2021年11月15日月曜日

The system on LINUX operates while providing encryption processing and DevOps environment on the mainframe (general-purpose machine) on the 19-inch rack mount.

edited by  DB Online    2018/05/24 06:00

 Recently, I've had a lot less chance to write articles about hardware. Meanwhile, at Dell Technologies World held in the United States during Golden Week, there was an announcement of the modular server "PowerEdge MX" that was reviewed from the housing so that it could support the latest technology for a longer time. Also at IBM THINK in March, we talked about collaboration to make NVIDIA GPUs more efficient on POWER9 processor-based machines, which made us feel a little fresh.






























IBM adopts IBM Z as its blockchain service platform

































cap
Z14 dual frame machine exhibited at IBM THINK 2018
(separate from the z14 Model ZR1 mentioned in the text)

 By the way, when it comes to hardware, the mainframe has been a bit of a concern these days. The representative is, of course, IBM's flagship machine IBM Z. Needless to say, this is a machine that is also described as "legacy". You might wonder what the mainframe is now in the cloud era. However, IBM announced the new Z models "IBM z14 Model ZR1" and "IBM LinuxONE Rockhopper II" in April 2018. These are positioned as "the latest mainframes best suited for cloud computing."
 The IBM z14 Model ZR1 uses an industry-standard 19-inch rack-compatible single-frame design enclosure for easy deployment in cloud data centers and private cloud environments. In other words, the mainframe can be mounted in a 19-inch rack installed in an existing data center. Storage, networks, etc. can be stored in the same rack as the mainframe server, which makes it possible to realize a "compact data center". As a result, both the capacity increase of the mainframe environment and the reduction of installation space are achieved.
 IBM is launching new mainframe products that are compatible with the cloud era because mainframes are still responsible for important transaction processing around the world. 86% of credit card transactions, or about $ 8 trillion annually, are processed on the mainframe. ATM's 29 billion transactions, about $ 5 billion per day, are also running on IBM mainframes. IBM mainframes process more than 30 billion transactions per day, which is even higher than Google's search process.
 IBM Linux ONE has open Linux on this robust legacy server. In fact, IBM Z has already been running Linux since around 2000. I hear that it is often said that it is an integrated platform for Linux servers as a mainframe application that is newly introduced instead of updating an existing system. Currently supported Linux distributions are Red Hat, SUSE, and Ubuntu, on which Java runs and, of course, open source software such as MySQL and PostgreSQL can be used. In Japan, Bank of Tokyo-Mitsubishi UFJ has integrated 2,100 PC servers into four z / Linux, and Mizuho Bank has also integrated more than 100 servers into Z.
 In the blockchain solution provided by IBM, IBM Linux ONE is running on the "IBM Blockchain Platform" provided in the cloud. Strong security is required to provide blockchain services for enterprise use, and IBM has dared to choose Z, which encrypts everything, as the platform. Specifically, I run a Secure Service Container on Z and use it to configure Hyperledger Fabric. In addition to security, it uses mainframes for its high performance, availability, and scalability.
* This continuation can only be read by members (registration is free).

Mainframes are useful for digital transformation in enterprise enterprises

 IBM isn't the only one to argue that mainframes will play an important role in the new era of digital transformation. Ascock Lady, general manager of mainframes at CA Technologies, said that existing enterprises are more confident when they tackle digital transformation than digital natives like Google and Facebook. Point out that you want. Mainframes are also of great value as a platform that provides high reliability in the digital transformation.




























CA Technologies Mainframe General Manager Ashock Lady
CA Technologies Mainframe General Manager 
Ashock Lady

 “Existing enterprises are more credible than digital natives. Digital trusts are important for enterprises to make digital transformations,” Lady said.
 When considering the digital trust that realizes this high reliability, the mainframe, which is originally robust and stable, is the best platform. However, on the other hand, the number of human resources for stable operation of mainframes is steadily decreasing. Therefore, the issue is how to optimize the mainframe environment so that the mainframe can be operated efficiently. "As mainframe engineers retire, we also need to use AI and machine learning technologies to automatically collect and analyze the information we need, and take action in advance," Lady said.
 On top of that, as with open systems, it is necessary to meet the demands of authentication mechanisms that support access from various devices and data protection that prevents data from being unintentionally leaked overseas. The new strategy for CA Technologies to utilize mainframes is to make up for the shortage of mainframe human resources and enable the realization of DevSecOps similar to open systems on mainframe platforms.
 Also, when using AI and machine learning technology, mainframes may actually require less resources than open systems. On top of that, open system technologies are steadily entering mainframes. If it is a mainframe, there is an environment in which high reliability and stable operation can be compensated for by the platform even when developing a real business using these new technologies. Therefore, even when utilizing new technologies such as AI and machine learning, the use of mainframes can actually bring out various merits.
 “Mainframes will never run out. Mainframes will continue to play a part in the digital economy. CA will support companies that leverage mainframes to transform digitally. (Mr. Lady)
 Many companies may not decide to introduce new mainframes for digital transformation. However, if the digital transformation we make requires high reliability and stability, we have them from the beginning rather than creating an environment that meets those requirements by combining open systems. You may also choose to take advantage of the mainframe. What exactly is required of the digital transformation platform we want to do, and what should we choose to achieve it? It's not necessarily the correct answer for cheap public cloud platforms, and there should be an idea of ​​choosing a robust and highly secure mainframe from the beginning, just as IBM chose Z for its blockchain service.

What is the DevOps problem? What is "DevOps" that bridges the gap between the development team and the infrastructure operation team?








What is the DevOps problem?
What is "DevOps" that bridges the gap between the development team and the infrastructure operation team?

Do you all know the term DevOps?
DevOps is a coined word that combines "Development" and "Infrastructure Operations Team".
Unlike agile development, which is often confused, agile development refers to development methods, and DevOps is referred to as organizational theory.
One of the methods to realize DevOps is said to be agile development, but there is no specific definition, and the concept is "development team and infrastructure operation team cooperate and cooperate with applications and software. To develop and operate.
In this DevOps, while the purpose of the development team is "addition of new functions" ,
the purpose of the infrastructure operation team is "stable operation" , so friction often occurs.
Here, we will introduce the common problems of DevOps and the
F5 BIG-IP Cloud Edition that eliminates the problematic friction .
devops_comic01.jpg

Why development teams are rushing to market


Why is the development team so rushing to implement it?
Nowadays, the existence of applications is indispensable for deploying new services.
In addition, the environment in which applications can be developed and numerous methods have been established, and it has become extremely important to develop services in the market and proceed with modifications in response to feedback from user needs.
For this reason, becoming a pioneer has a great impact on later businesses.

Trends of IT companies until the application is put on the market

Development team requests to reduce time to market
● 40% of current IT application investment
 is DevOps model
● Over 70% of settings and deployment procedures are automated
Source:  F5 SOAD report
So if DevOps isn't working, you
can delay adoption and miss out on business opportunities.
Moreover


Increasing cyber attacks and application security vulnerabilities


Due to prioritizing application release to the market, security measures may be neglected.
Cyber ​​attacks targeting applications are diversifying and becoming more sophisticated, and the damage is endless.

Application growth rate and security issues against cyber attacks

application
 The number of applications will increase at a CAGR of 19% by 2021
● The average number of applications deployed by companies is 200 or more, and smartphone users use 80 or more applications on their terminals.
Security
 36% of respondents said that less than 25% of applications are protected by WAF.
● Attacks on web applications are the number one cause of data leakage (29%)
● More than 3 billion credential information stolen in 2016
Source:  F5 SOAD report

The number one cause of data leakage is from "web application attack"


The increasing number of applications and web application attacks that exploit security vulnerabilities are increasing the number of victims.
Ideally, the development team and infrastructure operations team should work together to quickly and reliably increase the value of the business and deliver it to the end user, but due to disagreements between them, sufficient measures and time cannot be given. It is said that this is a factor, but ...
devops_comic02.jpg

DevOps issue: disagreement between development and operation


Why is there friction between development, infrastructure operations and security teams?
This is because their realities and ideals are in conflict with each other.
Development team
Ideal
 introduction = business apps
 want to raise the business speed
 want to immediately implement the user needs
Reality
● It takes time to release the service due to the arrangement of infrastructure equipment and security measures.
Infrastructure operations team
Ideal
 I want to provide an infrastructure that realizes stable services
Reality
 Implementation is required according to each application and infrastructure is complicated
 Stable and safe implementation method does not match the pace of application release
Security team
Ideal
 I want to implement a unified security function
Reality
 Difficult to centrally manage security
 Difficult to apply security according to application
Conflict between each reality and ideal
While the development team aims to "add functions" , the  infrastructure operation team aims to "maintain a stable system state", so it is difficult to achieve both ideals.
In addition, security teams demand security measures for applications , which inevitably conflicts with the demands of the three teams.
↓
Infrastructure operation team "I want to provide infrastructure that realizes stable services"
Development team "Fulfill requests faster and shorten the time to market"
Security operation team "Uniform security functions" Implementation "
What if there was a tool that could fulfill the various ideals and enable DevOps?
↓
BIG-IP Cloud Edition
devops_comic03.jpg

F5 BIG-IP Cloud Edition 4 Benefits


[1] Development team can deploy by themselves using templates

Use template
Development team
 Quick implementation is possible without relying on the operation team
● No need to create tickets
Infrastructure operation team
 Reduction of application implementation work other than major specification changes
 Concentrate only on operation work
Security team

 Security is ensured by unified security functions

[2] ADC for each single application

ADC per single application
Development team
 Visualize detailed application information, and see traffic and performance at a glance
Infrastructure operation team
 Stable operation is possible
 Changes are not applied to all applications due to ADC setting changes
 Risk reduction due to troubles such as malfunctions

[3] Auto scale as needed

Auto scale
Infrastructure operation team
 Stable operation of the system even when traffic increases suddenly

[4] Cost-effective service for applications

Cost-effective application services
Security team
 WAF can be assigned to each single application, providing the best protection for each application.
devops_comic04.jpg
devops_comic05.jpg

Templates used by development teams when deploying self-apps

Template to use when deploying self-app
You can work intuitively via GUI or API.
The development team self-deploys the implementation work that was previously carried out by the infrastructure operation team.

Visualized application display screen


Template to use when deploying self-app
By assigning an ADC to each application
, the ease of management and operation is dramatically improved. It is possible to use ADC and security policy properly
according to the characteristics of the application
!
↓

Infrastructure construction according to application characteristics


Understanding the concept of "bimodal" is very important in building an IT infrastructure.
This means maintaining a mission-critical system and providing innovative applications for digital transformation "at the same time."
Gartner calls these two "mode 1 / mode 2", and they are also called defensive IT and offensive IT, respectively.
Bimodal
Since these need to cooperate and be compatible with each other, it does not mean that only one of them needs to be dealt with.
However, it must also be taken into account that corporate IT expectations are shifting from mode 1 to mode 2.

Mode 1 (defensive IT) : Conventional BIG-IP


Ideal for systems in areas where there is little change and reliability and stability are important
Mode 1: Conventional BIG-IP

Mode 1 (defensive IT) systems often aim to reduce costs by improving efficiency, and are centered on core operations such as personnel, accounting, and production control.
 High quality and stable operation
 Steady and accurate
 High cost / price
 Thorough support
 Safety and security
If you don't need to change frequently, this is the best way to manage multiple applications with a single ADC.

Mode 2 (Aggressive IT) : BIG-IP Cloud Edition


Ideal for systems that emphasize speed of development / improvement and "ease of use"
Mode 2: BIG-IP Cloud Edition

Mode 2 (offensive IT) often aims to strengthen competitiveness and increase profits through differentiation, and focuses on digital businesses integrated with IT and services that require communication with customers.
 Fast and agile
 Low cost / price
 Convenient and quick support
 High satisfaction
Since ADCs are assigned to each single application, this configuration enables immediate reflection and understanding of the operational status.
↓

If it is a business form that always requires quick implementation, infrastructure security, and security protection, it is
essential to move to Mode 2 (offensive IT).
↓

Offensive IT dramatically reduces the previously time-consuming flow


Dramatically shortened flow

Service Overview Accelerate life cycle, cloud on-pre-seamless use
Approximately one month or more, which used to take the conventional flow, has been completely
shortened!
By being able to concentrate on each other's work, we can acquire a win-win status.
devops_sec6_img06.png
devops_comic06.jpg

0 コメント:

コメントを投稿