If you think of automated provisioning as a formal written language
definition, it does have some value in illuminating issues with partial
automation or portions of the overall data center that are not automated.
The path to automation is not a straight one at most organizations. It takes
time, it takes resources, and even though there is a definable ROI, the press
of business needs wins every time there is a conflict – because meeting
business needs is pretty much the purpose of IT.
But taking the staggered approach has costs too, and it’s good on occasion
to look at them. I’ve admittedly created this view, but it is a way to
consider your automation efforts and how well they’re working with regard
to the end goal.
We cover bare metal provisioning, application provisioning, multi-system
provisioning, and cluster provisioning here. There is a relationship between
Now, with more hardware!
September 21, 2015, Don MacVittie, Sr. Solutions Architect. The
“continuous” trend is continuing (get it..?), and we’ll soon reach the
peek of the hype cycle, with continuous everything. At the pinnacle of the
hype cycle, do not be surprised to see DDOS attacks re-branded as
“continuous penetration testing!” and a fee associated with receiving
But as with all hype cycles, there is some bit in them – usually quite a
few bits in them – that actually pass the smell test in a real-world
environment. With virtualization, we didn’t see the end of server... (more)
Since the first release of the Stacki Open Source project, it has seen the
type of growth that one would expect of a cutting-edge tool that makes
operations lives easier. The number of active users continues to increase, as
does the breadth of things they’re achieving with the world’s fastest
open source Linux install tool. Several very prominent enterprises have
joined the list of active users, and have asked for a range of enhancements.
Stacki 2 incorporates many of these requests. More enterprise friendly
functionality, in more enterprises, enabling enterprise IT to do more.
Well, I’ve covered the basics of iSessions – a secure, optimized tunnel
between two BIG-IPs – so now it’s time to talk about usefulness, both
today and going forward. Since iSessions are an infrastructure issue, the
following works for redundant data centers also, assuming they have BIG-IPs
in them, it’s just that cloud is the buzzword du-jour, and there’s
actually a teentsy bit more benefit to using them for the cloud.
First off, I assume that your cloud vendor has BIG-IPs (that is a safe
assumption as of today), but you’re living in the real world, check with
them first, there... (more)
I was pondering over the weekend the concept that a SAN is relatively easy to
manage – at least on the surface – because it is, in essence, a network
in and of itself. Separated from the IP network, you have a switch that
connects various SAN arrays and when your arrays become over-burdened, you
can just drop another one in and plug it into the switch. Easy. And since the
switch is not generally from the same vendor as the storage array, you can
plug in whatever array you find most appealing this week. Migrating data
between arrays can be tricky, but these days there are solution... (more)