big group - harvard university · iam account app app admin cas auth engine claim app create/manage...

37
Cloud & DevOps Program Big Group March 13, 2015 Friday 2:00-3:00 p.m. Science Center Hall A

Upload: others

Post on 04-Aug-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud & DevOps Program Big Group

March 13, 2015 Friday 2:00-3:00 p.m. Science Center Hall A

Page 2: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

•  Program Update (10 min) –  General Accomplishments –  Wave 1 Overview –  Schedule –  Minimum Viable Product

•  Cloud Patterns Update (30 min) –  Overview of Work –  Demo –  Outreach and How to Get Involved

•  CloudEndure POC and BC/DR (10 min) –  BC/DR Business Requirements –  BC/DR POC: Test Criteria, Results, Cloud Support, Architecture –  BC/DR Next Steps

•  Questions & Answers (10 min)

2

Agenda

Page 3: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Program Update: General Accomplishments

3

•  Formally announced as a HUIT program Feb. 5 •  Transitioned from part-time workgroup to full-time team located at

50 Church Street •  Completed first round of integrated planning to understand

foundational work

•  Created comprehensive administrative plan •  Wave 1 migration analysis and actions underway

•  Program Increment 1 (six sprints) runs from March 9 to May 29

Page 4: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

We are committed to moving 25 applications by the end of FY15.

•  Apps were prioritized based on application team availability and technical patterns (Java/Tomcat, Apache/LAMP)

•  Remaining ~50 apps will be evaluated after first 25 are migrated

Group Applications

IAM

Account App App Admin CAS Auth Engine Claim App Create/Manage ID

FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge

SailPoint IIQ Shibboleth IdP Phonebook Public LDAP

INF OID

ATS QlikView (7) ACE Muse OARS Course Catalog

Cross Reg Winter Break FCOI

LTS Presto, Feedback

DR Aleph (LTS) IAM PeopleSoft (POC)

Program Update: Wave 1 Overview

4

Page 5: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Program Update: Schedule

5

See the handout for the most recent schedule for PI-1 and PI-2.

Page 6: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

What does “minimum viable product” really mean?

•  Establishing the initial features needed to fulfill the proper release of a particular product

6

Minimum Viable Product

Page 7: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

•  Monitoring •  Logging

•  Backups

7

Minimum Viable Product: CloudOps

Page 8: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

•  SP Framework/Application Patterns •  CDP

•  Data Management •  Security

•  VPC

8

Minimum Viable Product: DevOps

Page 9: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

•  Tagging •  Documentation

•  IAM (roles) •  AWS Account

9

Minimum Viable Product: Admin

Page 10: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns Update

10

•  Overview of Work •  Demonstration

•  Outreach and How to Get Involved

Page 11: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

What Are Cloud Patterns?

Cloud patterns create application infrastructure in the cloud via a command-line interface from a library of standard patterns.

11

Page 12: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Standard Pattern

12

•  Encapsulates knowledge and best practices of infrastructure provisioning

•  Reusable components wired together for specific use case of pattern

•  Components parameterized — such as minimum number of servers in autoscaling group, or a specific AMI to use for LaunchConfiguration

Page 13: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Decorators

13

•  Allows for more significant change or added behavior to standard patterns

•  Example: Config decorator has been added to LaunchConfiguration to do additional configurations of instances after standard install, and DNS decorator sets the DNS name of the ELB

Page 14: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Outside vs. Inside the Box

14

We are discovering a sharp delineation: •  Structure outside the box is simpler and highly reusable

•  More specifics inside the box — this seems to require a pluggable framework:

–  Configuration Management (SaltStack, Ansible, Puppet, etc.)

–  Deployment (CodeDeploy, Capistrano, S3, etc.) –  Many of these tools are built for on-premise management

models. How do we make these tools work well in the cloud with ephemeral resources?

Framework goal: Make it easy for end users, but also support the switching out of tools

Page 15: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Stackable Patterns

The standard patterns have been built to allow one pattern to depend on another, enabling them to stack.

15

VPC

Net SVC

Inf SVC

App 1

DB S

hare

d In

frast

ruct

ure

App

licat

ion

Ser

vice

s

Page 16: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Stackable Patterns

16

The standard patterns have been built to allow one pattern to depend on another, enabling them to stack.

VPC

Net SVC

Inf SVC

App 1

App 2

DB DB S

hare

d In

frast

ruct

ure

App

licat

ion

Ser

vice

s

Page 17: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Stackable Patterns

17

The standard patterns have been built to allow one pattern to depend on another, enabling them to stack.

VPC

Net SVC

Inf SVC

App 1

App 2

App 3

DB DB S

hare

d In

frast

ruct

ure

App

licat

ion

Ser

vice

s

Page 18: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Stackable Patterns

VPC

Net SVC

Inf SVC

App 1

App 2

App 3

DB DB

Sha

red

Infra

stru

ctur

e A

pplic

atio

n S

ervi

ces

Inf SVC

App 1

App 2

DB DB

18

The standard patterns have been built to allow one pattern to depend on another, enabling them to stack.

Page 19: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Logging

Monitoring / Alerting

Backup

Cloud Ops Base Stack AWS / Services

Search

Session Management

Messaging

Cache

Communication

Scheduling

ELB

App

Available Services

Added Services

Default / Required

Other...

19

Cloud Patterns: Stacks and Services

Page 20: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Logging

Monitoring / Alerting

Backup

Cloud Ops Base Stack AWS / Services

Search

Session Management

Messaging

Cache

Communication

Scheduling

ELB

Web

ELB

App

DB

Available Services

Added Services

Default / Required

Other...

20

Cloud Patterns: Complex Stack with Services

Page 21: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Demo

21

•  Application stack definition for HelloWorld Java/Tomcat •  Create stack for HelloWorld Java/Tomcat with app deployment

•  Show created stack and running application

Page 22: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Pattern Support

22

Currently being developed: •  Java/Tomcat

•  Python/GUnicorn •  Oracle/RDS

Next set of patterns: •  Windows •  Java/Weblogic

•  MySQL/RDS

Page 23: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: CLI Support

23

Current: •  Mac OSX

Being developed: •  Windows

•  Linux

Orchestration/CI: •  HUIT Cloud & DevOps Continuous Development Platform

•  Jenkins •  AWS CodePipeline

Page 24: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Cloud Patterns: Outreach and How to Get Involved

24

Want to contribute and need to use now? •  Weekly Cloud Application Pattern Design Workgroup for early

adopters and cloud users •  One-on-one workshops on creating patterns

Interested in learning more at your own pace? •  Wiki: https://wiki.harvard.edu/confluence/display/huitcloudpatterns •  Github: https://github.com/HUIT-Cloud-Services/huitcloudpatterns

For any of the above, email us to get access or participate!

Page 25: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

25

Cloud Patterns: Outreach and How to Get Involved

Interested, but want someone to teach you? •  Cloud Technology Workshops in April

•  Workshops targeted at specific roles and activities

Email us to get access or participate!

Page 26: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Business Continuance and Disaster Recovery: Technical Recommendation Steve Martino

Page 27: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

•  BC/DR Business Requirements — Sue Walsh

•  BC/DR Proof of Concept –  Test Criteria and Results –  Vendor Cloud Support –  Architectural Diagrams

•  PeopleSoft & Aleph POC: High-Level Plan and Next Steps

27

Agenda

Page 28: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Goal Sub-Goal

Replace Current BC/DR Solutions

Provide continuous data replication to geographically dispersed off-site data centers; Lower RTO and enhance RPO

Support (and enhance) Harvard’s cloud migration strategy

Integrate with Harvard’s network, security, server, and storage infrastructure

Provide Future BC/DR Solutions

for Harvard

Provide on-prem to multi-cloud BC/DR capabilities (AWS, Azure, Google, etc.)

Provide inter-cloud to cloud BC/DR capabilities (AWS regions)

Provide cloud-to-cloud BC/DR capabilities (AWS to Azure, etc.)

BC/DR 1.0 In FY15, provide BC/DR capabilities for PeopleSoft and Aleph (LTS)

BC/DR Business Requirements

28

Goal: Solutions to withstand a range of incidents and disasters. •  Embed and build DR design into cloud architecture/migration •  Build new systems to incorporate DR needs

Current: BC/DR for mission-critical services using SunGard Availability Services with some failover to 1 Summer St. Future: BC/DR embedded as required into cloud designs and SaaS offerings to meet business needs. For critical applications that may not migrate immediately, we are exploring a POC for replacing the current SunGard solution.

Page 29: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Vendor Candidate Product Description

VMWare/vCloudAir A public cloud platform built on vSphere, compatible with on-premise data centers, that includes infrastructure, disaster recovery, and various applications as service offerings

Cloud Velox Key cloud migration and DR process are automated, reducing manual processes, costs, and risks for accelerated deployment, including physical and virtual app environments and data sets

CloudEndure Disaster Recovery as a Service (DRaaS) to the cloud solves downtime without the ongoing high costs typically associated with DR; unlike snapshot-based solutions, CloudEndure enables consistent, real-time replication using continuous data protection

BC/DR POC: Vendor Candidates

29

The following vendor candidates were considered.

Page 30: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

POC Test Criteria & Results: CloudEndure

30

POC Environment OK? Notes

1. Initial POC with HUIT test/dev OS and disk configurations

Windows 2003 and virtual disk Y Host is VMWare Virtual Server and disk

Windows 2008 and virtual disk Y Host is VMWare Virtual Server and disk

Windows 2012 and virtual disk Y Host is VMWare Virtual Server and disk

Windows 2008 — RDM disk Y Host is VMWare Virtual Server with physical disk

Red Hat Linux 5, 6, 7 virtual disk Y Host is VMWare Virtual Server and disk

Windows 2008 physical server (Dell R710 internal disk) Y Physical server with physical internal disk

Chaucer (Aleph Dev System) (33 LUNS) Y Really big virtual server with physical disk

Sun Microsystems n/a All three vendors tested do not support Sun OS

2. Create automated load balancer Y

3. Test Bluecoat proxy traversal Y NO SOC managed systems are directly connected to the Internet

4. Basic OS readiness (AWS replica) Y System will boot

5. App readiness (AWS replica) Y Shavlik (Dell R710 Above and Chaucer on CloudEndure

Page 31: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

BC/DR POC: Vendor Cloud Support

31

Public and Private Cloud Support (DR)

On-Prem <--> VMWare VCloudAir AWS Region <--> AWS Region Tested

On-Prem <--> AWS Tested AWS Region <--> Azure Not Tested

On-Prem <--> Azure Not Tested AWS Region <--> OpenStack Not Tested

On-Prem <--> Rackspace OpenStack Not Tested AWS Region <--> CloudStack Not Tested

On-Prem <--> CloudStack Not Tested VMWare vCloudAir <--> AWS Region Not Tested

Public and Private Cloud Support (On-Prem --> Migration)

On-Prem --> AWS Region Tested On-Prem --> CloudStack Not Tested

On-Prem --> Azure Not Tested VMWare vCloudAir --> AWS Region Not Tested

On-Prem --> OpenStack Not Tested

Public Cloud Support (Cross-Cloud <--> Migration)

AWS Region <--> AWS Region (In-Cloud) Tested: Creates ELB, EC2, IAM, Security Groups, Storage, etc.

AWS Region <--> Azure (Cross-Cloud) Not Tested

Additional Features

Tagging on Instance Creation Q2 Point-in-Time Recovery Tested

Page 32: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Physical Disk

Inside

'interface:'10.34.5.0/24

Proxy'IP:'10.34.5.254'

Outside'interface:'128.103.38.177/32Bluecoat

Forward Proxy

BC/DR  VP

C  

CloudEndure Management

Station

Harvard  Network  <-­‐-­‐>  SSLVPN  <-­‐-­‐>  Amazon  VPC  Validated  with  Jefferson  that  Direct  Connect  would  work  

Harvard  Network  VMWare  Virtual  

Servers  

EC2   EBS  

EC2   EBS  

EC2   EBS  

EC2   EBS  

EC2   EBS  

EC2   EBS  

CloudEndure  Replica3on  Server  -­‐  

2    10  machines  with  single  volumes      5  machines  with    dual  volumes  

EC2   EBS  

Amazon  Linux  M1-­‐Small  EBS  -­‐  Gigabytes  

CloudEndure  Replica3on  Server  -­‐  

1    10  machines  with  single  volumes      5  machines  with    dual  volumes  

EC2   EBS  

Amazon  Linux  M1-­‐Small  EBS  -­‐  Gigabytes  

EC2   EBS  

CloudEndure  Machine  Converter  M3  –  Medium  

CloudEndure  Agents  Are  Installed!  ApplicaOon  Stack  Discovery  IniOates  

APP  Stack  

CloudEndure  Management  Server  Spins  Up  The  ReplicaOon  server(s)  Via  The  AWS  API.    

AWS  ReadOnly  IAM  Account  Created  Allows  the  CloudEndure  Management  StaOon  to  communicate  AWS  console  via  AWS  API’s  to  create  CloudEndure  ReplicaOon  Servers  

Agents  Communicate  Stack  Discovery  InformaOon    with  the  CloudEndure  Management  StaOon    

Over  Secure  Port  443  APP  Stack  

APP  Stack  

APP  Stack  

APP  Stack  

APP  Stack  

AWS  API  AWS  API  

Once  Obtained,  It  Will  Establish  a  ConnecOon  Via  Port  1500  To  Its  Associated  ReplicaOon  Server  and  ConOnuous  “BLOCK”  level  Data  ReplicaOon  Will  

Commence  Over  The  SSLVPN  Tunnel.  

OS/DATA  BLOCKS  

OS/DATA  BLOCKS  

OS/DATA  BLOCKS  

OS/DATA  BLOCKS  

OS/DATA  BLOCKS  

OS/DATA  BLOCKS  

The  CloudEndure  Management  StaOon  Shows  The  Progress  Of  The  On-­‐Prem  Data  SynchronizaOon  To  

the  AWS  ReplicaOon  Servers.  

Poll  

Poll  

Poll  

Poll  

Poll  

Poll  

The  Agents  will  keep  polling  the  Management  StaOon  

 for  The  ReplicaOon  Server  IP  Address.    

ReplicaOon  Servers  Create  AWS  Snapshots  Of  The  Synchronized  Data  And  Use  These  Snapshots  To  

Create  The  AWS  Instances  And  Storage  When  A  DR  SituaOon  Occurs.  

By  SelecOng  “Create  Replica”  For  A  ParOcular  System,  CloudEndure  Creates  EC2  Instances  With  EBS  Storage  

Volumes  With  The  Latest  Data  From  On-­‐Prem.  

The  CloudEndure  Management  Console  Shows  Sync  Progress.  

The  ReplicaOon  From  AWS  Snapshots  Begins!!!  

CloudEndure  Architecture  

All  data  synced  over  port  1500  is  AES  256  bit  encrypted!!!  

Page 33: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

33

Create Replica Options

Specify existing or new subnet/VPC the replica will use

Specify IP address that the replica server will use

Specify instance type that the replica server will use

Specify public IP (if necessary) that the replica server will use

Specify storage type that the replica will use

Page 34: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

34

Create Replica Options

In addition to the most recent (Latest) state of the continuous sync, the following points are available: •  Once every 10 min for the past hour

•  Once every hour for the past day

•  Once every day for the past month

Point in Time Recovery brings you back to the OS state, VPC configuration, subnets, security groups, etc., from that point.

Page 35: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

35

PeopleSoft & Aleph POC: High-Level Plan & Next Steps

1.  Perform initial POC with test/dev systems

2.  Create AWS VPC network and security infrastructure for BC/DR

3.  Work with PeopleSoft and Library business owners a.  Identify core systems b.  Identify on-prem supporting systems c.  Identify network and security requirements in AWS

4.  Create BC/DR test plan

5.  Perform CloudEndure client installation

6.  Perform PeopleSoft/Aleph DR test

7.  Adjust BC/DR test plan for PeopleSoft and Aleph

Page 36: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Questions & Answers

Page 37: Big Group - Harvard University · IAM Account App App Admin CAS Auth Engine Claim App Create/Manage ID FindPerson API Harvard LDAP IdDB Identity Service API PIN2 Bridge SailPoint

Thank you!