SlideShare une entreprise Scribd logo
1  sur  40
Télécharger pour lire hors ligne
Bringing Together the Core Fundamentals
of Distributed Systems
Kevin Jones @webopsx
11-5-2015
A Little about me
2
• My name is Kevin Jones
• Currently working as Sales Engineer for NGINX, Inc
• Previously worked as an SRE for YP - yellowpages.com
• Experience with production operations, large scale infrastructure and
automation
• Enjoy meeting new people, music and learning new technology
Objectives
3
• What is a Distributed System?
• What makes a Distributed System efficient and reliable?
• What are some of the core fundamentals of Distributed Systems and what
makes them great characteristics to implement in other areas of your IT
infrastructure?
• What qualities does NGINX have that reflect some of these core fundamentals
and how can NGINX help strengthen and improve your existing IT
infrastructure?
• Q&A
What Is a Distributed System?
4
5
• A program… is the code you write.
• A process… is what you get when you run it.
• A message… is used to communicate between processes.
• A packet… is a fragment of a message on a wire.
• A protocol… is a formal description of a message and its rules it must follow
in order to exchange those messages.
• A network… is the infrastructure that links computers, workstations, terminals
etc together.
• A component… can be a process or any piece of hardware required to run a
process.
Lets go back to the basics…
6
Therefore…
• A distributed system… is an application that executes a
collection of protocols to coordinate the actions of multiple
processes on a network, such that all components cooperate
together to perform a single or small set of related tasks.
What Makes a Distributed System Efficient and Reliable?
7
• Scalable
• High Performing
• Highly Available
• Transparent
• Open
• Secure
It should be…
8
The ability of a system, network, or process, to handle a growing amount of work in a capable 
manner or its ability to be enlarged to accommodate that growth.
Scalability
9
• Plan for the future
• Think about user experience
• Start with thinking about SCALE!
Distributed Geometric Availability When Needed
10
• Number of machines
• Number of users
• Number of tasks
• Connections or concurrency
Dealing with the Size of Your Infrastructure
11
• Cost of maintenance
• Efficiency of maintenance
Administration and Dealing with
Maintenance of Systems
12
Characterized by the amount of useful work accomplished by a computer system compared to
the time and resources that are used.
Performance
13
Latency is the state of being latent; delay, a period between the initiation of
something and the occurrence.
14
Latent in latin terms means “hidden”. Existing or present but concealed or
inactive.
15
What Are the Characteristics of High Performance?
• Short response time or low latency
• High throughput or rate of processing work
• Low utilization of computing resources
16
The proportion of time a system is in a functioning condition. If a user cannot access the
system, it is said to be down.
Availability
17
• Designing for failure
• Identifying weak points
• Implementing redundancy
High Availability Is All about Being Fault Tolerant
18
• Network outages across the wire or inside your own private network
• Outages of other third party services or dependencies
• Anything that is out of control of the designer
Some Things Are out of Your Control
19
Any form of a distributed system should hide its distributed nature from its users, appearing
and functioning as a normal centralized system.
Transparency
There Are Many Types of Transparencies in Distributed Systems
20
• Access - one single way to access
• Location - no matter where the user is
• Migration - physical location
• Relocation - moving of resources
• Replication - appear as a single resource
• Concurrent - competing for resources
• Failure - try to hide failure to the user
• Persistence - whether volatile or permanent
• Security - minimum user intervention
21
This determines whether the system can be extended in various ways without disrupting
existing systems or services and be able to easily interact with other open services.
Openness
22
• Conform to well-defined interfaces
• Support portability of applications
• Easily interoperate with other services
To Keep Your Distributed System Open It Must…
23
The system should authenticate access to data and services,
be invulnerable to know threats and follow industry standard security guidelines.
Secureness
24
• Security Audits
• Software patching maintenance or vulnerability management
• Try to use a security framework
• Encryption everywhere
• Integrity checking (Auth)
• Confidentiality through authorization (Resource Access)
• Monitoring of traffic, logins and requests
Common Measures to Help with Security
25
ALL of them!
Which of These Core Fundamentals Can Be Implemented
in Other Areas of Your IT infrastructure?
26
Many of these characteristics can be found in NGINX and can even help you
strengthen your existing IT infrastructure.
27
Quick Intro to NGINX
• Open source version created in 2004
• NGINX, Inc. founded in 2011
• 140 million + known instances running
today on the internet
• #1 web server of choice on the top 100,000
busiest sites
Igor Sysoev, NGINX creator and founder
28
Load Balancer
Web Server
Reverse Proxy
Content Cache
29
Scalability
NGINX - Open Source
Layer 7 Software Load Balancer for HTTP(S) / TCP
Application Delivery Platform
API Gateway
10,000+ Virtual Servers Multi-tenancy
NGINX Plus - Commercial
Real Time Activity Monitoring API (status)
Dynamic Upstream Reconfiguration API (upstream_conf)
30
NGINX Plus Real Time Activity Monitoring
31
QUICK DEMO
32
Performance
NGINX - Open Source
High Throughput
High Number of Concurrent Connections (1 Million+)
Content Caching at Edge
Low CPU/Memory Utilization
Fine Tunable Configuration
HTTP2!!!
33
HTTP(S) / TCP
34
Availability
NGINX - Open Source
HA Configurable with keepalived
(IP Syncronization over VRRP)
NGINX Plus - Commercial
NGINX HA Package for Easy Configuration
Application Aware Health Checks for Upstreams
35
Transparency
NGINX - Open Source
Combined with Global DNS Can Handle
Global Load Balancing (Route53, Google, GoDaddy etc)
Reverse Proxy - Single Entry Point
NGINX Plus - Commercial
Session Persistence (Cookie, Session, Route)
36
Openness
NGINX - Open Source
Open Source / Third Party Modules
nginScript - JavaScript Inside NGINX Configurations
Dynamic Loadable Modules COMING SOON!
NGINX Plus - Commercial
Simple HTTP Based APIs
API with JSON Interface
37
{
"version":6,
"nginx_version":"1.9.5",
“address”:”127.0.0.1",
"generation":12,
"load_timestamp":1446285600278,
"timestamp":1446705526537,
"pid":92676,
"processes":{
"respawned":0
},
"connections":{
"accepted":11441510,
"dropped":0,
"active":4,
"idle":30
},
"ssl":{
"handshakes":57921,
"handshakes_failed":9497,
"session_reuses":11987
},
NGINX Plus Monitoring JSON API
38
Secureness
NGINX - Open Source
Authentication via auth_request Module
SSL Support
Client Certificate Based Authentication Support
Bandwidth Limiting
Connection Limiting
Access Control Lists (ACLs)
LDAP Support
Reverse Proxy - Easily ACL Backend Resources
NGINX Plus - Commercial
NTLM Support
39
Thank you all again for coming!
Twitter @webopsx
Kevin Jones
http://www.slideshare.net/KevinJones62
Q&A?
40
http://www.aosabook.org/en/distsys.html

http://arxiv.org/pdf/0911.4395v1.pdf 

http://book.mixu.net/distsys/ 

http://the-paper-trail.org/blog/distributed-systems-theory-for-the-distributed-systems-engineer/ 

http://www.fit.vutbr.cz/~rabj/pdie/lecture_1.pdf 

http://www.cl.cam.ac.uk/~jac22/books/ods/ods/node18.html 

http://www.hpcs.cs.tsukuba.ac.jp/~tatebe/lecture/h23/dsys/dsd-tutorial.html 

http://cse.csusb.edu/tongyu/courses/cs660/notes/chap1.php 

http://www.opengroup.org/cloud/cloud/cloud_iop/cloud_port.htm 

http://www.toptal.com/security/10-most-common-web-security-vulnerabilities 

http://arxiv.org/pdf/1211.2032.pdf 

https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html

http://nginx.org/en/docs/ 

http://www.aosabook.org/en/nginx.html 

https://www.nginx.com/resources/admin-guide/ 

https://www.nginx.com/blog/nginx-plus-authenticate-users/
References

Contenu connexe

Tendances

Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storagePapitha Velumani
 
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive Networks
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingPriyanka Aash
 
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and MicroservicesAccelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and MicroservicesRick Hightower
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageShakas Technologies
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...Shawn Wells
 
MQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsMQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsDominik Obermaier
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure securityLen Bass
 
Lightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTTLightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTTDominik Obermaier
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationNetCraftsmen
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security IntroductionGLC Networks
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)Gabriella Davis
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsSam Bowne
 
cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encryptedDevanandPatil6
 
The Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on SecurityThe Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on SecurityBrent Salisbury
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...Ziv Ichilov
 

Tendances (20)

Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
Is the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the SwordIs the Network Tap Mightier Than the Sword
Is the Network Tap Mightier Than the Sword
 
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlowCohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
Cohesive SDN Summit Presentation: OpenFlow is SDN, SDN is not OpenFlow
 
Security Advantages of Software-Defined Networking
Security Advantages of Software-Defined NetworkingSecurity Advantages of Software-Defined Networking
Security Advantages of Software-Defined Networking
 
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and MicroservicesAccelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
Accelerate Delivery: Business Case for Agile DevOps, CI/CD and Microservices
 
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
Radware DefenseFlow-The SDN Application That Programs Networks for DoS Security
 
New Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization ProtocolsNew Security Mechanisms for Network Time Synchronization Protocols
New Security Mechanisms for Network Time Synchronization Protocols
 
Identity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storageIdentity based distributed provable data possession in multi-cloud storage
Identity based distributed provable data possession in multi-cloud storage
 
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
2016-08-24 FedInsider Webinar with Jennifer Kron - Securing Intelligence in a...
 
MQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfallsMQTT 5: Why you need it and potential pitfalls
MQTT 5: Why you need it and potential pitfalls
 
5 infrastructure security
5 infrastructure security5 infrastructure security
5 infrastructure security
 
Lightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTTLightweight and scalable IoT Messaging with MQTT
Lightweight and scalable IoT Messaging with MQTT
 
Software Defined Networking: Network Virtualization
Software Defined Networking: Network VirtualizationSoftware Defined Networking: Network Virtualization
Software Defined Networking: Network Virtualization
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
 
CNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security OperationsCNIT 125 Ch 8. Security Operations
CNIT 125 Ch 8. Security Operations
 
cloud computing encrypted
cloud computing encryptedcloud computing encrypted
cloud computing encrypted
 
The Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on SecurityThe Potential Impact of Software Defined Networking SDN on Security
The Potential Impact of Software Defined Networking SDN on Security
 
SDN-Security
SDN-SecuritySDN-Security
SDN-Security
 
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
SecurityDAM - Hybrid DDoS Protection for MSSPs and Enterprises (Infosecurity ...
 

En vedette

Deploying NGINX Plus with Ansible
Deploying NGINX Plus with AnsibleDeploying NGINX Plus with Ansible
Deploying NGINX Plus with AnsibleKevin Jones
 
The 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century SkillsThe 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century SkillsLiberty Gavas
 
Real madrid jmgm
Real madrid jmgmReal madrid jmgm
Real madrid jmgmjose garcia
 
Lectores rss
Lectores rssLectores rss
Lectores rssdeissy30
 
Barlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parteBarlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parteBasile Barlot
 
Cuales son las diapositivas
Cuales son las diapositivasCuales son las diapositivas
Cuales son las diapositivastoaquizamargoth
 
Vascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicionVascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicionJaime Guillermo González Gámez
 
Boca y contenido
Boca y contenidoBoca y contenido
Boca y contenidoIPN
 

En vedette (14)

Rss
RssRss
Rss
 
OKURA hotel Amsterdam
OKURA hotel AmsterdamOKURA hotel Amsterdam
OKURA hotel Amsterdam
 
Deploying NGINX Plus with Ansible
Deploying NGINX Plus with AnsibleDeploying NGINX Plus with Ansible
Deploying NGINX Plus with Ansible
 
The 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century SkillsThe 21st Century Century Digital Learner and The 21st Century Skills
The 21st Century Century Digital Learner and The 21st Century Skills
 
Presentacion de rss
Presentacion de rssPresentacion de rss
Presentacion de rss
 
Real madrid jmgm
Real madrid jmgmReal madrid jmgm
Real madrid jmgm
 
Medicare 1II
Medicare 1IIMedicare 1II
Medicare 1II
 
Lectores rss
Lectores rssLectores rss
Lectores rss
 
Med supppresentation
Med supppresentationMed supppresentation
Med supppresentation
 
Barlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parteBarlogisme vorbe de duh, a XI-a parte
Barlogisme vorbe de duh, a XI-a parte
 
Cuales son las diapositivas
Cuales son las diapositivasCuales son las diapositivas
Cuales son las diapositivas
 
Vascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicionVascularización e inervación de cavidad bucal exposicion
Vascularización e inervación de cavidad bucal exposicion
 
Boca y contenido
Boca y contenidoBoca y contenido
Boca y contenido
 
Habilidades gerenciales
Habilidades gerenciales Habilidades gerenciales
Habilidades gerenciales
 

Similaire à Ricon 2015 final

Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxChapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxmeharikiros2
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating systemudaya khanal
 
Manging Container Deployments at Scale
Manging Container Deployments at ScaleManging Container Deployments at Scale
Manging Container Deployments at ScaleMofizur Rahman
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleMofizur Rahman
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1Lahav Savir
 
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...InfluxData
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingplumbee
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingMark Hinkle
 
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018AgileNetwork
 
Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016Keith Lynch
 
Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices Dev_Events
 
DEVNET-1117 Open Source DevCenter Launched within DevNet
DEVNET-1117	Open Source DevCenter Launched within DevNetDEVNET-1117	Open Source DevCenter Launched within DevNet
DEVNET-1117 Open Source DevCenter Launched within DevNetCisco DevNet
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumRick Hightower
 
2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap PresentationShawn Wells
 
Microservices: Yes or not?
Microservices: Yes or not?Microservices: Yes or not?
Microservices: Yes or not?Eduard Tomàs
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705Miguel Vidal
 
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...MariaDB plc
 

Similaire à Ricon 2015 final (20)

Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptxChapter-1-IntroDistributeddffsfdfsdf-1.pptx
Chapter-1-IntroDistributeddffsfdfsdf-1.pptx
 
Distributed operating system
Distributed operating systemDistributed operating system
Distributed operating system
 
Manging Container Deployments at Scale
Manging Container Deployments at ScaleManging Container Deployments at Scale
Manging Container Deployments at Scale
 
Istio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at ScaleIstio Mesh – Managing Container Deployments at Scale
Istio Mesh – Managing Container Deployments at Scale
 
Multi Layer Monitoring V1
Multi Layer Monitoring V1Multi Layer Monitoring V1
Multi Layer Monitoring V1
 
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
David Henthorn [Rose-Hulman Institute of Technology] | Illuminating the Dark ...
 
Zero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is kingZero to ten million daily users in four weeks: sustainable speed is king
Zero to ten million daily users in four weeks: sustainable speed is king
 
Introduction
IntroductionIntroduction
Introduction
 
InfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud ComputingInfoSec 2011: Crash Course Open Source Cloud Computing
InfoSec 2011: Crash Course Open Source Cloud Computing
 
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
DevOps - IaC | Talk | AGILE GURUGRAM 2018 | 23 - 24 March, 2018
 
Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016Containers - Transforming the data centre as we know it 2016
Containers - Transforming the data centre as we know it 2016
 
Benefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centersBenefits of disaggregation and open source networking in data centers
Benefits of disaggregation and open source networking in data centers
 
Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices Building Next Generation Applications and Microservices
Building Next Generation Applications and Microservices
 
DEVNET-1117 Open Source DevCenter Launched within DevNet
DEVNET-1117	Open Source DevCenter Launched within DevNetDEVNET-1117	Open Source DevCenter Launched within DevNet
DEVNET-1117 Open Source DevCenter Launched within DevNet
 
Service Mesh Talk for CTO Forum
Service Mesh Talk for CTO ForumService Mesh Talk for CTO Forum
Service Mesh Talk for CTO Forum
 
2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation2008-01-22 Red Hat (Security) Roadmap Presentation
2008-01-22 Red Hat (Security) Roadmap Presentation
 
Microservices: Yes or not?
Microservices: Yes or not?Microservices: Yes or not?
Microservices: Yes or not?
 
Microservices Architecture
Microservices ArchitectureMicroservices Architecture
Microservices Architecture
 
Birmingham-20060705
Birmingham-20060705Birmingham-20060705
Birmingham-20060705
 
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
Software-definierte Infrastrukturen, DevOps, Digitale Transformation – Neues ...
 

Plus de Kevin Jones

DockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINXDockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINXKevin Jones
 
Using NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes IngressUsing NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes IngressKevin Jones
 
High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINXKevin Jones
 
Using NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content CacheUsing NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content CacheKevin Jones
 
NGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern WebNGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern WebKevin Jones
 
Accelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINXAccelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINXKevin Jones
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusKevin Jones
 
Load Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterLoad Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterKevin Jones
 

Plus de Kevin Jones (8)

DockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINXDockerCon Live 2020 - Securing Your Containerized Application with NGINX
DockerCon Live 2020 - Securing Your Containerized Application with NGINX
 
Using NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes IngressUsing NGINX and NGINX Plus as a Kubernetes Ingress
Using NGINX and NGINX Plus as a Kubernetes Ingress
 
High Availability Content Caching with NGINX
High Availability Content Caching with NGINXHigh Availability Content Caching with NGINX
High Availability Content Caching with NGINX
 
Using NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content CacheUsing NGINX as an Effective and Highly Available Content Cache
Using NGINX as an Effective and Highly Available Content Cache
 
NGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern WebNGINX: The Past, Present and Future of the Modern Web
NGINX: The Past, Present and Future of the Modern Web
 
Accelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINXAccelerating Your Web Application with NGINX
Accelerating Your Web Application with NGINX
 
Content Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX PlusContent Caching with NGINX and NGINX Plus
Content Caching with NGINX and NGINX Plus
 
Load Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS ClusterLoad Balancing Applications with NGINX in a CoreOS Cluster
Load Balancing Applications with NGINX in a CoreOS Cluster
 

Dernier

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Dernier (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Ricon 2015 final

  • 1. Bringing Together the Core Fundamentals of Distributed Systems Kevin Jones @webopsx 11-5-2015
  • 2. A Little about me 2 • My name is Kevin Jones • Currently working as Sales Engineer for NGINX, Inc • Previously worked as an SRE for YP - yellowpages.com • Experience with production operations, large scale infrastructure and automation • Enjoy meeting new people, music and learning new technology
  • 3. Objectives 3 • What is a Distributed System? • What makes a Distributed System efficient and reliable? • What are some of the core fundamentals of Distributed Systems and what makes them great characteristics to implement in other areas of your IT infrastructure? • What qualities does NGINX have that reflect some of these core fundamentals and how can NGINX help strengthen and improve your existing IT infrastructure? • Q&A
  • 4. What Is a Distributed System? 4
  • 5. 5 • A program… is the code you write. • A process… is what you get when you run it. • A message… is used to communicate between processes. • A packet… is a fragment of a message on a wire. • A protocol… is a formal description of a message and its rules it must follow in order to exchange those messages. • A network… is the infrastructure that links computers, workstations, terminals etc together. • A component… can be a process or any piece of hardware required to run a process. Lets go back to the basics…
  • 6. 6 Therefore… • A distributed system… is an application that executes a collection of protocols to coordinate the actions of multiple processes on a network, such that all components cooperate together to perform a single or small set of related tasks.
  • 7. What Makes a Distributed System Efficient and Reliable? 7 • Scalable • High Performing • Highly Available • Transparent • Open • Secure It should be…
  • 9. 9 • Plan for the future • Think about user experience • Start with thinking about SCALE! Distributed Geometric Availability When Needed
  • 10. 10 • Number of machines • Number of users • Number of tasks • Connections or concurrency Dealing with the Size of Your Infrastructure
  • 11. 11 • Cost of maintenance • Efficiency of maintenance Administration and Dealing with Maintenance of Systems
  • 12. 12 Characterized by the amount of useful work accomplished by a computer system compared to the time and resources that are used. Performance
  • 13. 13 Latency is the state of being latent; delay, a period between the initiation of something and the occurrence.
  • 14. 14 Latent in latin terms means “hidden”. Existing or present but concealed or inactive.
  • 15. 15 What Are the Characteristics of High Performance? • Short response time or low latency • High throughput or rate of processing work • Low utilization of computing resources
  • 16. 16 The proportion of time a system is in a functioning condition. If a user cannot access the system, it is said to be down. Availability
  • 17. 17 • Designing for failure • Identifying weak points • Implementing redundancy High Availability Is All about Being Fault Tolerant
  • 18. 18 • Network outages across the wire or inside your own private network • Outages of other third party services or dependencies • Anything that is out of control of the designer Some Things Are out of Your Control
  • 19. 19 Any form of a distributed system should hide its distributed nature from its users, appearing and functioning as a normal centralized system. Transparency
  • 20. There Are Many Types of Transparencies in Distributed Systems 20 • Access - one single way to access • Location - no matter where the user is • Migration - physical location • Relocation - moving of resources • Replication - appear as a single resource • Concurrent - competing for resources • Failure - try to hide failure to the user • Persistence - whether volatile or permanent • Security - minimum user intervention
  • 21. 21 This determines whether the system can be extended in various ways without disrupting existing systems or services and be able to easily interact with other open services. Openness
  • 22. 22 • Conform to well-defined interfaces • Support portability of applications • Easily interoperate with other services To Keep Your Distributed System Open It Must…
  • 23. 23 The system should authenticate access to data and services, be invulnerable to know threats and follow industry standard security guidelines. Secureness
  • 24. 24 • Security Audits • Software patching maintenance or vulnerability management • Try to use a security framework • Encryption everywhere • Integrity checking (Auth) • Confidentiality through authorization (Resource Access) • Monitoring of traffic, logins and requests Common Measures to Help with Security
  • 25. 25 ALL of them! Which of These Core Fundamentals Can Be Implemented in Other Areas of Your IT infrastructure?
  • 26. 26 Many of these characteristics can be found in NGINX and can even help you strengthen your existing IT infrastructure.
  • 27. 27 Quick Intro to NGINX • Open source version created in 2004 • NGINX, Inc. founded in 2011 • 140 million + known instances running today on the internet • #1 web server of choice on the top 100,000 busiest sites Igor Sysoev, NGINX creator and founder
  • 28. 28 Load Balancer Web Server Reverse Proxy Content Cache
  • 29. 29 Scalability NGINX - Open Source Layer 7 Software Load Balancer for HTTP(S) / TCP Application Delivery Platform API Gateway 10,000+ Virtual Servers Multi-tenancy NGINX Plus - Commercial Real Time Activity Monitoring API (status) Dynamic Upstream Reconfiguration API (upstream_conf)
  • 30. 30 NGINX Plus Real Time Activity Monitoring
  • 32. 32 Performance NGINX - Open Source High Throughput High Number of Concurrent Connections (1 Million+) Content Caching at Edge Low CPU/Memory Utilization Fine Tunable Configuration HTTP2!!!
  • 34. 34 Availability NGINX - Open Source HA Configurable with keepalived (IP Syncronization over VRRP) NGINX Plus - Commercial NGINX HA Package for Easy Configuration Application Aware Health Checks for Upstreams
  • 35. 35 Transparency NGINX - Open Source Combined with Global DNS Can Handle Global Load Balancing (Route53, Google, GoDaddy etc) Reverse Proxy - Single Entry Point NGINX Plus - Commercial Session Persistence (Cookie, Session, Route)
  • 36. 36 Openness NGINX - Open Source Open Source / Third Party Modules nginScript - JavaScript Inside NGINX Configurations Dynamic Loadable Modules COMING SOON! NGINX Plus - Commercial Simple HTTP Based APIs API with JSON Interface
  • 38. 38 Secureness NGINX - Open Source Authentication via auth_request Module SSL Support Client Certificate Based Authentication Support Bandwidth Limiting Connection Limiting Access Control Lists (ACLs) LDAP Support Reverse Proxy - Easily ACL Backend Resources NGINX Plus - Commercial NTLM Support
  • 39. 39 Thank you all again for coming! Twitter @webopsx Kevin Jones http://www.slideshare.net/KevinJones62 Q&A?
  • 40. 40 http://www.aosabook.org/en/distsys.html http://arxiv.org/pdf/0911.4395v1.pdf http://book.mixu.net/distsys/ http://the-paper-trail.org/blog/distributed-systems-theory-for-the-distributed-systems-engineer/ http://www.fit.vutbr.cz/~rabj/pdie/lecture_1.pdf http://www.cl.cam.ac.uk/~jac22/books/ods/ods/node18.html http://www.hpcs.cs.tsukuba.ac.jp/~tatebe/lecture/h23/dsys/dsd-tutorial.html http://cse.csusb.edu/tongyu/courses/cs660/notes/chap1.php http://www.opengroup.org/cloud/cloud/cloud_iop/cloud_port.htm http://www.toptal.com/security/10-most-common-web-security-vulnerabilities http://arxiv.org/pdf/1211.2032.pdf https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html http://nginx.org/en/docs/ http://www.aosabook.org/en/nginx.html https://www.nginx.com/resources/admin-guide/ https://www.nginx.com/blog/nginx-plus-authenticate-users/ References