getting a system to production
play

Getting a System to Production ... and keeping it there Eoin Woods - PowerPoint PPT Presentation

Getting a System to Production ... and keeping it there Eoin Woods SATURN 2016 Endava 1 Who Am I? Eoin Woods - CTO at Endava 2005 - 2014 in capital markets (UBS, BGI) 2000 - 2004 in product engineering & consultancy (Bull,


  1. Getting a System to Production ... and keeping it there Eoin Woods 
 SATURN 2016 Endava 1

  2. Who Am I? Eoin Woods - CTO at Endava 2005 - 2014 in capital markets (UBS, BGI) 2000 - 2004 in product engineering & consultancy 
 (Bull, Sybase, InterTrust, independent) Author, editor, speaker, community-guy 2

  3. Who are Endava? Software Engineering & IT Services Firm 2800+ people UK, US, Germany, Romania, Moldova, Serbia, Macedonia Agile and Digital Transformation Consulting, Architecture, Development, Testing Data and Analytics Application Management, Infrastructure, DevOps 3

  4. Content Introducing Production Systems What Goes Wrong in Production? Solutions for Production Systems Conclusions 4

  5. Production Systems 5

  6. What is a production system? Any system 
 being used 
 for real work 6

  7. Why is Productionisation Hard? No one teaches you about production who do you talk to? what do they want? what is the definition of “done” ? Production is difficult for developers hard to access, interrogate, debug, change, ... 7

  8. A new cast of characters Development Developers Users 8

  9. A new cast of characters Production Operations Auditors Developers Infrastructure Business 
 Management Acquirers Users 8

  10. Production is constrained Highly controlled Content is all valuable Change can be difficult 9

  11. Production is unpredictable 10

  12. Production is highly visible! 11

  13. You don’t own production 12

  14. What goes wrong? 13

  15. Performance surprises Interactive load Batch time surprises System abusers! “all transactions this year”, “average since 1967”, ... 14

  16. Environment bombshells Constraints and contention Unexpected behaviour Integration points 15

  17. Failures happen Software defects Platform failures Environment failures 16

  18. Security tangles Security is simple in Development Much more complex in Production! 17

  19. Finding Solutions 18

  20. Architects Know This - Right? operability scalability deployability reliability D R capacity A H availability security O O monitorability T performance testability interoperability 19

  21. Architectural Heresy Architects obsess about system qualities usually results in good production characteristics However teams just find this all a bit hard too many qualities, need to get functions delivered … and we must empower teams architects can’t be responsible for all of the software being “production ready” 20

  22. Key requirements for production Functionally correct does what the business process requires Stability behaves predictably in all situations Capacity can process the workload required (at all times) Security limits access to those who are authorised to have it 21

  23. Solution Framework Correctness Stability Capacity Security Design Principles Technology Practices 22

  24. Solution Framework Correctness Stability Capacity Security Simplicity Design Principles Technology Practices 22

  25. Solution Framework Correctness Stability Capacity Security Simplicity Design Principles Technology Practices Resource Governor 22

  26. Solution Framework Correctness Stability Capacity Security Simplicity Design Principles Technology Practices Resource Threat Governor Modelling 22

  27. Solution Framework Correctness Stability Capacity Security Simplicity Design Principles Our focus today Technology Practices Resource Threat Governor Modelling 22

  28. General Principles One Team Automate Measure and Improve (feedback loops) Good Enough over Perfection Timeless principles … that led to CD and DevOps 23

  29. So How About DevOps? DevOps helps get code to production not much about whether it is ready for production Developers still need to “productionise” make sure the software meets the requirements for production operation Relatively few developers get much training to prepare them for this 24

  30. DevOps Principles C ommunication A utomation L ean thinking M easurement S haring CALMS - itrevolution.com/devops-culture-part-1 25

  31. Solutions: Achieving Stability 26

  32. Stability - design principles Fail quickly fail fast, timeouts Isolate problems flow control, circuit breakers, bulkheads, asynchronous integration Ensure steady state operation housekeeping, predictable resource allocation, governors, throttling 27

  33. Stability - technology solutions 28

  34. Stability - technology solutions Fail fast 28

  35. Stability - technology solutions Fail fast Bulkhead 28

  36. Stability - technology solutions Fail fast Bulkhead Timeouts 28

  37. Stability - technology solutions Fail fast Governor Bulkhead Timeouts 28

  38. Stability - technology solutions Fail fast Circuit Breaker Governor Bulkhead Timeouts 28

  39. Stability - technology solutions Housekeeping Fail fast Circuit Breaker Governor Bulkhead Timeouts 28

  40. Example - Circuit Breaker timeout Normal err_returned Checking err_returned && 
 err_returned err_count > 10 Tripped 29

  41. Stability - practices Repeatability defined processes, practice scenarios, prelive environments Automation automate the routine, automate the difficult allow the human back in the loop on demand Transparency logging, monitoring, alerts, trends 30

  42. Stability - process automation Automation Logging 
 & Metrics Monitoring 31

  43. Stability - environments Production Prelive UAT Development 32

  44. Stability - environments Production Prelive “Uncontrolled” UAT Development 32

  45. Stability - environments Production Prelive “Uncontrolled” UAT Development “Controlled” 32

  46. Stability - environments Production Prelive “Uncontrolled” UAT Development “Controlled” The DevOps Zone 32

  47. Stability - production runbooks Security, Audit, 
 Compliance, ... Production 
 Constraints Operations Experience • Overview • Install System design • Backout Developers • Op Procs • Investigation • Recovery 33

  48. Solutions: Achieving Capacity 34

  49. Capacity - design principles Minimise workload efficiency is important Flatten the peaks move workload around Design for the large (scalability) understand where the time goes multiply by a million 35

  50. Capacity - technology solutions Measure and minimise understand where the work is Caching and pre-computing reduce the work to be done Sharding and partitioning separate workload to allow scale 36

  51. Capacity - solutions 37

  52. Capacity - solutions Segment Timings 37

  53. Capacity - solutions Static cache Segment Timings 37

  54. Capacity - solutions Lookaside cache Static cache Segment Timings 37

  55. Capacity - solutions Lookaside cache Static cache Result set caching Segment Timings 37

  56. Capacity - solutions Lookaside cache Static cache Precompute Result set caching Segment Timings 37

  57. Capacity - solutions Lookaside cache Static cache Precompute Phased batch Result set caching Segment Timings 37

  58. Moving Work Around Utilisation Utilisation 100 100 75 75 50 50 25 25 0 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 38

  59. Capacity - practices Model and estimate Test capacity on realistic environments allows model calibration Monitoring and trend analysis tests theory against reality spots impending storms before they hit 39

  60. Solutions: Achieving Security 40

  61. Security - key design principles What they don’t have won’t hurt you least privilege - grant the minimum needed Security needs simplicity what you can’t analyse you can’t be sure about Don’t put your eggs in one basket separate privileges to avoid total breaches Fail safely 41

  62. Security - solutions 42

  63. Security - solutions Authentication & Roles 42

  64. Security - solutions Authentication & Roles Least privilege / separation 42

  65. Security - solutions Privacy (TLS) Authentication & Roles Least privilege / separation 42

  66. Security - solutions Trust (certs) Privacy (TLS) Authentication & Roles Least privilege / separation 42

  67. Security - solutions Trust (certs) Privacy (TLS) Authentication & Roles Least privilege Isolation (firewalls / separation & zones) 42

  68. Security - key practices Model threats to identify mitigation Define policy to know what to protect Apply mechanisms to mitigate threats Test security as well as functions 43

  69. Security - techniques Threat 
 Model Security Model 44

  70. Summary 45

  71. Summary Production is just different it’s not yours and you need to respect that Production is demanding Correctness Stability Capacity Security 46

  72. Summary (ii) Identify solutions by requirement & area principles technologies practices 47

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend