Modern Infrastructure: Is It Big Data, or Fast?
Modern Infrastructure: Is It Big Data, or Fast?
Modern Infrastructure
EDITORS LETTER
#HASHTAG
Surface Tension
Twitter on
#BigData
CONTAINER SECURITY
SURVEY SAYS
Containment
Strategy
Platform as a Service
TWO QUESTIONS
NETWORKING
Contained Chaos
TECHNICALLY SPEAKING
Dell Pickle
Spark-ing the
Big Data Bonfire
EDITORS LETTER
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Surface
Tension
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
BIG DATA
Is It Big Data,
or Fast?
ALEUTIE/FOTOLIA
HOME
MODERN INFRASTRUCTURE NOVEMBER/DECEMBER 2016
Home
clusters built from thousands of nodes have become common in many organizations.
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
INSTANT GRATIFICATION
HIGHLIGHTS
The need to provide employees with immediate access to info is reshaping the big data market.
IDC expects data volumes to double every two years and reach 40 zettabytes in 2020.
Companies want to evaluate data in real time, completely changing the data management market.
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
PERISHABLE INFORMATION
Home
Editors Letter
Is It Big Data,
or Fast?
But most companies are not ready for fast data for a number of reasons. First, the applications are complex and
hard to build, and almost always combine data from multiple sources. For example, a telecom support application
links incoming call data with customer profiles in order to
enable contact center agents to upsell, offering coupons
for an upgrade to a higher-tier calling plan.
For such connections to be coded into the applications,
new development tools are needed.
Developers require products that create streaming
flows and rely on new runtime platforms. These tools are
now being developed. However, as with any first generation solution, the current products lack the amenities
found with older, more experienced productssuch as
robust development, testing, integration and administration functionality. Often, the customer has to write
the code to deliver that functionality themselves, which
increases development time as well as the complexity in
system maintenance.
Because the streaming platforms and development
tools are new, many IT departments have little to no
experience with them. Firms need to develop different
design practices than those now used with traditional IT
architectures. Employees then need to work with them in
The advent of mobile and social media is altering customer expectations: They want answers right now. So,
firms need to collect more information and move immediately in order to satisfy customer demands.
As noted, new data sources are gaining traction, and
their future is bright: The internet of [things] is the single biggest driver for fast data demand, Gartners Schulte
stated. By 2020, more than half of all new application
projects will incorporate somelarge or smallamount
of IoT processing. Some of these will use a stream analytics platform, and the remainder will write stream processing into the application code.
Businesses are generating new types of information,
and the volume of data is growing significantly as a result.
The need for immediate analysis is becoming a more
common expectation. Consequently, a variety of new
platforms have emerged and are jockeying for acceptance
as fast data reshapes the data management marketplace. n
PAUL KORZENIOWSKI is a freelance writer who specializes in modern
infrastructure issues. Email him at [email protected].
zzzzzz
Home
#Hashtag
Twitter on #BigData
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Patrick
Demaret
@patrickdemaret
90% of the data that
exist in the world today
has been created in the
last 2 years! #bigdatavia @SenseableCity
@crassociati at #SFE16
Ernest Moniz
@ErnestMoniz
Kevin
McIsaac
@DataScienceAUS
There is a massive
gap between #bigdata
& customer insights
that needs to be bridged
with #predictiveanalytics. What are
you focused on?
Obama: My Successor
Will Govern a Country
Being Transformed by
AI. #AI #IA #BigData
#DataScience
Chiru
Bhavansikar
@AskChiru
Dario Olivini
@xflofoxx
Andy D
@HITstrategy
Nils Schaetti
@nschaetti
Technically
Speaking
The Next Big Thing
Marco Bossi
@marcoatbossi
#IoT success at all
levels will depend
on infrastructure,
#security & #BigData
#analytics capabilities
CONTAINER SECURITY
Containment
Strategy
How to prevent kernel breakouts and ensure
the security of container-based workloads.
BY JIM OREILLY
PIXELPARTICLE/ISTOCK
hottest software idea in IT. The concept of sharing the common parts of a virtual machine
the operating system, management tools and even applicationsreduces the memory footprint of any image
by a large factor, while saving the network bandwidth
associated with the loading of many copies of essentially
the same code.
These are not trivial savings. Early estimates of containers supporting three to five times the number of instances
that traditional hypervisor-based approaches can manage
are proving true. In some cases, such as the VDI market,
results are even better. Notably, containers can be created
and deployed in a fraction of the time it takes for a VM to
be made.
The economics of containers are substantially better
than hypervisor virtualization, but containers are a new
technology, and that immaturity still has to incorporate
the (sometimes painful) lessons we learned for hypervisor virtualization. While many organizations are working
with containers at some level, most would admit to serious
fears in the area of security.
The most critical issue is multi-tenancy protection. Hypervisors have been around well over a decade and, more
importantly, have gone through several CPU lifecycles.
CONTAINERS ARE THE
HOME
MODERN INFRASTRUCTURE NOVEMBER/DECEMBER 2016
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
HIGHLIGHTS
operate on different timescales, with container deployment times measured in milliseconds against VM build
times measured in seconds. Even with the restrictions,
VM-based containers are a viable approach and by far the
most common method of deployment. There has been
considerable work toward developing lightweight hypervisor deployments. For instance, Intel Clear Containers is
a hypervisor built for containers. Among other things, it
uses kernel same-page merging to securely share memory
pages among VMs to reduce memory footprint. VMware
also supports containers, whichgiven its dominance in
virtualizationis important for operational confidence
in many shops.
Beyond cross-tenancy exploits, containers carry privilege escalation risks, where an application getting root
access can gain control of the host. Another problem is
a denial-of-service (DoS) attackor even a bug-driven
issuewhere all of the resources are grabbed by a single
container. These problems are much easier to create in
container environments. Docker, for instance, shares its
namespace with the host system, which would never be
the case on a hypervisor-based system.
Containers are immature and must incorporate the lessons learned from hypervisor virtualization.
Security risks exist, but the worries of ops pros are beginning to soften as the market matures.
Multi-tenancy protection remains the most critical issue for hypervisor security.
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
Escalation attacks can be mitigated by starting containers to run as ordinary users rather than root. In Docker,
this means adding -u to the start command. Removing
SUID flags bolsters this fix. Isolating namespaces between containers limits rogue apps from taking over the
server storage space. Control groups can be used to set
resource limits and to stop DoS attacks that suck up server
resources.
61%
POISONED IMAGES
11%
2015
2016
SOURCE: CLUSTERHQ
environment used with containers, is that users are expecting control over the app mashups that they run. This
makes repository control a bit like herding cats. A forced
user-level validation of both source identification and
signature checking is a critical need for a stable, secure
environment. The Docker security benchmark on GitHub
is a utility that checks for many of the known security
problems. Building ones own validated image library for
MODERN INFRASTRUCTURE NOVEMBER/DECEMBER 2016
10
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
The container daemon is another point of vulnerability. This is the process that manages containers and,
if compromised, could access anything in the system.
Limiting access is the first step in securing the daemon.
Encrypting transfers is essential if the daemon is exposed
11
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
12
Home
Survey Says
Platform as a Service
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
50%
45%
44%
Software
as a
service
(SaaS)
Infrastructure
as a
service
(IaaS)
Platform
as a
service
(PaaS)
14%
None
45
48%
38%
24%
22%
21%
17%
17%
14%
14%
12%
13
TWO QUESTIONS
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Contained
Chaos
IT wants familiarity, and VMware
aims to simplify containers.
BY NICK MARTIN
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
14
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
15
NETWORKING
Striving for
Simplicity
Todays data center networks are too complex;
where do we go from here?
BY ETHAN BANKS
HONG LI/ISTOCK
The modern data center network looks different as business needs have morphed. The once relatively simple data
HOME
MODERN INFRASTRUCTURE NOVEMBER/DECEMBER 2016
16
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
HIGHLIGHTS
THE LAYERS
With hybrid cloud architectures becoming the new normal, its important to note the impact these trends have on
networking. No longer is the data center as simple as one
IP address talking to another, with routing and bridging
tables a consultation away when theres trouble.
The infrastructure mechanisms that deliver modern
data center flexibility rely on complex networking. Driving this complexity is the need for workload segregation,
service-policy enforcement and security. Thus, rather than
a sea of IP addresses, the modern data center looks more
like a layer cake.
At the bottom of our layer cake is the underlay network.
This network is the basis on which all other network services will ride. This is also the network that looks the most
familiar to the average network engineer. When they peer
into their routing and bridging tables, they are seeing the
underlay networkthe data center foundation.
The underlay by itself, however, cant provide everything that the hybrid cloud needs. One growing requirement is segregation, referred to as multi-tenancy. A tenant
could be an application, a business unit or a customer.
A tenants traffic is segregated from other traffic through
virtual extensible LAN (VXLAN) encapsulation technology. Traffic from one segment is encapsulated in a VXLAN
The modern data center handles security in a distributed way that coordinates workloads.
The underlay network is the basis on which all other network services will ride.
17
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
18
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
INDUSTRY RESPONSES
Were stuck with IP. And since were stuck with IP while at
the same time needing additional functionality, overlays
are here to stay. Overlays give us the ability to steer and
segregate traffic, and that functionality is important. With
it, we can treat our infrastructure as pools of resources,
adding and subtracting capacity at will. The issue then
becomes one of managing the network complexity weve
added to our environments.
The networking industry has taken on this complexity
challenge in a couple of ways. The first is acceptance. If
we agree that the complexity is here to stay, then well
provide tools that allow us to discover or visualize whats
happening on the network. For example, Cisco provides
enhanced tools for operators to troubleshoot end-to-end
connectivity issues on its Application Centric Infrastructure. VMware recently bought Arkin, a visualization tool
that correlates workloads with firewall policy and VXLAN
segmentation in a GUI paired with a natural language
search engine.
Effective troubleshooting and visualization tools are,
increasingly, strong points in modern data center platforms. However, some people have reacted against the
complexity by creating forwarding schemes that eschew
overlays if at all possible.
For instance, the Romana.io open source project relies
on a hierarchical IP addressing scheme combined with
host-based firewall rules to create segmentation and a
central security policy. The open source Project Calico is
similar. Romana.io and Project Calico are both interesting
in that they offer forwarding schemes that scale to large
data centers while still handling security and segmentation requirementsand they do it without an overlay.
Perhaps the biggest question isnt about how to handle
network complexity but is about the humans supporting
the solution. Theres a thought out there that automation
will allow IT staff to be thinned. As a twenty-year IT infrastructure veteran, I dont see it that way. With great complexity comes a great support requirement. Organizations
wont want to be on hold with their vendors when the
magic goes sideways. Theyll want to have pros who know
the system at the ready to fix whats broken. n
ETHAN BANKS , CCIE #20655, is a hands-on networking practitioner who has designed, built and maintained networks for higher
education, state government, financial institutions and technology
corporations.
19
TECHNICALLY SPEAKING
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Dell Pickle
The tech giants latest acquisition
may leave a sour taste in the mouths
of both partners and customers.
BY BRIAN KIRSCH
Survey Says
Two Questions
MERGERS AND ACQUISITIONS are part of the norm for many IT
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
companies. Larger companies buy smaller ones and incorporate the technology into their portfolio, and life moves
on. This routine became a bit more complex recently as
Dell purchased EMC and all the companies under the
EMC Federation umbrella. Dell had already purchased
several companies selling data center technologies, such
as Quest Software, Compellent Technologies and Wyse,
but the EMC deal is different. Previous acquisitions were
meant to augment Dells technology base and help it move
from the consumer side to the data center sidebut the
EMC acquisition brought in several redundant products.
Dell added several crown jewels in VMware, RSA and
a host of other technologies that were under EMC. The
challenge is that several products now in the Dell Technologies family compete with each other. Dell storage
formally Compellentnow competes with several EMC
storage offerings. While Dell has said VMware will continue to operate independently, VMwares vRealize Suite
competes directly with Quest Software. You could even
say VMwares VSAN competes with both Dell and EMC
storage products. The list goes on. IT vendor relationships
are complex enough when they are separate companies;
putting them under the same roof can make it even harder
for vendors and customers alike.
One of the first questions admins should ask is if and
when a product will be phased out. Certain products that
overlap, such as Dell Compellent storage lines and Quest
monitoring tools, are products to watch. However, it is
very unlikely Dell would simply cut off money-making
product lines. A more likely outcome is a change in upgrade paths. Rather than upgrading within the existing
line, customers could be encouraged to switch to another
product in the Dell Technologies family. While this type
of change is not ideal, customers may find reasons to
switch. Dell might offer incentives in the form of additional discounts or training to customers willing to make
the transition. Companies prefer not to switch vendors or
products if they have something that works, but a savvy
IT professional should recognize this is the time to move
up in size, scope or capacity within the Dell Technologies
family. Waiting now could mean the product teams merge
and you will be left with no choice but to upgrade.
Support within the new Dell Technologies will also
MODERN INFRASTRUCTURE NOVEMBER/DECEMBER 2016
20
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
UNFORTUNATELY FOR
THE CUSTOMERS, THESE
PARTNERSHIPS CREATE A
COMPLEX BATTLEGROUND
WHERE ITS NOT CLEAR
WHO IS FIGHTING WHOM.
both VxRail and Nutanix hyper-converged products. The
term frenemy uniquely describes the relationship between
the newly expanded Dell and Nutanix.
Unfortunately for the customers, these partnerships
create a complex battleground where its not clear who is
fighting whom. As administrators, we need these companies to work together, but were likely to see subtle combat strategies creep in. Software drivers for a particular
application or vendor are delayed; support calls point the
finger at a third party; sales and marketing spread fear,
uncertainty and doubtthe list goes on when company
partners are also competitors. This can raise customer
anxiety, making the prospect of buying everything from
one vendor even more attractive.
MODERN INFRASTRUCTURE NOVEMBER/DECEMBER 2016
21
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
BRIAN KIRSCH
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
22
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Spark-ing
the Big Data
Bonfire
AI is making a comebackand its
going to affect your data center
soon.
BY MIKE MATCHETT
Striving for
Simplicity
Technically
Speaking
23
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
silo data storage management, which is down in the infrastructure layer. But new paradigms are enabling IT to
manage data itself and data flows as first-class systems
management resources, the same as network, storage,
server, virtualization and applications.
For example, enterprise data lakes and end-to-end production big data flows need professional data monitoring,
managing, troubleshooting, planning and architecting.
Like other systems management areas, data flows can
have their own service-level agreements, availability goals,
performance targets, capacity shortfalls and security concerns. And flowing data has provenance, lineage, veracity
and a whole lot of related metadata to track dynamically.
Much of this may seem familiar to longtime IT experts.
But this is a new world, and providing big data and big data
flows with their own systems management focus has real
merit as data grows larger and faster.
I wrote recently about how the classic siloed IT practitioner might think to grow his career; big data management would be an interesting career direction. New
vendors like StreamSets are tackling this area head-on,
while others that started with more ETL and data lake catalog and security products are evolving in this direction.
n
24
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Survey Says
Two Questions
Striving for
Simplicity
Technically
Speaking
The Next Big Thing
25
Home
Editors Letter
Is It Big Data,
or Fast?
Hashtag
Containment
Strategy
Follow
Survey Says
Two Questions
Striving for
Simplicity
@ModernInfra
on Twitter!
Phil Sweeney, Managing Editor
Technically
Speaking
2016 TechTarget Inc. No part of this publication may be transmitted or reproduced in any form or by any means without written permission from the publisher.
TechTarget reprints are available through The YGS Group.
About TechTarget: TechTarget publishes media for information technology professionals. More than 100 focused websites enable quick access to a deep store of news, advice and
analysis about the technologies, products and processes crucial to your job. Our live and virtual events give you direct access to independent expert commentary and advice.
At IT Knowledge Exchange, our social community, you can get advice and share solutions with peers and experts.
COVER IMAGE AND PAGE 3: ALEUTIE/FOTOLIA
26