to the interfaces of the cloud platform, all you think about is implementation details. THe intent is lost. THIS IS BAD. This is root of the problem we are facing.
  8. So what should we be doing? We have to capture intent. Networking is the worst but not the only culprit here. ----- Meeting Notes (10/14/14 11:30) ----- AN pplicaiton comprises of multiple components – each of them is compromised of units of compute with the same behavior. You have to scale them up and down and control them through a set of rules. Then you have to know how thye consume infrastructure. (re-arrange animation) app upper left reasons then say there are many of these. They are defined by different people. There is no one person who knows everything. If you rely on this model and clearly identify rules of consumption, networking and security becomes implicit.
  9. ----- Meeting Notes (10/14/14 11:30) ----- each of these surfaces should be indepdnent inputs where roles and division of labor are honored An unlike orchestration, this is a continuous enforcement loop. Each of these surfaces change and the system must react in any dynamic environment. For example, if there is a failure, you should be able to reconverge without manual intervention.
  10. We have to rethink the abstractions we are using to describe things to better capture intent. Automation tools must provide a set of intent-based interfaces to reflect the structural requirements of the application as well as how application consume other resources. Other systems must expose their own intent-based abstractions enforce its own policy loop in an autonomous domain specific manner. ANd all enformcement should be influenced and enforced through a set of gov and ops constraints.
  11. This is how we really make things scalable, easy, reliable, and fast!