You are on page 1of 24

MI

Modern Infrastructure
Citrix Synergy and Modern Infrastructure Decisions Summit
Creating tomorrow’s data centers
Home

Editor’s Letter

Mad About
Microsegmentation
EDITOR’S LETTER

Break It Down
#HASHTAG

Twitter on
#Hashtag #DevOps

Cloud Backup
Correction

Survey Says DATA PROTECTION DATA

Cloud Backup Disaster Recovery


Show Them
The Money Correction Plans Not Frequently
Checked
Overheard

The Next Big Thing


IT OPERATIONS OVERHEARD

In The Mix Show Them @Container World


the Money

Mad about THE NEXT BIG THING

You Will Be
IN THE MIX

Get Over It
Microsegmentation Assimilated
Breaking up is hard to do.

MARCH 2016, VOL. 5, NO. 3


EDITOR’S LETTER

Home

Editor’s Letter

Mad About
Microsegmentation
Break It Down public cloud, and sometimes (often), cloud-based appli-
cations aren’t being properly protected. In “Cloud Backup
Correction,” I describe what tools are available to backup
#Hashtag cloud-based apps, some novel approaches to backup that
cloud makes possible (Lambda function, anyone?), and
Cloud Backup
Correction
some backup challenges that have yet to be solved.
THESE DAYS, THE technology industry seems fixated on All this complexity has some IT pros throwing in the
Survey Says breaking things apart into ever-smaller units for greater towel—at least, when it comes to undifferentiated tasks
levels of “granularity.” Traditional standalone applications like security and backup. With the pain of a recently sur-
Show Them are maligned as “monoliths” that must be broken apart faced Linux vulnerability fresh on his mind, contributor
The Money
in to their component pieces, or “microservices.” Broad- Bob Plankers makes a bold suggestion: “Let’s throw it all
brush security that covers an entire network is deemed away” and move applications out of the data center, and
Overheard
insufficient, to be replaced by “microsegementation”—ap- adopt software as a service versions thereof. “Why are you
The Next Big Thing
plying security policies on a per-workload basis. running your own three-tier application when you could
But breaking up is hard to do. In his story, “Mad About just buy the product in ready-made form?” he asks. Mov-
In The Mix Microsegmentation,” senior technology editor Stephen ing applications to infrastructure as a service doesn’t cut
Bigelow lays out some of the pitfalls that will befall opera- it—it won’t protect you from having to remediate vulner-
tors as they go down this road. For instance, many network abilities such as CVE-2015-7457. Cutting to the chase and
and security tools don’t provide the necessary visibility in adopting SaaS frees IT up to be much more productive,
to traffic patterns and relationships between applications as “the time we spend patching and maintaining our old
that microsegmentation demands. applications, which will never be anything but an anchor,
Breaking with tradition is hard too. For decades, one are drowning us in the past.”
of IT’s primary responsibilities has been to protect its In other words, if it ain’t broke, don’t fix it. But if it is
systems from catastrophic failure by performing regular broken, by all means, do! n
point-in-time backups that can get back to a known good
state. In the data center, that meant agent- or image-based ALEX BARRETT is editor in chief of Modern Infrastructure.
backup tools, but those tools don’t map cleanly to the Contact her at abarrett@techtarget.com.

MODERN INFRASTRUCTURE • MARCH 2016   2


MICROSEGMENTATION

NETWORK SECURITY IS a growing problem in the enterprise:


infrastructure complexity, higher traffic volumes, more
applications and data stores, and an unending array of
threats put the business at ever-increasing risk. Enter
microsegmentation.
CIOs and IT architects are rethinking traditional se-
curity approaches and embracing new technologies that
can enhance today’s virtualized data center with greater
granularity and responsiveness. Microsegmentation is an
emerging security technology that breaks the data center
into logical elements and manages them with high-level
security policies. This helps to isolate access and limit
lateral movement of malicious activity if traditional pe-

Mad About
rimeter security is breached.
Microsegmentation promises a series of benefits for the
business, but imposes some prerequisites and potential

Microsegmentation pitfalls that IT professionals should understand.

Software-defined security can administer


powerful policies that enforce granular rules MICROSEGMENTATION DEFINED
while maintaining workload flexibility. In basic networking parlance, “segmentation” breaks an
BY STEPHEN J. BIGELOW Ethernet network into subnetworks (or subnets) which
allow network traffic to be organized and contained rather
than sending every packet to every node all the time.
EMOJOEZ

HOME
MODERN INFRASTRUCTURE • MARCH 2016   3
Network segmentation offers elementary tools to boost been sparked by software-defined networking (SDN)
Home
network performance and introduce simple security in and software-defined data center (SDDC) technologies
Editor’s Letter
traditional static networks. capable of abstracting hardware. Before the advent of soft-
Microsegmentation builds on this elementary idea ware-defined technologies, any sort of microsegmentation
Mad About by abstracting new layers of virtualization and control. initiative would require traditional physical firewalls
Microsegmentation With microsegmentation, the data center is divided (seg- and VLANs. The manual effort involved in configuring
mented) into logical units, which are often workloads or internal firewalls for east-west traffic control—and then
#Hashtag applications. IT can then tailor unique security policies maintaining those configurations over time—was simply
and rules for each logical unit. The idea is to significantly too complex and costly. By contrast, SDN and SDDC ca-
Cloud Backup
Correction
reduce the surface available for malicious activity and pabilities support on-demand provisioning, the flexibility
restrict unwanted lateral (east-west) traffic—such as an to change parameters, and the ability to enforce security
Survey Says attack—once a perimeter is penetrated. Since policies are across each VM.
tied to logical segments, any workload migration will also
Show Them move the security policies. This eliminates the tedious,
The Money
error-prone manual configuration processes that often BENEFITS OF MICROSEGMENTATION
lead to security flaws. Traditional firewalls can remain in place to maintain
Overheard
“Microsegmentation is the application and enforce- familiar perimeter (north-south) defenses, but microseg-
The Next Big Thing
ment of security functions as close as possible to the given mentation significantly limits unwanted communication
application,” said Pete Sclafani, COO and co-founder of between workloads (east-west) within the enterprise.
In The Mix 6connect, a software and services company that offers This zero-trust approach addresses the dramatic shift in
network resource provisioning and automation. “In the network attack patterns where attackers penetrate the
past, this has been centralized ‘up the stack’ so there are perimeter and bide their time to watch activity, inject
quite a few gray areas that open the door for security issues malware and gain control of key systems—finally to steal
even if policies are properly configured.” valuable data or disrupt business activities.
Microsegmentation isn’t new, but its adoption has Software rules-based behavior also allows micro-

n Microsegmentation promises benefits, but imposes prerequisites and potential pitfalls.


HIGHLIGHTS n Microsegmentation abstracts new levels of virtualization and control.
n With microsegmentation, the data center is divided into logical units, usually workload or apps.

MODERN INFRASTRUCTURE • MARCH 2016   4


segmentation to support fast, flexible and granular secu- microsegmentation rules applied to a workload (usually
Home
rity configurations around each workload. IT administra- installed on a virtual machine) will follow the workload.
Editor’s Letter
tors no longer need to manually configure firewall and For example, workloads can be migrated to balance com-
router rules on individual hardware devices and risk mis- puting loads or support systems maintenance without the
Mad About takes and oversights that might cause new vulnerabilities need to reconfigure or create new security rules. This can
Microsegmentation or impair performance. also translate to better risk mitigation, security auditing
“Security policy changes in a centralized architecture and compliance for the enterprise.
#Hashtag had significant risk of service interruption even among “Microsegmentation is about moving faster but se-
services that weren’t directly affected,” Sclafani said. curely,” said one IT leader from a major sporting goods
Cloud Backup
Correction
“There are so many documented experiences where some- retailer. “Using a software-based approach that interacts
one updated the firewall rule set, but caused unintended directly with the hypervisor means we can “templatize”
Survey Says consequences for a different downstream application that our security approach—we can create cookie cutter sys-
should not have been affected.” tem builds that include security as a base ingredient from
Show Them Better security and fine-grained control translate into the start. It’s not a random addition; now it’s part of the
The Money
simpler network designs. For example, “network hair- recipe.”
pinning” occurs when two (or more) hosts within the
Overheard
same subnetwork cannot communicate with each other
The Next Big Thing
directly—each must communicate by sending traffic out MAKING MICROSEGMENTATION WORK
of the subnet first, and then direct that traffic back to the Just as with conventional virtualization, there is no one
In The Mix intended destination server within the subnet. This allows way to implement microsegmentation. In most situations,
the network to implement common points of security, the existing legacy infrastructure and protection mecha-
but the traffic essentially makes a “hairpin turn” on the nisms are systematically augmented with new technolo-
network. Hairpinning raises traffic levels but doesn’t really gies including software-defined networks, virtual firewalls
benefit the environment (other than allowing otherwise and so on. But the adoption of microsegmentation tech-
isolated endpoints to communicate). Microsegmentation nology involves several major considerations.
allows direct east-west communication between systems The first consideration is visibility. Potential adopters
and eliminates the need to hairpin traffic; simplifying the must have a thorough understanding of network traffic
network and improving network performance. flow and communication patterns to, from and within
In addition, the microsegmentation security policies the data center. This usually requires analytical tools that
established for each workload are now tied to the work- can recognize traffic patterns and key relationships—it’s
load rather than the network hardware. This means any almost impossible to map the correct services and firewall

MODERN INFRASTRUCTURE • MARCH 2016   5


policies for each workload with a manual approach. frequently to ensure that workloads and policies do not
Home
For example, analytics should be able to spot groups of change unexpectedly, and that any new analytical results
Editor’s Letter
related workloads with common characteristics such as (perhaps due to new applications or changes in traffic
workloads on the same physical subnet, and recognize patterns) can be used to tune microsegmentation rules.
Mad About shared services like the organization’s domain name sys- All of these considerations put a definite emphasis on
Microsegmentation tem (DNS). Analytics should also identify relationships the choice of hypervisor and tools used to facilitate mi-
between different applications as well as potentially vul- crosegmentation. “We realized the interaction between
#Hashtag nerable network areas and highlight points of network the SDN layer and the physical layer needed to be visu-
inefficiency (such as hairpinning).
Cloud Backup
Analytical models form the basis for new security rules
Correction
and policies for microsegmentation while minimizing ANALYZING TRAFFIC AND
Survey Says the errors and oversights that might break important DISTILLING RULES IS NOT
relationships. Similarly, a policy definition and orches- A ONE-TIME DEPLOYMENT
Show Them tration system is vital to create the policies needed for EFFORT, BUT A CONTINUOUS
The Money
microsegmentation and push those policies out to the
infrastructure. 6Connect’s Sclafani points out that not ACTIVITY.
Overheard
every application is necessarily a suitable candidate for
The Next Big Thing
microsegmentation. Careful review and assessment alized,” said the sporting goods retailer IT leader. “You
of analytical models can help to expose possible prob- need a single tool that understands both. You also need a
In The Mix lem workloads or network elements before deploying tool that works for the cloud team, the storage team, the
microsegmentation. network team and operations.”
Next, implement security rules and policies using a VMware and Palo Alto Networks have partnered for
zero-trust approach—a complete lockdown of communi- microsegmentation using NSX in concert with hypervisor
cations—and follow zero-trust principles throughout the platforms like vSphere and management tools like vCen-
microsegmentation deployment. Communication across ter, while Cisco Systems employs its Application Centric
the network should only be allowed selectively based on Infrastructure (ACI) to support microsegmentation.
results of the previous analysis. This is the best practice to There are also third-party tools that can help including
ensure application connectivity and security. Arkin’s Visibility Platform for microsegmentation plan-
Repeat this process on a regular basis. Analyzing traffic ning, analysis, monitoring and troubleshooting, and CA
and distilling rules is not a one-time deployment effort, Spectrum for managing physical, virtual and cloud envi-
but a continuous activity that should be undertaken ronments along with network virtualization.

MODERN INFRASTRUCTURE • MARCH 2016   6


MICROSEGMENTERS BEWARE and application performance. Kumar echoes 6connect’s
Home
Microsegmentation is a powerful concept poised to facil- Sclafani’s observation that all applications may not be
Editor’s Letter
itate better security and agility in emerging software-de- suited for microsegmentation—especially low-latency,
fined environments, but it’s not a cure for every network performance-sensitive applications (such as real-time
Mad About ailment. Business and IT leaders must weigh some of the trading tools).
Microsegmentation potential downsides to microsegmentation deployment Finally, don’t overlook the organizational effects of
before committing to the technology. microsegmentation, which tends to span computing,
#Hashtag Complexity is perhaps the most insidious pitfall. “It can networking, and security disciplines. Different groups
get complex to model the application behavior and the
Cloud Backup
right set of firewall rules,” said Mahesh Kumar, head of
Correction
marketing at Arkin Net Inc. “Too granular and it becomes NOT ALL APPLICATIONS
Survey Says hard to manage. Too broad and it defeats the purpose.” In ARE SUITED FOR MICROSEG-
addition, it’s important to account for all workloads—even MENTATION—ES­PECIALLY
Show Them idle or powered-down VMs. Otherwise an idle workload LOW-LATENCY, PERFORM-
The Money
may come online in lockdown without the ability to
communicate properly. Complexity issues translate into ANCE-SENSITIVE ONES.
Overheard
potential connectivity and availability problems for en-
The Next Big Thing
terprise applications. can make changes that affect security, and this can lead
Consistency arises as a second concern. Since microseg- to communication breakdowns, conflicts, and pushback
In The Mix mentation basically distributes security policies and rules from those traditionally siloed groups. Clear understand-
to workloads, it’s important that those policies and rules ing and interaction between these groups is essential for
follow consistent guidelines. Without guidelines or best long-term adoption and success. “It takes time for the
practices, it’s possible for policies to shift between work- people part to catch on,” said the sporting goods retailer.
loads or locations. Consistency problems can result in “You need to think differently and be open to new ideas;
performance or availability issues that are challenging to and there is a training factor.” n
troubleshoot.
The added layers of management and control used STEVE BIGELOW is a senior technology reporter with TechTarget.
to implement microsegmentation can impact network Contact him at sbigelow@techtarget.com.

MODERN INFRASTRUCTURE • MARCH 2016   7


zzzzzz

Home
#Hashtag
Twitter on #DevOps
Editor’s Letter

Mad About
Microsegmentation

#Hashtag

Cloud Backup Jacob Lane Steve Fitchett Chris Cowley Dan Johnson
Correction @jacob_lane2015   @ScotsExcile   @chriscowleyunix   @penguin_dan

Survey Says By 2018, 90% of organi- #Devops the “No you can’t restart Tool diversity is
zations attempting to speed to succeed that server ever” is the great and frustrating.
use #DevOps without #ibminterconnect wrong answer #devops #devops
Show Them specifically addressing
The Money their cultural founda-
tions will fail. @Gartner
Overheard

The Next Big Thing

In The Mix

Ali José María Noah


Pourshahid Casey Walker Ruiz Sussman
@ali_pourshahid   @TheDigitalU   @JoMaRuiz  @noahsussman

If you have no failures Main #DevOps Sometimes, not It’s when the CatFacts
and not introducing frustration? Getting always, you have to tape slackbot goes down
few defects here and the board to understand together a stick and that even a seasoned
there, you are not that DevOps is NOT a knife and improvise anthropologist will learn
moving fast enough. ‘just an IT issue’. It’s a a crappy spear, don’t something about the
Embrace challenge!— business issue. Is this get used to it! #devops #devopsculture
#devops #agile common? #startup

MODERN INFRASTRUCTURE • MARCH 2016   8


DATA PROTECTION

DID YOU REALLY think that just because an application runs


in the public cloud that you don’t need to back it up? That
the cloud provider will back it up for you? Of course not.
Backing up applications and their associated data falls
squarely on IT ops. Being able to get back to a known
good state goes a long way toward righting an admin’s
wrong, recovering from a malicious attack, or satisfying
an e-discovery request. And in many organizations, you
must have a good backup in a secure remote location to
meet regulatory compliance demands.
Backing up cloud-based applications is complicated,
and there are no clear best practices, said Edward Haletky,
principal analyst at The Virtualization Practice.

Cloud Backup “Some people are doing nothing, some people are
designing custom backups, and some people are doing
completely other things,” Haletky said.

Correction Cloud backup players agree. “I’d say that 50% of the
time I talk to potential customers, the value of cloud-to-
cloud backup is still evangelical,” said Dan Flanigan, di-
The need to do backups hasn’t changed,
rector of product management at Datto, whose Backupify
but the way we do them has.
service protects hosted applications such as Office 365 and
BY ALEX BARRETT
Salesforce. “People are like, ‘Isn’t that one of the reasons I
put it in the cloud in the first place?’”
But those people don’t know how wrong they are.
CREATIVE-IDEA

HOME
MODERN INFRASTRUCTURE • MARCH 2016   9
RESILIENCY VS. RECOVERABILITY and Salesforce. For example, with Salesforce, there are
Home
Cloud service providers move heaven and earth to ensure a lot of non-technical admins with sales and marketing
Editor’s Letter
that their underlying infrastructure is highly resilient, and backgrounds, and that can lead to mistakes and miscon-
services built on top of it aim to remain up and running figurations. Nor will Salesforce make it easy to get your
Mad About despite a data center outage. data back, he added. Data recovery is expensive (starting
Microsegmentation “These cloud platforms are inarguably more durable at $10,000); time consuming (recovery can take as long
than what you can stand up yourself,” said Jason Buff- as two to three weeks) and “best effort”—i.e., the provider
#Hashtag ington, senior analyst at Enterprise Strategy Group in will give you a CVS file—but not a lot more.
Milford, Mass. Applications that are migrated to the cloud The good news is that services such as Spanning and
Cloud Backup
Correction
or built there natively can piggyback on that underlying Datto can help back up—and easily recover—popular
resiliency using availability zones, or by replicating across hosted applications, and support for more software as
Survey Says regions. But there’s a big difference between being resil- a service (SaaS) apps on the way. The bad news is that
ient, and recovering your data. organizations running cloud applications on top of in-
Show Them “What a lot of people don’t get is the difference between frastructure as a service (IaaS) must think long and hard
The Money
productivity and preservation,” Buffington said. An ap- about their backup strategy, because there’s no one right
plication may be very productive because it is replicated way to back up a cloud-native app, and traditional backup
Overheard
many times across many availability zones and virtually techniques don’t map well to this new world cloud order.
The Next Big Thing
immune to an outage, but “if you edit a telephone number
incorrectly in Office 365, it’s happily replicated n times
In The Mix around the globe—it is still just as invalid.” WAYS TO SKIN THE BACKUP CAT
Unfortunately, mistakes happen with alarming fre- There is no shortage of ways to copy data. Back in the vir-
quency, thanks to cloud’s tendency to democratize systems tualization heyday, the preferred method was to use data
administration, said Jeff Erramouspe, vice president and protection software that backed up or replicated entire
general manager at Spanning, a backup provider owned virtual machines from the hypervisor layer, for example
by EMC that offers services from Office 365, Google Apps Veeam Backup, or replication software from Zerto.

n The need to do backups hasn’t changed, but the way we do them has.
HIGHLIGHTS n Backing up cloud-based apps is complicated, and there are no clear practices.
n Cloud providers move heaven and earth to ensure their underlying infrastructure is resilient.

MODERN INFRASTRUCTURE • MARCH 2016   10


For IT shops with VMware-based clouds, that approach version of its product that goes back in time and performs
Home
still works. VIF Education, a global education provider backups from inside the OS, using a traditional agent.
Editor’s Letter
based in Chapel Hill, N.C., runs a mix of on-premises, Veeam Backup for Linux is “less about on-prem Linux,
SaaS and IaaS-based applications. For its Google Apps and more about cloud,” said Doug Hazelman, Veeam
Mad About and Salesforce environments, VIF relies on Spanning, and vice president of product strategy. Coupled with another
Microsegmentation Veeam Backup for its on-premises development and leg- agent-based product for Windows—Veeam Endpoint
acy applications, as well as the cloud-based teacher man- Backup—the company is developing “a cloud strategy that
#Hashtag agement platform that runs at a local service provider’s you will see us build out this year,” and feature integrated
vCloud Air platform. But it’s not particularly integrated or management capabilities.
Cloud Backup
Correction
graceful, said Matt Torcasso, IT manager at the firm, who
looks forward to greater integration between the on-prem
Survey Says and cloud backup processes. NOT STANDING STILL
“It’s a tough thing to navigate—how to improve data Meanwhile, organizations already running in popular
Show Them backup in a [hybrid] environment,” Torcasso said. “It’s a cloud platforms such as AWS and its ilk aren’t sitting on
The Money
really fragmented market and there are a lot of different their hands, waiting for traditional backup vendors to
options.” catch up to the cloud era.
Overheard
VMware vCloud Air providers are a tiny portion of the Today, all major cloud providers offer a “poor man’s
The Next Big Thing
overall public cloud market, and the proposed Dell-EMC backup”—taking a point-in-time snapshot of a block data
merger has thrown its future up in the air. But what about store that is stored on to lower cost object storage, said
In The Mix the vast majority of cloud shops running on Amazon Web Rajeev Chawla, co-founder and CEO at CloudVelox, which
Services (AWS), Microsoft Azure and the like? makes cloud data migration and recovery software.
One approach is really old school and uses backup Why poor man’s backup? Because “everything is man-
software from inside the operating system, like Veritas ual—you have to set everything up yourself—and the
NetBackup. point in times are crash consistent, not necessarily appli-
“When you go to the cloud, you have to start thinking cation consistent,” he said. So while it may be possible to
agents again,” said The Virtualization Practice’s Haletky. recover a single service from a single snapshot, many ap-
From there you backup to a nearby data repository, and plications consist of multiple services, and ensuring they
replicate that data to another cloud to hedge against a can be recovered as a whole requires that data protection
cloud-wide outage. be approached in a holistic fashion.
In fact, the emergence of cloud has breathed new life If you’re willing to spend extra, cloud providers will take
in to agent-based backup. Veeam, for instance, has a new snapshot backups of your databases for you. AppNeta, a

MODERN INFRASTRUCTURE • MARCH 2016   11


hosted provider of application performance management
Home
software, started out in 2010 running on AWS, relying
on disk snapshots features for its backup processes. With Backing Up Distributed
Editor’s Letter
snapshots, “it’s fairly easy to bring up an instance of hourly, Databases
Mad About daily or weekly snapshots,” said Chris Erway, chief archi-
MODERN ORGANIZATIONS are building applications
Microsegmentation tect at the firm.
on top of next-generation distributed databases
But the firm increasingly relies on AWS Relational Da-
#Hashtag such as Cassandra, Mongo and DynamoDB—and
tabase Service (RDS), which includes scheduled point in
that poses a problem for data protection.
time snapshots. Several years ago, AWS began to push us-
Cloud Backup Distributed databases are built across multiple
Correction
ers toward RDS instead of managing databases manually.
nodes for scalability, and are by nature “eventu-
“They started saying ‘Leave the stateful stuff to us—we’ll
ally consistent,” said Tarun Thakur, co-founder
Survey Says manage the data and you just work on the logic,’” Erway
and CEO at Datos IO, which builds recovery soft-
said. AppNeta went along for the ride, and now relies on
ware for big data and cloud applications. But
Show Them “RDS to do its magic backup thing.”
The Money eventual consistency and point in time backup
AppNeta backs up over 170 TB to Amazon Simple Stor-
don’t mix. To solve that problem, Datos creates
age Service (S3)—the result of the processing AppNeta
Overheard a cluster-consistent point in time image of a dis-
does on 7.4 billion events per day, and uses AWS’s S3’s
tributed database, allowing enterprises to build
The Next Big Thing
infrequent access tier—bridging the gap between the
applications based on these cloud databases
relatively expensive S3 and super cheap but super slow
without worrying about the integrity of their data.
In The Mix Glacier archival storage.
Others take a MacGyver approach. ACI Infor-
mation Group is a content aggregator and heavy
user of AWS DynamoDB, AWS’s NoSQL data store.
IN A CLOUD WE TRUST
“It’s great for performance, but doesn’t have
Beyond taking point in time images of data, another tenet
built-in backup,” said Chris Moyer, vice president
of data protection is to store a copy of that data off-site.
of technology. Moyer’s solution: call a Lambda
Previously that meant shipping your backup tapes to an
function off of event streams that automatically
Iron Mountain vault deep in an abandoned salt mine. To-
exports data off a given table or region to S3. The
day, IT organizations send digital copies of their backups
result? “Real-time backup and verification and
to off-site locations, which may or may not be in the cloud.
versioning,” Moyer said. n
But what if your application is already in the cloud—do
you need to move it outside the cloud for safety’s sake, or

MODERN INFRASTRUCTURE • MARCH 2016   12


does the cloud’s inherent resilience make that overkill? clouds are created equal at this time,” he said.
Home
The answer depends on whom you ask. Even though he And it’s not like the early days, when cloud storage pro-
Editor’s Letter
hasn’t suffered any “spectacular failures” on AWS, ACI’s vider Nirvanix suddenly shuttered its doors and gave cus-
Moyer satisfies his “extra paranoia (what if something tomers two weeks to get their data off its site. For all the
Mad About goes terribly wrong on AWS?)” by exporting backup data chills that that sent down IT’s spine, today’s tier-one cloud
Microsegmentation to a secondary cloud provider such as Rackspace or Google providers aren’t going to go out of business, Chawla said.
Cloud Platform.
#Hashtag But multi-cloud backup isn’t in the cards for every-
one. “We’ve contemplated moving the data out of AWS FEAR THAT A CLOUD
Cloud Backup
Correction
in to another cloud service provider, but AWS charges a PROVIDER WILL GO DOWN
fair amount to move out of its cloud, and the bandwidth ISN’T THE ONLY REASON
charges eclipse the cost savings,” said AppNeta’s Erway.
Survey Says
Further, AWS claims that data in S3 is very reliable—by
TO AVOID LOCK-IN.
Show Them default it is designed for 99.999999999% durability,
The Money
corresponding to an average annual expected loss of But what about vendor lock-in and the added anxieties
0.000000001% of objects. “They swear up and down that come with it? Fear that a cloud provider will go down
Overheard
about how resilient it is,” Erway said. “You sort of have to isn’t the only reason to avoid lock-in. There’s also the pros-
The Next Big Thing
trust them on that.” Using cross-region replication plus pect that they will dramatically raise prices.
a reduced redundancy version of S3 are also options, but So far, that hasn’t happened, said Damian Roskill,
In The Mix “the cost is constantly an issue.” chief marketing officer at AppNeta. “Unlike IBM which
Generally speaking, demand for protecting data in achieved lock-in with customers and increased prices,
multiple clouds is low, said CloudVelox’s Chawla, and for AWS achieves lock in with customers and drops prices,”
most shops, leveraging a single cloud’s different regions Roskill said. Further, the margins that Amazon makes on
and tiers of storage service is sufficient. “It’s not so much AWS indicate that they can continue to keep lowering
the technology—we can replicate across clouds—it’s prices for the foreseeable future. For your data’s sake, let’s
more about the business case,” he said. In a multi-cloud all hope that he’s right! n
environment, “you have two sets of vendors, two sets of
contracts,” and if you used one cloud’s native capabilities, ALEX BARRETT is editor in chief of Modern Infrastructure.
you may not be able to use them in the other. “Not all Contact her at abarrett@techtarget.com.

MODERN INFRASTRUCTURE • MARCH 2016   13


w

Home
Survey Says
Disaster recovery plans not frequently checked

Editor’s Letter

Mad About
Microsegmentation
D Which of the following DR tools D How many TBs or PBs of data will you
and/or technologies do you need to quickly recover in the event
#Hashtag
currently have in place?* of a disaster or major interruption?
Cloud Backup
Correction
34%
Less than
Survey Says 10 TB

67% 46% 37% 29%


Show Them 10 TB to
The Money
49 TB
Disk backup Tape backup DR services
Overheard

The Next Big Thing


13%
50 TB to
In The Mix
99 TB
28% 24% 17% 7%
1 PB or
more
DR software Cloud-based Cloud storage
17%
100 TB to
(planning and/ backup as a capacity
999 TB
or monitoring) service

*MULTIPLE SELECTIONS ALLOWED; N=660; SOURCE: DISASTER RECOVERY/BUSINESS N=192; SOURCE: CLOUD AND VIRTUALIZED SYSTEMS MANAGEMENT SURVEY
CONTINUITY SURVEY

D 44.4% of IT professionals only test their DR plan once a year


N=405; SOURCE: DISASTER RECOVERY/BUSINESS CONTINUITY SURVEY

MODERN INFRASTRUCTURE • MARCH 2016   14


IT OPERATIONS

Show Them
the Money
Business value dashboards help operations
teams justify their spending. IN A WORLD ever more obsessed with getting the most from
BY ALAN R. EARLS the least, IT often comes under harsh scrutiny. Exactly
what is the point of all that spending and what does it
accomplish, the bean counters ask? Well, now there may
finally be a means to provide those answers, painlessly
and reliably.
The concept of the Business Value Dashboard (BVD)—a
marriage of IT and business data collecting—originated
with research firm Gartner, and has been adopted by
established players such as Hewlett-Packard Enterprise
(HPE) and newer companies as well. It’s a buzzword
aimed squarely at the push for infrastructure and opera-
tions (I&O) teams to justify their expenditures, and show
how their initiatives relate to the company’s bottom line.
BVDs, by their nature, are comprehensive and adaptable
and can readily incorporate data on cloud resources.
What’s more, some are even software as a service based.
For any I&O team, a dashboard can be a useful way
to access and communicate metrics to demonstrate the
business value of IT and chart progress on corporate goals.
“The challenge that faces our clients is that they are
increasingly asked to prove what I&O contributes to busi-
ness value,” said Gary Spivak, a Gartner research director.
With the massive amounts of data being collected already,
RAMCREATIV

HOME
MODERN INFRASTRUCTURE • MARCH 2016   15
that raises multiples issues, including simply selecting watches in the BVD space. “The original problem Pure-
Home
which metrics to present. Additionally, determining what Share aimed at was providing a single system of opera-
Editor’s Letter
most concerns the business really requires input from the tional metrics surrounding an enterprise IT environment,”
business side. he said. That involved PureShare setting up and amal-
Mad About “There is a tendency to just pass along the information gamating metrics for everything from space and cooling
Microsegmentation that IT uses to run IT.”

#Hashtag ADDITIONALLY, DETERMIN-


RIGHT OUT OF THE BOX ING WHAT MOST CONCERNS
Cloud Backup
Correction
BVD has grown in prominence, he explains, because right THE BUSINESS REALLY
‘out of the box’ it combines familiar IT data with other REQUIRES INPUT FROM
metrics to better convey the impact and relevance of IT
Survey Says
spending. THE BUSINESS SIDE.
Show Them Spivak says the market is still at a fairly early stage,
The Money
“with a lot of organizations struggling to do something.” management to IT services management. Some of its
Probably the most substantial player in the game so far is initial customers included the New York Stock Exchange
Overheard
HPE, which offers a BVD product. Most of the other con- and Time-Warner.
The Next Big Thing
tenders are smaller, established companies with a back- “We had a broad cross section of experience of seeing
ground in IT operations or service management tools. “In actual IT environments,” Razon said. “Depending on the
In The Mix addition, there are dashboard tool vendors that help you discipline and mindset of the leadership, that can equate
build dashboards, but they don’t offer any out-of-the-box to a drive toward improvement and greater maturity.” To
intelligence to help you get started,” Spivak said. keep up with market expectations, Razon says the product
Rich Razon is business development manager at Team- will be rebranded to include the BVD buzzword. “I think
Quest, a capacity planning and management company that the right term if we could invent one would be ubiq-
that recently acquired PureShare, one of the firms Gartner uitous access so that access to metrics is effortless.”

n Business value dashboards help operations teams justify their spending.


HIGHLIGHTS n BVD has grown in prominence because it combines familiar IT data with other metrics to convey spending.
n There are tool vendors that help build dashboards, but don’t offer out-of-the-box intelligence.

MODERN INFRASTRUCTURE • MARCH 2016   16


Two things drive the rise of BVD, said Bernd Harzog, “BVD product offerings are still fairly nascent,” Ary-
Home
founder and CEO of OpsDataStore. The first is the over- chuk said. “The way people have built software historically
Editor’s Letter
whelming volume of data, which IT must monitor and un- makes it challenging to get data into some platforms; there
derstand, and the second is the need to find the elements may be some legacy apps that are resistant to change. And
Mad About of that data that “influence things that the business cares that makes decisions more difficult.”
Microsegmentation about.” Organizations can certainly try the homegrown ap-
For online operations, where issues such as “revenue proach to BVDs, but vendor-supplied products can save
#Hashtag per minute” are critical, monitoring needs to be fast and time and effort, Gartner’s Spivak said. For large enter-
effective, Harzog said, so that performance issues tied prises, “everyone should deploy a BVD” and the compa-
Cloud Backup
Correction
to revenue can be spotted and addressed. “The business nies actually moving ahead with BVD, “skew more to the
doesn’t care about CPU use, unless it is causing a problem larger side and what we would classify as better-than-av-
Survey Says that matters to them,” he says. erage IT maturity.” However, everyone should think about
BVD; by trying to define and communicate about what
Show Them they do in business terms, he said.
The Money
THE DASHBOARD’S ROLE IN DELIVERY A good place to start is simply to look at the metrics
“We have a firm belief that you need to instrument and currently tracked and then “thinking above the line”—in
Overheard
measure the full stack, from low level instances of server other words, with a due consideration of impact on prof-
The Next Big Thing
right up to things the business cares about like how many itability and business management issues.
customers are visiting a web site,” says Stevan Arychuk, a For example, if an outage occurred on a particular
In The Mix DevOp Evangelist and Strategic Marketer at New Relic, application, you can often link the downtime occurrence
a software analytics company based in San Francisco. to what happened on the end-user side. BVD would go
Arychuk says his company started in APM and now has to the next step to see how the outage actually ended up
infrastructure monitoring and other capabilities. impacting sales.
Dashboards are an important part of information
delivery, he notes. A good dashboard lets you chart and
visualize almost anything and the great ones allow flexi- KNOW YOUR NEEDS
bility. “Flexibility lets you iterate, ask questions, slice the If you choose a tool without really taking the time to rec-
data and look at it in different ways,” Arychuk said. Unless ognize what you are looking for, that is an error. Another
you have a platform like that, data will end up siloed. That error is believing I&O can determine what information
ability to collect it and look at it in one place is the essence the business needs without actually talking to the busi-
of BVDs. ness. “It is the business that will define value, so people

MODERN INFRASTRUCTURE • MARCH 2016   17


will remain challenged to actually engage with the busi- smooth the process. “If it presents any degree of friction,
Home
ness and thereby become a valued partner rather than just adoption will suffer,” he says.
Editor’s Letter
typical old IT,” Spivak said. Who should be prioritizing BVD implementation? If
Gartner has not yet developed a Magic Quadrant study your company is smaller, “you might be tempted to do
Mad About for BVD but did develop a market guide in 2015. “What it yourself because the problem is simpler,” Harzog said.
Microsegmentation is interesting in terms of market maturity is that we have However, he notes, to do it at large scale, especially orga-
started to see more merger and acquisition activity re- nizations with thousands of servers, “is a very demanding
#Hashtag cently,” he says. task that would require a world-class big data team,” which
It is important to note that executive level dashboards is why those organizations are considering BVD products
Cloud Backup
Correction
must offer concise summaries and simple ways to spot as an answer.
trends, such as graphics or color. “An executive might “BVD should be as easy as pulling out and turning on
Survey Says look at a daily summary for 10 seconds if it is green but if mobile phone,” Razon said. n
it shows a problem indicator they will log in to get more
Show Them information,”Arychuk said. ALAN R. EARLS is a writer focusing on technology and business,
The Money
Similarly, he notes, the tool must be easy to use to based near Boston.

Overheard

The Next Big Thing

In The Mix

MODERN INFRASTRUCTURE • MARCH 2016   18


zzzzzz

Home
Overheard @ Container World

Editor’s Letter

Mad About
Microsegmentation

#Hashtag
“The only “Containers is one of
Cloud Backup thing that those technologies
Correction
refactoring that every time I use it,
does better I want to use it more.” “Did Docker
Survey Says
than contain- PATRICK CHANEZON, Docker developer
make micro-
erization advocate, on why he joined the company services
Show Them
The Money is leverage more popular,
cloud-native or was it
Overheard
features.” vice-versa?
DAVID LINTHICUM, “In my time at Amazon, I suspect
The Next Big Thing
Cloud Technology
I have not seen that they’re
Partners, on using
In The Mix containers to migrate anything take off so symbiotic.”
applications to the ANGEL DIAZ, IBM
cloud fast as Docker.” vice president cloud
DEEPAK SINGH, general manager architecture and
for AWS Container Services technology

“The classic automation cycle (provision, deploy, monitor, remediate)


works pretty well, but that’s how pets are born.”
SUBBU ALLAMARAJU, eBay chief engineer, cloud and platforms

MODERN INFRASTRUCTURE • MARCH 2016   19


THE NEXT BIG THING

Home

Editor’s Letter

Mad About
Microsegmentation
You Will Be for experts to dive deep under the covers to work through
levels of complexity when things inevitably go wrong.

#Hashtag Assimilated That makes for more impactful and satisfying jobs. And
let’s be honest—convergence is far less threatening than
It’s time for IT to get over the public cloud.
Cloud Backup
Correction its fears about convergence.
BY MIKE MATCHETT
Survey Says UNLOCKING HYPER-CONVERGENCE
Early converged infrastructure was attractive to larger
Show Them enterprises hoping to eliminate deployment risk, speed
The Money
time to value, and reduce management OPEX. Some en-
terprises were willing to pay a premium to just reduce the
Overheard
I FEEL LIKE the Borg from Star Trek when I proclaim, “IT number of vendors they work with. Fully racked conver-
The Next Big Thing
convergence is inevitable.” gence (e.g., EMC/VCE vBlocks) however do not present
Convergence is a good thing, a mark of forward prog- much of a “start small and grow as you need” option, and
In The Mix ress. And resistance to convergence is futile. It is a great we’ve long heard rumors about such systems “unblocking”
way to simplify and automate the complexities between back into silo management domains as needs, features,
two (or more) maturing domains and drive cost-efficien- and applications diverge from original plans.
cies, reliability improvements, and agility. As the opera- If virtualization was a key enabler of converged infra-
tions and management issues become well understood, structure, then software-defined has unlocked hyper-con-
new tools will take advantage by converging both into an verged infrastructure (HCI). Somewhere underneath
integrated resource. software-defined resource x, there is still a real processor
Some reluctance to convergence does happen within core, a persistent storage bit or a network cable. But with
some IT organizations. Siloed staff might suffer—con- software-defined resources, we’ve moved a lot of func-
vergence threatens domain subject matter experts by tionality up out of hardware and into mutable, fungible
embedding their fiefdoms inside larger realms. That’s not and dynamic software. This takes advantage of growing
the first time that has happened, and there is always room compute density and the shrinking cost of compute.

MODERN INFRASTRUCTURE • MARCH 2016   20


Once we had software-defined capabilities, start-ups their SDDC portfolio and EVO:RACK. Look for more
Home
such as Nutanix and Simplivity started to bake every- flexible ways to build out full datacenters using not only
Editor’s Letter
thing—servers, storage, hypervisor and more—into HCI but also integrating in SDN and cloud operations.
modular appliances. Generally, HCI adopters find great
Mad About value in building up IT unit by unit as needed, in fine-
Microsegmentation grained amounts. Additionally we’ve validated that there GENERALLY, HCI ADOPTERS
is even more OPEX savings with HCI, freeing up staff to FIND GREAT VALUE IN
#Hashtag focus on solving business needs rather than architecting BUILDING UP IT UNIT BY
components.
Cloud Backup UNIT AS NEEDED.
Correction

Survey Says CONVERGENCE GROWS We will soon see hyper-scale convergence in a ready to
In 2016, we’ll see convergence enter new areas. consume package for the rank and file IT organization—
Show Them cloud-like hosting architectures that leverage container-
The Money n Data Protection. We’ll definitely hear more about how ized resources and applications where it’s hard to discern
data protection is being converged into traditional stor- what’s virtual and what’s real. The data center of the future
Overheard
age, software-defined storage, and HCI tools. We already will be able to span transparently across infrastructure
The Next Big Thing
have cloud gateways and fully hybridizing cloud-enabled options (e.g., public, private, collocated, shared, dedi-
storage such as Microsoft StorSimple. Expect to see in- cated) as application service goals and cost optimization
In The Mix creasingly complete convergence offerings that span data opportunities dictate.
ingestion (i.e., data lake platforms) through operations, What’s still needed is automating IT predictive intelli-
analysis, archive, backup, and BC/DR. gence across the whole spectrum of infrastructure. Each
bit of virtually hosted, software defined, containerized
n Edge.Keep an eye on the edges of the enterprise too, micro-served resource represents a new management
whether remote office/branch office, regional office, or challenge. But if computers can now drive our cars and
Internet-of-Things things. Riverbed’s SteelFusion is a good play the ancient game of Go at the master level, it seems
example of edge hyper-convergence combining remote that convergence is inevitable. May we all live long and
computing, WANO, and projected datacenter storage into prosper! n
stateless remote appliances.
MIKE MATCHETT is a senior analyst and consultant at Taneja Group.
n Data center. VMware is leading the charge here with Contact him at mike.matchett@tanejagroup.com.

MODERN INFRASTRUCTURE • MARCH 2016   21


IN THE MIX

Home

Editor’s Letter

Mad About
Microsegmentation
Get Over It Rackspace, Digital Ocean and so on. And it’s underneath
most of our on-premises infrastructure, too.
Whether it wants to or not, IT Even more important than being in our infrastructure,
#Hashtag must embrace the future. this vulnerability is in our applications. The applications
BY BOB PLANKERS I run in my on-premises private cloud are affected. The
Cloud Backup
Correction
applications I run in the public cloud are affected, just as
if they were on premises. In fact, it’s likely worse, since
Survey Says the applications in the cloud don’t have as many security
controls as my on-premises instances. On its face, infra-
Show Them structure as a service (IaaS) doesn’t save us from any of
The Money
BY THE TIME you read this someone around you will be wor- these issues.
rying about CVE-2015-7457. CVE numbers are assigned I often say that the journey to the cloud isn’t a techno-
Overheard
to entries in the Common Vulnerabilities and Exposures logical journey. It’s a journey for the people in IT. People
The Next Big Thing
database, essentially a big, government-sponsored catalog who have done it nod their heads knowingly; people who
of security problems. CVE-2015-7457 is a particularly bad haven’t think I’m crazy. While IaaS doesn’t save us from
In The Mix one, where a problem that lies deep in a Linux operating the need to remediate critical security vulnerabilities,
system library, glibc, exposes every application and pro- just like we did 10 years ago, it allows us to change our
gram that uses DNS. An intentionally malformed DNS processes. That’s because we can instantiate new con-
response can help someone break into your applications. tainers, new virtual machines, and new operating system
“DNS … I’ve heard of that,” you say, jokingly. But it’s images in seconds, and we can treat those components as
no joke. disposable. When something is wrong we throw it away
This vulnerability has been in Linux for eight years, and get a new one. A security problem certainly qualifies
a long time in IT. Long enough to be present in all the as something wrong.
underpinnings of everything that powers our enterprises The big problem is that, with enterprise software, we
and clouds. Whole economies and companies have come can’t just throw an instance away and deploy a new one.
and gone in the time this problem has been stewing in Software vendors like Oracle and Microsoft don’t let us,
our infrastructure. It’s underneath everything that is AWS, or have no automation capabilities, or no support for us

MODERN INFRASTRUCTURE • MARCH 2016   22


even if we do get it working. So even when we do get into hard to keep their old ways. We’ve moved past that to
Home
the cloud mindset for automating and deploying services application huggers, fighting hard for the right to expend
Editor’s Letter
we’re prohibited from the start. immense amounts of effort fruitlessly.
Consequently, it’s not hard to imagine that software
as a service (SaaS) is what makes the most logical sense
Mad About
Microsegmentation THE BIG PROBLEM IS for most IT shops. IaaS and DaaS aren’t always the right
THAT, WITH ENTERPRISE fit. Why are you running your own three-tier application
#Hashtag
SOFTWARE, WE CAN’T JUST when you could just buy the product in ready-made form?
Cloud Backup THROW AN INSTANCE AWAY Imagine all the neat things we could do with SaaS APIs
and integrations, building actual competitive advantages,
Correction AND DEPLOY A NEW ONE. if only we had time to do it. The time we spend patching
Survey Says and maintaining our old applications, which will never
So let’s throw it all away. Truth is, IT is not a competi- be anything but an anchor, are drowning us in the past.
Show Them tive advantage for most enterprises. When I get thinking Get over it folks. Let’s finally move on to the more im-
The Money
about the dismal state of automation for enterprise soft- portant parts of our lives. But that’s another column ... n
ware I start to think that perhaps we are clinging to the
Overheard
old ways too much. When virtualization first came about BOB PLANKERS is a virtualization and cloud architect at a major

The Next Big Thing


there were people derided as server huggers. They fought Midwestern university.

In The Mix

MODERN INFRASTRUCTURE • MARCH 2016   23


Home

Editor’s Letter

Mad About Modern Infrastructure is a SearchDataCenter.com e-publication.


Microsegmentation

Margie Semilof, Editorial Director


#Hashtag

Cloud Backup Alex Barrett, Editor in Chief


Correction
Follow
Adam Hughes, Managing Editor
@ModernInfra
Survey Says
on Twitter!
Phil Sweeney, Managing Editor
Show Them
The Money
Linda Koury, Director of Online Design
Overheard
Joe Hebert, Production Editor
The Next Big Thing

Rebecca Kitchens, Publisher, rkitchens@techtarget.com


In The Mix

TechTarget, 275 Grove Street, Newton, MA 02466


www.techtarget.com

© 2016 TechTarget Inc. No part of this publication may be transmitted or reproduced in any form or by any means without written permission from the publisher.
TechTarget reprints are available through The YGS Group.

About TechTarget: TechTarget publishes media for information technology professionals. More than 100 focused websites enable quick access to a deep store of news, advice and
analysis about the technologies, products and processes crucial to your job. Our live and virtual events give you direct access to independent expert commentary and advice.
At IT Knowledge Exchange, our social community, you can get advice and share solutions with peers and experts.

COVER PHOTOGRAPH AND PAGE 3: EMOJOEZ

MODERN INFRASTRUCTURE • MARCH 2016   24

You might also like