Recently, I've had a lot less chance to write articles about hardware. Meanwhile, at Dell Technologies World held in the United States during Golden Week, there was an announcement of the modular server "PowerEdge MX" that was reviewed from the housing so that it could support the latest technology for a longer time. Also at IBM THINK in March, we talked about collaboration to make NVIDIA GPUs more efficient on POWER9 processor-based machines, which made us feel a little fresh.
IBM adopts IBM Z as its blockchain service platform
By the way, when it comes to hardware, the mainframe has been a bit of a concern these days. The representative is, of course, IBM's flagship machine IBM Z. Needless to say, this is a machine that is also described as "legacy". You might wonder what the mainframe is now in the cloud era. However, IBM announced the new Z models "IBM z14 Model ZR1" and "IBM LinuxONE Rockhopper II" in April 2018. These are positioned as "the latest mainframes best suited for cloud computing."
The IBM z14 Model ZR1 uses an industry-standard 19-inch rack-compatible single-frame design enclosure for easy deployment in cloud data centers and private cloud environments. In other words, the mainframe can be mounted in a 19-inch rack installed in an existing data center. Storage, networks, etc. can be stored in the same rack as the mainframe server, which makes it possible to realize a "compact data center". As a result, both the capacity increase of the mainframe environment and the reduction of installation space are achieved.
IBM is launching new mainframe products that are compatible with the cloud era because mainframes are still responsible for important transaction processing around the world. 86% of credit card transactions, or about $ 8 trillion annually, are processed on the mainframe. ATM's 29 billion transactions, about $ 5 billion per day, are also running on IBM mainframes. IBM mainframes process more than 30 billion transactions per day, which is even higher than Google's search process.
IBM Linux ONE has open Linux on this robust legacy server. In fact, IBM Z has already been running Linux since around 2000. I hear that it is often said that it is an integrated platform for Linux servers as a mainframe application that is newly introduced instead of updating an existing system. Currently supported Linux distributions are Red Hat, SUSE, and Ubuntu, on which Java runs and, of course, open source software such as MySQL and PostgreSQL can be used. In Japan, Bank of Tokyo-Mitsubishi UFJ has integrated 2,100 PC servers into four z / Linux, and Mizuho Bank has also integrated more than 100 servers into Z.
In the blockchain solution provided by IBM, IBM Linux ONE is running on the "IBM Blockchain Platform" provided in the cloud. Strong security is required to provide blockchain services for enterprise use, and IBM has dared to choose Z, which encrypts everything, as the platform. Specifically, I run a Secure Service Container on Z and use it to configure Hyperledger Fabric. In addition to security, it uses mainframes for its high performance, availability, and scalability.
* This continuation can only be read by members (registration is free).
Mainframes are useful for digital transformation in enterprise enterprises
IBM isn't the only one to argue that mainframes will play an important role in the new era of digital transformation. Ascock Lady, general manager of mainframes at CA Technologies, said that existing enterprises are more confident when they tackle digital transformation than digital natives like Google and Facebook. Point out that you want. Mainframes are also of great value as a platform that provides high reliability in the digital transformation.
“Existing enterprises are more credible than digital natives. Digital trusts are important for enterprises to make digital transformations,” Lady said.
When considering the digital trust that realizes this high reliability, the mainframe, which is originally robust and stable, is the best platform. However, on the other hand, the number of human resources for stable operation of mainframes is steadily decreasing. Therefore, the issue is how to optimize the mainframe environment so that the mainframe can be operated efficiently. "As mainframe engineers retire, we also need to use AI and machine learning technologies to automatically collect and analyze the information we need, and take action in advance," Lady said.
On top of that, as with open systems, it is necessary to meet the demands of authentication mechanisms that support access from various devices and data protection that prevents data from being unintentionally leaked overseas. The new strategy for CA Technologies to utilize mainframes is to make up for the shortage of mainframe human resources and enable the realization of DevSecOps similar to open systems on mainframe platforms.
Also, when using AI and machine learning technology, mainframes may actually require less resources than open systems. On top of that, open system technologies are steadily entering mainframes. If it is a mainframe, there is an environment in which high reliability and stable operation can be compensated for by the platform even when developing a real business using these new technologies. Therefore, even when utilizing new technologies such as AI and machine learning, the use of mainframes can actually bring out various merits.
“Mainframes will never run out. Mainframes will continue to play a part in the digital economy. CA will support companies that leverage mainframes to transform digitally. (Mr. Lady)
Many companies may not decide to introduce new mainframes for digital transformation. However, if the digital transformation we make requires high reliability and stability, we have them from the beginning rather than creating an environment that meets those requirements by combining open systems. You may also choose to take advantage of the mainframe. What exactly is required of the digital transformation platform we want to do, and what should we choose to achieve it? It's not necessarily the correct answer for cheap public cloud platforms, and there should be an idea of choosing a robust and highly secure mainframe from the beginning, just as IBM chose Z for its blockchain service.
What is the DevOps problem? What is "DevOps" that bridges the gap between the development team and the infrastructure operation team?
Accelerate DevOps Eliminate friction
What is the DevOps problem?
If it is a business form that always requires quick implementation, infrastructure security, and security protection, it is
essential to move to Mode 2 (offensive IT).
What is the DevOps problem? What is "DevOps" that bridges the gap between the development team and the infrastructure operation team?
https://interact.f5.com/jp-solutions-devops.html?utm_campaign=knowledge&utm_medium=cpc&utm_source=google
I shared it for studying.
I shared it for studying.
Accelerate DevOps Eliminate friction
between development and infrastructure operations teams
How to become a win-win?
Download materials nowWhat is the DevOps problem?
What is "DevOps" that bridges the gap between the development team and the infrastructure operation team?
Do you all know the term DevOps?
DevOps is a coined word that combines "Development" and "Infrastructure Operations Team".
Unlike agile development, which is often confused, agile development refers to development methods, and DevOps is referred to as organizational theory.
One of the methods to realize DevOps is said to be agile development, but there is no specific definition, and the concept is "development team and infrastructure operation team cooperate and cooperate with applications and software. To develop and operate.
Unlike agile development, which is often confused, agile development refers to development methods, and DevOps is referred to as organizational theory.
One of the methods to realize DevOps is said to be agile development, but there is no specific definition, and the concept is "development team and infrastructure operation team cooperate and cooperate with applications and software. To develop and operate.
■ Recommended books for understanding DevOps
・Science of Lean and DevOps [Accelerate] Strategic utilization of technology accelerates organizational change (impress top gear)
・The DevOps reversal! Ultimate Continuous Delivery
- The DevOps Handbook All Theories, Principles and Practices
・Science of Lean and DevOps [Accelerate] Strategic utilization of technology accelerates organizational change (impress top gear)
・The DevOps reversal! Ultimate Continuous Delivery
- The DevOps Handbook All Theories, Principles and Practices
In this DevOps, while the purpose of the development team is "addition of new functions" ,
the purpose of the infrastructure operation team is "stable operation" , so friction often occurs.
the purpose of the infrastructure operation team is "stable operation" , so friction often occurs.
Here, we will introduce the common problems of DevOps and the
F5 BIG-IP Cloud Edition that eliminates the problematic friction .
F5 BIG-IP Cloud Edition that eliminates the problematic friction .
Why development teams are rushing to market
Why is the development team so rushing to implement it?
Nowadays, the existence of applications is indispensable for deploying new services.
In addition, the environment in which applications can be developed and numerous methods have been established, and it has become extremely important to develop services in the market and proceed with modifications in response to feedback from user needs.
For this reason, becoming a pioneer has a great impact on later businesses.
Nowadays, the existence of applications is indispensable for deploying new services.
In addition, the environment in which applications can be developed and numerous methods have been established, and it has become extremely important to develop services in the market and proceed with modifications in response to feedback from user needs.
For this reason, becoming a pioneer has a great impact on later businesses.
Trends of IT companies until the application is put on the market
● 40% of current IT application investment
is DevOps model
is DevOps model
● Over 70% of settings and deployment procedures are automated
Source: F5 SOAD report
So if DevOps isn't working, you
can delay adoption and miss out on business opportunities.
can delay adoption and miss out on business opportunities.
Increasing cyber attacks and application security vulnerabilities
Due to prioritizing application release to the market, security measures may be neglected.
Cyber attacks targeting applications are diversifying and becoming more sophisticated, and the damage is endless.
Cyber attacks targeting applications are diversifying and becoming more sophisticated, and the damage is endless.
Application growth rate and security issues against cyber attacks
● The number of applications will increase at a CAGR of 19% by 2021
● The average number of applications deployed by companies is 200 or more, and smartphone users use 80 or more applications on their terminals.
● 36% of respondents said that less than 25% of applications are protected by WAF.
● Attacks on web applications are the number one cause of data leakage (29%)
● More than 3 billion credential information stolen in 2016
Source: F5 SOAD report
The number one cause of data leakage is from "web application attack"
The increasing number of applications and web application attacks that exploit security vulnerabilities are increasing the number of victims.
Ideally, the development team and infrastructure operations team should work together to quickly and reliably increase the value of the business and deliver it to the end user, but due to disagreements between them, sufficient measures and time cannot be given. It is said that this is a factor, but ...
DevOps issue: disagreement between development and operation
Why is there friction between development, infrastructure operations and security teams?
This is because their realities and ideals are in conflict with each other.
This is because their realities and ideals are in conflict with each other.
Ideal
● introduction = business apps
● want to raise the business speed
● want to immediately implement the user needs
● introduction = business apps
● want to raise the business speed
● want to immediately implement the user needs
Reality
● It takes time to release the service due to the arrangement of infrastructure equipment and security measures.
● It takes time to release the service due to the arrangement of infrastructure equipment and security measures.
Ideal
● I want to provide an infrastructure that realizes stable services
● I want to provide an infrastructure that realizes stable services
Reality
● Implementation is required according to each application and infrastructure is complicated
● Stable and safe implementation method does not match the pace of application release
● Implementation is required according to each application and infrastructure is complicated
● Stable and safe implementation method does not match the pace of application release
Ideal
● I want to implement a unified security function
● I want to implement a unified security function
Reality
● Difficult to centrally manage security
● Difficult to apply security according to application
● Difficult to centrally manage security
● Difficult to apply security according to application
While the development team aims to "add functions" , the infrastructure operation team aims to "maintain a stable system state", so it is difficult to achieve both ideals.
In addition, security teams demand security measures for applications , which inevitably conflicts with the demands of the three teams.
In addition, security teams demand security measures for applications , which inevitably conflicts with the demands of the three teams.
Infrastructure operation team "I want to provide infrastructure that realizes stable services"
Development team "Fulfill requests faster and shorten the time to market"
Security operation team "Uniform security functions" Implementation "
Development team "Fulfill requests faster and shorten the time to market"
Security operation team "Uniform security functions" Implementation "
What if there was a tool that could fulfill the various ideals and enable DevOps?
F5 BIG-IP Cloud Edition 4 Benefits
[1] Development team can deploy by themselves using templates
Development team
● Quick implementation is possible without relying on the operation team
● No need to create tickets
● Quick implementation is possible without relying on the operation team
● No need to create tickets
Infrastructure operation team
● Reduction of application implementation work other than major specification changes
● Concentrate only on operation work
● Reduction of application implementation work other than major specification changes
● Concentrate only on operation work
Security team
●
Security is ensured by unified security functions
●
Security is ensured by unified security functions
[2] ADC for each single application
Development team
● Visualize detailed application information, and see traffic and performance at a glance
● Visualize detailed application information, and see traffic and performance at a glance
Infrastructure operation team
● Stable operation is possible
● Changes are not applied to all applications due to ADC setting changes
● Risk reduction due to troubles such as malfunctions
● Stable operation is possible
● Changes are not applied to all applications due to ADC setting changes
● Risk reduction due to troubles such as malfunctions
[3] Auto scale as needed
Infrastructure operation team
● Stable operation of the system even when traffic increases suddenly
● Stable operation of the system even when traffic increases suddenly
[4] Cost-effective service for applications
Security team
● WAF can be assigned to each single application, providing the best protection for each application.
● WAF can be assigned to each single application, providing the best protection for each application.
Templates used by development teams when deploying self-apps
You can work intuitively via GUI or API.
The development team self-deploys the implementation work that was previously carried out by the infrastructure operation team.
The development team self-deploys the implementation work that was previously carried out by the infrastructure operation team.
Visualized application display screen
By assigning an ADC to each application
, the ease of management and operation is dramatically improved. It is possible to use ADC and security policy properly
according to the characteristics of the application
!
, the ease of management and operation is dramatically improved. It is possible to use ADC and security policy properly
according to the characteristics of the application
!
Infrastructure construction according to application characteristics
Understanding the concept of "bimodal" is very important in building an IT infrastructure.
This means maintaining a mission-critical system and providing innovative applications for digital transformation "at the same time."
This means maintaining a mission-critical system and providing innovative applications for digital transformation "at the same time."
Gartner calls these two "mode 1 / mode 2", and they are also called defensive IT and offensive IT, respectively.
Since these need to cooperate and be compatible with each other, it does not mean that only one of them needs to be dealt with.
However, it must also be taken into account that corporate IT expectations are shifting from mode 1 to mode 2.
However, it must also be taken into account that corporate IT expectations are shifting from mode 1 to mode 2.
Mode 1 (defensive IT) : Conventional BIG-IP
Ideal for systems in areas where there is little change and reliability and stability are important
Mode 1 (defensive IT) systems often aim to reduce costs by improving efficiency, and are centered on core operations such as personnel, accounting, and production control.
● High quality and stable operation
● Steady and accurate
● High cost / price
● Thorough support
● Safety and security
● Steady and accurate
● High cost / price
● Thorough support
● Safety and security
If you don't need to change frequently, this is the best way to manage multiple applications with a single ADC.
Mode 2 (Aggressive IT) : BIG-IP Cloud Edition
Ideal for systems that emphasize speed of development / improvement and "ease of use"
Mode 2 (offensive IT) often aims to strengthen competitiveness and increase profits through differentiation, and focuses on digital businesses integrated with IT and services that require communication with customers.
● Fast and agile
● Low cost / price
● Convenient and quick support
● High satisfaction
● Low cost / price
● Convenient and quick support
● High satisfaction
Since ADCs are assigned to each single application, this configuration enables immediate reflection and understanding of the operational status.
If it is a business form that always requires quick implementation, infrastructure security, and security protection, it is
essential to move to Mode 2 (offensive IT).
Offensive IT dramatically reduces the previously time-consuming flow
Approximately one month or more, which used to take the conventional flow, has been completely
shortened!
shortened!
By being able to concentrate on each other's work, we can acquire a win-win status.
0 コメント:
コメントを投稿