Welcome!

SDN Journal Authors: Nicole Bryan, Liz McMillan, Elizabeth White, Pat Romanski, Greg Schulz

Blog Feed Post

Device Packages: Integrating F5 Synthesis with Cisco APIC

#ACI #SDAS #devops #SDN Because something's got to change - and change radically.

budget-lights-onAccording to a recent IDC report, OPEX costs are doubling every eight years. Important to consider is this data is based on historical trends, and doesn't necessarily take into consideration the forthcoming explosions in applications and data resulting from technological shifts like the Internet of Things.

Even so, it's no wonder that almost every study done on IT budgets pegs operating expenses - the "keep the lights on and apps running" kind of operating expenses - at upwards of 70% of the total budget.

Something, obviously, has to change - and change radically.

Cloud, devops and SDN all point organizations in the same direction - operationalization through automation, orchestration and ultimately, integration via open, standards-based APIs and protocols.

That's ultimately the goal of Cisco's Application Centric Infrastructure (ACI) strategy, which seeks to address the challenges in scaling networks and services not only from a technology perspective, but from a people perspective. Part of the reason for the significant chunk of IT budgets that is spent on operations comes from the reality that configuration - the state of the network - is spread across tens and hundreds and sometimes thousands of myriad network devices. From layer 2 to layer 7, organizations use a veritable cornucopia of network and application services to keep the business running by delivering the applications upon which business relies.

Deploying an application can take days or weeks because of the coordination required across not just the devices themselves (and whether virtual or physical makes no never mind as configuration is agnostic with respect to form factor) but across what are increasingly siloed IT teams: operations, security and networking.

Cisco's ACI aims to reduce the friction that slows down service deployment by centralizing policy control and coordination and automating provisioning and configuration of services across the entire L2-7 landscape.

Yeah, that's a pretty big ask.

But Cisco isn't planning on doing it alone.

IT TAKES an ECOSYSTEM

The centerpiece of Cisco's ACI strategy, APIC, provides the means by which all the various L2-7 services in the data center can be easily integrated with virtually no disruption to existing service architectures. It manages this feat by enabling providers of those services, like F5, to develop a device package (similar to a plug-in) to an open specification that APIC can consume and use to communicate and coordinate application-specific policies.

A device package is two pieces: the device model (an XML file) and a device script (written in Python). The device model describes in a standardized, APIC-consumable format what functions are available in the device script. Then APIC can call on those functions to provision the services specified by the open source policy and the device script in turn communicates with the provider of those services using whatever mechanism they choose. In the case of F5 Synthesis, that's our open, standards-based API iControl.

apic-synthesis-integration

Today, what we've announced, is an F5 device package for the Cisco Application Policy Infrastructure Controller (APIC). Initially the device package supports three services:

1. L4-7 load balancing

2. SSL offload

3. SharePoint Deployments 

The SharePoint deployment is unique because in addition to the standard use of iControl to provision the service, customers get the expertise that comes with thousands of SharePoint deployments all bundled up into a nice neat programmable iApp. That means best practices for a highly optimized SharePoint deployment are packaged up and provisioned through Cisco APIC. 

The device package model is extensible, so services in the F5 Software Defined Application Services portfolio can be easily added to a Cisco ACI architecture in the future.

COEXIST

The magnitude of the tectonic shifts in technology today has never been this disruptive (just count the number of #hashtags we've got going on Twitter these days) since the dot com days. And now we've got both our web-scale architectures to worry about while we try to prepare for the coming hyper-scale architectures. But we can't abandon ship and start anew, we've got to maintain what we have while we go forth and conquer. That means architectures that can bridge the gap between the existing and the new, that can insulate applications from the massive disruption that comes whenever anything substantially changes the way we build and manage the foundation of both IT and business today: the network.

F5 Synthesis is that bridge. It's the abstraction layer capable of delivering yesterday's applications while enabling tomorrow's. By integrating with Cisco ACI, F5 Synthesis allows customers to operationalize the entire network and start migrating to the policy-based, application-driven network architectures so necessary to succeed in an app and "thing" economy without compromising on security, performance or availability of both existing and new applications.

The F5 Device Package for Cisco APIC will be available as a free download via downloads.f5.com in summer 2014.

 

 

*Budget statistic http://www.computerworld.com/s/article/9243312/How_to_balance_maintenance_and_IT_innovation

Read the original blog entry...

More Stories By Lori MacVittie

Lori MacVittie is responsible for education and evangelism of application services available across F5’s entire product suite. Her role includes authorship of technical materials and participation in a number of community-based forums and industry standards organizations, among other efforts. MacVittie has extensive programming experience as an application architect, as well as network and systems development and administration expertise. Prior to joining F5, MacVittie was an award-winning Senior Technology Editor at Network Computing Magazine, where she conducted product research and evaluation focused on integration with application and network architectures, and authored articles on a variety of topics aimed at IT professionals. Her most recent area of focus included SOA-related products and architectures. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University.

@CloudExpo Stories
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high quality and comprehensive student-athlete experience. The program sponsors 17 varsity teams and in their history, the Colorado Buffaloes have collected an impressive 28 national championships. Maintaining uptime...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Edge Hosting has announced a partnership with and the availability of CloudFlare, a web application firewall, CDN and DDoS mitigation service. “This partnership enhances Edge Hosting’s world class, perimeter layer, application (layer 7) defensive mechanism,” said Mark Houpt, Edge Hosting CISO. “The goal was to enable a new layer of customer controlled defense and compliance through the application of DDoS filters and mitigations, the web application firewall (WAF) feature and the added benefit ...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...