39
@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES Jon Hudson Principal Engineer & Futurist Office of the CTO, Brocade The Evolving Role of the Network Engineer

Jon Hudson - The Evolving Role of the Network Engineer

Embed Size (px)

Citation preview

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

Jon HudsonPrincipal Engineer & FuturistOffice of the CTO, Brocade

The Evolving Role of the Network Engineer

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

…Into the Rabbit Hole

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

All or some of the products detailed in this presentation may still be under development and certain specifications, including but not limited to, release dates, prices, and product features, may change. The products may not function as intended and a production version of the products may never be released. Even if a production version is released, it may be materially different from the pre-release version discussed in this presentation. Nothing in this presentation shall be deemed to create a warranty of any kind, either express or implied, statutory or otherwise, including but not limited to, any implied warranties of merchantability, fitness for a particular purpose, or non-infringement of third-party rights with respect to any products and services referenced herein. ADX, AnyIO, Brocade, Brocade Assurance, the B-wing symbol, DCX, Fabric OS, HyperEdge, ICX, MLX, MyBrocade, OpenScript, VCS, VDX, and Vyatta are registered trademarks, and The Effortless Network and The On-Demand Data Center are trademarks of Brocade Communications Systems, Inc., in the United States and/or in other countries. Other brands, products, or service names mentioned may be trademarks of others.

Legalish Disclaimer

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 3

This presentation, with prepared remarks, includes forward-looking statements regarding Brocade’s financial results, goals, plans, assumptions, strategy and business outlook, revenue, tax rate, cash, stock buybacks, OEM inventory, prospects, as well as U.S. Federal spending and order flow, and IT spending, which are only predictions and involve risks and uncertainties such that actual results may vary significantly. These and other risks are set forth in more detail in our Form 10-K for the fiscal year ended October 26, 2013 and our Form 10-Q for the fiscal quarter ended August 2, 2015. These forward-looking statements reflect beliefs, assumptions, outlook, estimates, and predictions as of today, and Brocade expressly assumes no obligation to update any such forward-looking statements whether as the result of new developments or otherwise.In addition, this presentation includes various third-party estimates regarding market share and other measures, which do not necessarily reflect the views of Brocade. Further, Brocade does not guarantee the accuracy or reliability of any such information or forecast.Certain financial information is presented on a non-GAAP basis. Management believes that non-GAAP financial measures used in this presentation allow stakeholders to gain a better understanding of Brocade’s comparative operating performance both from period to period, and to its competitors’ operating results. Management also believes these non-GAAP financial measures help indicate Brocade’s baseline performance before gains, losses or charges that are considered by management to be outside of ongoing operating results. Accordingly, management uses these non-GAAP financial measures for planning and forecasting of future periods and in making decisions regarding operations performance and the allocation of resources. The most directly comparable GAAP information and a reconciliation between the non-GAAP and GAAP figures are provided in the accompanying press release, which has been furnished to the SEC on Form 8-K and posted on Brocade’s website, and is included in the appendix in this presentation.

Legal DisclosurePlease see risk factors on Form 10-Q and Form 10-K filed with the SEC

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 4

BROCADE > Futurist & Principal Engineer | Office of the CTOIETF > Co-Chair TRILL WG

> Routing Directorate Co-Coordinator > Routing Area Encapsulation Design Team Member> Architect/Design Group member for the NVo3 WG

ISO/IEC JTC 1 > JTC1BDSG - Study Group on Big Data (completed 1/2015)

INCITS > Ad Hoc on Big Data (completed 1/2015)

Jon Hudson

Recent Evidence of My Existence….

JON.HUDSON@[BROCADE]||[GMAIL].COMSMS: 1.650.766.7662@THE_SOLUTIONEER @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 5

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

JON.HUDSON@[BROCADE]||[GMAIL].COMSMS: 1.650.766.7662@THE_SOLUTIONEER 6

SERVER L2-7 NETWORK GEAR ROUTING & POLICY ORCHESTRATION

Software Defined DatacenterOn Demand DatacenterRight Click, Datacenter

DAYS DAYS DAYS DAYS

X86 VirtualizationX86 Virtualization

MINS

NfVNFV

MINS

PROGRAMMATICOpenFlow

MINS

API AUTOMATIONOpenstack

MINS

OPEN Daylight

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 7

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

STAGE 0 HUMAN ALERT NETWORKSTAGE 1 LOG EVERYTHING, DON’T ASK WHY STAGE 2 ANALYTICS & SOFTWARE REMEDIATIONSTAGE 3 MACHINE LEARNINGSTAGE 4 FIND NEW CAREER

STAGE 0PATIENT 0 DIES…AND PROBABLY A FEW MORE…

BUILD A DATACENTER

DEPLOY AN APPLICATION

USER FINDS AN ISSUE

IT GUY DEBUGS

LOG EVENT & USER EVENT CORROLATION

WAIT FOR CONFIRMATION

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

HUMANS ARE BAD MONITORING TOOLS

STAGE 0

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

BUILD A DATACENTER

DEPLOY AN APPLICATION

USER STILL FINDS AN ISSUE

IT GUY DEBUGS

LOG EVENT & USER EVENT CORROLATION

WAIT FOR CONFIRMATION

SETUP BASIC KNOWN TRIGGERS

LOG EVERYTHING!

STAGE 1PATIENT 0 STILL DIES…BUT HOPEFULLY NOT AS MANY

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

HOW DO YOU MONITOR THE KNOWN UNKNOWNS?

A SCSI BACKPLANE ISSUE ON EMC SYMMETRIX STORAGE ARRAY DISCOVERED SIX MONTHS PRIOR TO ARRAY BASED ALERTING BY TRACKING “BURSTABLE EFFICIENCY” OVER TWELVE MONTHS

DB LOSS TRACKED OVER LONG PERIODS TO INDICATE LIKELY TRANCEIVER DEATH

2 YEARS OF DATA NEEDED TO CATCH ALL HUMAN CYCLES

STAGE 1

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

BUILD A DATACENTER

DEPLOY AN APPLICATION

USER STILL FINDS AN ISSUE

IT GUY DEBUGS

LOG EVENT & USER EVENT CORROLATION

WAIT FOR CONFIRMATION

SETUP BASIC KNOWN TRIGGERS

STAGE 2—ANALYTICSPATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY

IP Analytics Pack for vRealize OperationsVirtual network resilience through physical network visibility

VIRTUAL NETWORK RESILIENCE THROUGH PHYSICAL NETWORK VISIBILITY

Intelligent Network OperationsDelivers comprehensive VCS operational data to support software-defined data center analytics

VM

Unified Virtual & Physical NetworkingProvides insights and visibility into the physical network for better application and VM performance

Simplified Policy AutomationPredefined alerts and recommended actions simplify monitoring; health, risk, and efficiency metrics add context

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 14

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

STAGE 2PATIENT 0 HAS A TREATMENT PLAN READY ON STANDBY

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

BUILD A DATACENTER

DEPLOY AN APPLICATION

USER STILL FINDS AN ISSUE

IT GUY DEBUGS

LOG EVENT & USER EVENT CORROLATION

RINSE & REPEAT

SETUP BASIC KNOWN TRIGGERS

*Want to know more about Machine Learning? Please Check out David Meyer’s ML Presentationhttp://www.1-4-5.net/~dmm/talks/2015/MWC/mwc2015.pptx

STAGE 3—MACHINE LEARNING*BRINGS YOU NEW QUESTIONS

Google PUE Optimization Application1

• Straightforward application of ANN/supervised learning– Lots more happening at Google (and FB, Baidu, NFLX, MSFT,AMZN,…)• http://research.google.com/pubs/ArtificialIntelligenceandMachineLearning.html

• Use case: Predicting Power Usage Effectiveness (PUE) – Basically: They developed a neural network framework that learns from

operational data and models plant performance– The model is able to predict PUE2 within a range of 0.004 +

0.005 , or 0.4% error for a PUE of 1.1• “A simplified version of what the

models do: take a bunch of data, find the hidden interactions, then provide recommendations that optimize for energy efficiency.”

– http://googleblog.blogspot.com/2014/05/better-data-centers-through-machine.html

1HTTPS://DOCS.GOOGLE.COM/A/GOOGLE.COM/VIEWER?URL=WWW.GOOGLE.COM/ABOUT/DATACENTERS/EFFICIENCY/INTERNAL/ASSETS/MACHINE-LEARNING-APPLICATIONSFOR-DATACENTER-OPTIMIZATION-FINALV2.PDF

2 HTTP://EN.WIKIPEDIA.ORG/WIKI/POWER_USAGE_EFFECTIVENESS @2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 17

Google Use Case: FeaturesNumber of features relatively small (n = 19)

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 18

Google Use Case: Details

• Neural Network– 5 hidden layers– 50 nodes per hidden layer– 0.001 as the regularization parameter (λ)

• Training Dataset– 19 normalized input parameters (features) per

normalized output variable (the DC PUE)• Data normalized into the range [-1,-1]

– 184,435 time samples at 5 minute resolution• O(2) years of data

– 70% for training, 30% for cross validation

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 19

Google Use Case: Sensitivity Analysis

• After the model is trained, one can look at effect of individual parameters by varying one while holding the others constant

The relationship between PUE and the number of chillers running is nonlinear because chiller efficiency decreases

exponentially with reduced load.

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 20

Google: Outside Air Enthalpy Has Largest Impact on PUE

Relationship between PUEandoutside air enthalpy, or total energy content of the ambient air. As the air enthalpy increases, the number of cooling towers, Supplemental chillers, and associated loading rises as well, producing a nonlinear effect on the DC overhead. Note that enthalpy is a more compre-hensive measure of outdoor weather conditions than the wet bulb temperature alone since it includes the moisture content and specific heat of ambient air.

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 21

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

STAGES OF ENLIGHTENMENT

BUILD A DATACENTER

DEPLOY AN APPLICATION

USER FINDS AN ISSUE

IT GUY DEBUGS

LOG EVENT & USER EVENT CORROLATION

WAIT FOR CONFIRMATION

STAGE 0 HUMAN ALERT NETWORK

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

STAGES OF ENLIGHTENMENT

BUILD A DATACENTER

DEPLOY AN APPLICATION

USER STILL FINDS AN ISSUE

IT GUY DEBUGS

LOG EVENT & USER EVENT CORROLATION

WAIT FOR CONFIRMATION

SETUP BASIC KNOWN TRIGGERS

LOG EVERYTHING!

STAGE 0 HUMAN ALERT NETWORKSTAGE 1 LOG EVERYTHING,

DON’T ASK WHY

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

STAGES OF ENLIGHTENMENT

BUILD A DATACENTER

DEPLOY AN APPLICATION

USER STILL FINDS AN ISSUE

IT GUY DEBUGS

LOG EVENT & USER EVENT CORROLATION

WAIT FOR CONFIRMATION

SETUP BASIC KNOWN TRIGGERS

STAGE 0 HUMAN ALERT NETWORKSTAGE 1 LOG EVERYTHING,

DON’T ASK WHYSTAGE 2 ANALYTICS

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

STAGE 0 HUMAN ALERT NETWORKSTAGE 1 LOG EVERYTHING,

DON’T ASK WHYSTAGE 2 ANALYTICS STAGE 3 MACHINE LEARNING

STAGES OF ENLIGHTENMENT

BUILD A DATACENTER

DEPLOY AN APPLICATION

USER STILL FINDS AN ISSUE

IT GUY DEBUGS

LOG EVENT & USER EVENT CORROLATION

RINSE &REPEAT

SETUP BASIC KNOWN TRIGGERS

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

EVIL SOFTWARE COMING TO TAKE YOUR JOBS

STAGE 4: FIND NEW CAREER

Tale of the Tape2000 vs. 2015

TALE%OF%THE%TAPE%2015%

1630lbs ----- Weight ------- 59lbs

4x240v ------- Power ------- 2x120v

32100 ---- BTU ------ 2697

Yes --- 10G/40G Line-Rate --- Yes

Yes --- 100G Line-Rate --- Yes*

YES --- BGP/MPLS --- YES

No --- SW/HW Separation --- Yes

Custom -------- Type ---- Merchant

IOS XR -------------- OS ------- You Choose

> $1M --- Cost --- ~$5k

> $200k --- 1yr Support --- $2k

Yes ----Hot Swap HW ---- No

Yes --- COD --- No

Yes --- HW Partitions --- No

%

TALE%OF%THE%TAPE%2000%

1200lbs ---- Weight ------- 59lbs

4x240v ------- Power ------- 2x120v

32100 --- BTU ----- 2697

64bit --------- Arch ---------- 32bit

24 --------- CPUs ------------- 2

48 ---------- Threads ------------ 2

384GB ---- Memory ------- 32G

Custom -------- Type ---- Merchant

Solaris --- OS --- Linux

~$250k ----- Cost ------ ~$2.5k

$60k --- 1yr Support --- $2k

Yes ----Hot Swap HW ---- No

Yes --- COD --- No

Yes --- HW Partitions --- No

%%%

2000 2015

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 27

THIS IS ALSO ABOUTMULTITENANCY

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

Next Gen Data CentersDirect networking and free range VMs

x20

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 29

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 30

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 31

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 32

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 33

ProgrammabilityPython scripting

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

To use Python interpreter: NOSCLI “python” from NOSCLI shell.

Create Python script; copy script to switch and execute

sw0# copy scp://releaseuser:[email protected]//users/home32/badaniya/proj/scorpius/scripts/create_po.py flash://create_po.py

sw0# python create_po.py !Command: show running-config int vlan!Time: Tue Jan 6 08:32:33 2015

interface Vlan 1!

Script can be loaded on principal switch and automate VCS Fabric

34

ProgrammabilityVDX Puppet Integration

Node1

Node2 Netconf

Netconf

Puppet Master

VCS1

Catalog

Catalog

catalog

VCS2

Catalog

Catalog

catalog

• nos_netdev_device: Device Configuration• nos_netdev_interface: L2 Interface configuration• nos_netdev_vlan: VLAN configuration• nos_netdev_l2_interface: VLAN to interface assignments

NOS Provider List

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 35

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES 36

Real-Time Routing with Reality Don’t guess, know!

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

Analysis Engine

37

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

@2015 BROCADE COMMUNICATIONS SYSTEMS, INC. VIOLATORS WILL BE HUNTED BY DRONES

Thank you