Next Generation Monitoring in Cisco Security Cloud Leon De Jager and Nitin Thakur © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 • What is Cisco Security Cloud Operations? • Challenges faced • Scale of the Solution • How AppDynamics was selected • Speed & Ease of deployment • Issues identified so far • What next? © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 Many organizations want the savings and efficiency benefits of cloud computing, but don’t want to sacrifice traditional levels of control and security. Security is traditionally applied at the network perimeter; this disappears in cloud-based computing, in which borderless networks connect many types of users with enterprise private data centers and cloud-based resources. Some transactions, such as a remote worker accessing Salesforce.com, don’t even pass through the corporate network or scanning systems The Cisco Borderless Network architecture addresses this challenge, securing cloud computing by placing intelligent control points and endpoints throughout the network. • Cisco ScanSafe Web Security • Cisco IronPort® Cloud Email Security, Hybrid Email Security and Managed Email Security • Cisco Registered Envelope Service • Cisco AnyConnect Secure Mobility Solution • Cisco Security Intelligence Operations Cisco Cloud Web Security (CWS) provides industry-leading security and control for the distributed enterprise. Users are protected everywhere, all the time when using CWS through Cisco worldwide threat intelligence, advanced threat defense capabilities, and roaming user protection. http://www.cisco.com/c/en/us/products/security/cloud-web-security/index.html © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Cisco currently uses a limited number of multiple standalone technologies from homegrown tools and multiple vendors. These separate implementations have created an expensive, fragmented amalgamation of independent products that: Limits – visibility into apps & the business transaction functions performed Strains – capital and manpower budgets Dilutes – a clear-cut root-cause of an issue by the confusion of multiple tools Delays – time to remediation Mobile App Monitoring NO VENDOR Diagnostics End User Experience Monitoring DotCom + EC2 Database Monitoring Business Transaction Monitoring NO VENDOR Tier-1 + Run Book Automation Application Monitoring HOMEBREW Synthetic Monitoring Server Monitoring HOMEBREW Alerting Network Monitoring Cacti, Nagios, OpenNMS HOMEBREW Log Monitoring Big Data Monitoring Kibana HOMEBREW Cloud Monitoring © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 AppDynamics will add missing capabilities and help consolidate and compliment our existing monitoring solution In a single tool, AppDynamics provides complete end-to-end transactional visibility for rapid troubleshooting of Production and Development application performance issues. The in-depth features of our product and the power of their integration will allow your teams to: Simplify – NO manual configuration when changes are introduced Enables – teams to focus on new, more relevant projects instead of firefighting Unify – various teams by providing the same relevant view into apps Saves – capital and manpower budgets Current State Current State Mobile App Monitoring NO VENDOR Application Diagnostics Real User Monitoring DotCom + EC2 ? Database Diagnostics Business Transaction Monitoring NO VENDOR Tier-1 + Application Monitoring CUSTOM Server Monitoring Network Monitoring Big Data Monitoring Cacti, Nagios, OpenNMS Kibana © 2011 Cisco and/or its affiliates. All rights reserved. ROADMAP ROADMAP ROADMAP Run Book Automation HOMEBRE W Alerting HOMEBRE W Synthetic Monitoring HOMEBRE W Log Monitoring HOMEBRE W Cloud Monitoring Cisco Confidential 6 • Requirement gathering from multiple teams and end users Some high level requirements which we looked at: • Compute requirements to be minimal for running the APM solution • Ease of auto detection of business transactions • Future roadmap from AppDynamics more aligned with business requirements • PoC run for an extended period, including performance tests to ensure no negative impact on applications • Runbook automation functionality to help reduce false positives from existing monitoring infrastructure © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 • 23 Datacenters Globally • Hub & Spoke Architecture Design © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8 • 23 Datacenters Globally • 6.3 Billion Web Requests scanned per day • 200 Million Threats blocked per day • Reporting Database contains 500 billion rows on average. • Reporting Database is approximately 220TB in size • 4000+ Web Scanning Hosts distributed globally • AppDynamics deployed onto 14000 JVMs globally © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9 Global deployment across 23 datacenters covering 4000+ hosts in less than a week. Example puppet module available on GitHub. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10 Some of the issues we’ve been able to identify with the use of AppDynamics:- • Unique Slow Business Transactions affecting services: Identified • Configuration errors in applications: Identified and remediated (Prevented 70M Slow transaction from occurring) • Unique behavior of the service dependent on end user usage Identified, further analysis undertaking • Inter application communication and failure in the network stack Identified and remediated © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 • Nagios used for existing application monitoring, approximately 25 service checks configured per host. • AppDynamics Monitoring Extensions to be used to replace Nagios application checks • Runbook Automation • Further integration into more Security Cloud Operations Products • Chaos Monkey vs Runbook Automation © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12 Thank you.