Start with Best Practices for Modeling and Managing Today's Network - Part 1
New Features, New Benefits
Network features and related policies can be mapped using these four constructs:
■ Domains: Apply configuration settings consistently across multiple devices. An example is a QoS configuration which may be different by business units, hence, different QoS domains would allow network engineers to assign QoS policies across all devices associated with specific business units in each region.
■ Features: Give the configuration settings for one device at a time, enabling functionality that the device can provide by itself. A good example is the configuration of a device-specific routing table where the device should forward incoming traffic.
■ Globals: Apply these configuration settings throughout the network; these are the same for every device in the network. A good example is NTP (network time protocol) where the central architecture team is defining the only NTP servers permissible for the network.
■ Custom: There will always be exceptions, so not everything may be practical to model in a general feature or domain concepts, especially specific exceptions to single devices only. For example, a specific set of Access Control Lists (ACLs) may only be needed on a single device. For these cases where no other dependencies with other features exist, just applying configuration data to a device may be acceptable.
Whatever network policy is needed can be built using a combination of these constructs. Inherent interdependencies can be flagged by network engineers early, so that a network management system can deploy them in the correct sequential order, optimally applying these features to individual devices as well as across the network to create the target policy. Abstracting network functionality into these types of models allows network engineers to re-focus on the actual network architecture and focus less on the mechanics of the management of configuration data. These lead to a number of benefits:
■ Any hardware, any manufacturer: How a device is configured is now based on how it should perform, by itself or in concert with other devices. As a result, the actual hardware itself, its specific OS/firmware or even the manufacturer no longer matters, as long as the device is capable of performing the desired functionality.
■ Logical separation: NetOps is logically separated from implementation and maintenance (DevOps). For example, architects can define the features, domains and global settings needed for a given network infrastructure, assemble them into logical groups and resolve any interdependencies. They can then be tested and validated by, for example, the security team. The assembled features, domains and globals are handed over to the operational team, who will deploy them onto the network and manage them over their lifecycle.
■ Communal wisdom: When networks are modeled through logical constructs, it allows for a wide exchange of best-practice reference designs based on common user requirements. Different teams of architects can exchange information about the models they use for specific network functionalities without having to revert to low-level configuration settings. This opens the possibility of creating network engineering communities that exchange specific models based on their desired use cases with clearly defined interdependencies and conflict resolution against other models.
Managing the Modern Network
What is needed to create a next-generation network management tool? Nothing less than the development of a sophisticated network-aware orchestration engine that is able to detect any interdependencies, resolve them and deploy network policies automatically over the network.
First, consider these non-technical challenges:
■ Users need to firmly believe that the logical network model will, in fact, result in the correct configuration of all devices in the network. Many network engineers are still most comfortable with command line interface (CLI) created from scripts and templates.
■ The primary focus of network engineers is on proper device configurations and ensuring the device is performing as intended. Any next-generation tools have been designed with a network engineering focus in mind, allowing network engineers to use the system with a much shorter learning curve and minimal programming expertise.
■ Get the buy-in of DevOps and NetOps teams, who may be skeptical to trust device configuration to a new management tool.
Technically speaking, here's what today's management tools should include:
■ Management to handle the high degree of customization needed.
■ Zero-touch provisioning so that the onboarding of new devices into the system is as fluid as possible, allowing generalist IT staff to install routers and trigger device provisioning automatically.
■ The ability to limit or flag unauthorized manual device configuration changes with automatic remediation when needed.
■ Configuration preview that allows dry runs of new configurations to understand all changes that may have to be performed, even on other network devices when needed.
■ Step-by-step verification of device provisioning actions with automatic revert on errors.
A New Approach
Organizations can bring their networks into present-day functionality with tools that provide complete abstraction of network functions while providing deeply integrated model interdependency verification, deployment previews and layer-by-layer provisioning. For example, replacing an existing device with a newer model, even if it's from a different vendor, can be detected and automatically provisioned. Such solutions that can resolve any potential conflicts and interdependencies, even across vendors, are becoming increasingly important as network devices are virtualized on common platforms and the individual strength of vendor-specific solutions are combined into one multi-vendor solution.
A model like this that addresses the entire stack provides clarity to architecture and implementation teams because the handoff points are well defined. This, in turn, leads to faster implementation of business requirements and higher reliability. Such a system creates quicker identification of and recovery from network outages, which increases customer confidence and satisfaction and saves money from unexpected downtime.
Dr. Stefan Dietrich is VP of Product Strategy at Glue Networks.
The Latest
AI sure grew fast in popularity, but are AI apps any good? ... If companies are going to keep integrating AI applications into their tech stack at the rate they are, then they need to be aware of AI's limitations. More importantly, they need to evolve their testing regiment ...
If you were lucky, you found out about the massive CrowdStrike/Microsoft outage last July by reading about it over coffee. Those less fortunate were awoken hours earlier by frantic calls from work ... Whether you were directly affected or not, there's an important lesson: all organizations should be conducting in-depth reviews of testing and change management ...
In MEAN TIME TO INSIGHT Episode 11, Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at EMA discusses Secure Access Service Edge (SASE) ...
On average, only 48% of digital initiatives enterprise-wide meet or exceed their business outcome targets according to Gartner's annual global survey of CIOs and technology executives ...
Artificial intelligence (AI) is rapidly reshaping industries around the world. From optimizing business processes to unlocking new levels of innovation, AI is a critical driver of success for modern enterprises. As a result, business leaders — from DevOps engineers to CTOs — are under pressure to incorporate AI into their workflows to stay competitive. But the question isn't whether AI should be adopted — it's how ...
The mobile app industry continues to grow in size, complexity, and competition. Also not slowing down? Consumer expectations are rising exponentially along with the use of mobile apps. To meet these expectations, mobile teams need to take a comprehensive, holistic approach to their app experience ...
Users have become digital hoarders, saving everything they handle, including outdated reports, duplicate files and irrelevant documents that make it difficult to find critical information, slowing down systems and productivity. In digital terms, they have simply shoved the mess off their desks and into the virtual storage bins ...
Today we could be witnessing the dawn of a new age in software development, transformed by Artificial Intelligence (AI). But is AI a gateway or a precipice? Is AI in software development transformative, just the latest helpful tool, or a bunch of hype? To help with this assessment, DEVOPSdigest invited experts across the industry to comment on how AI can support the SDLC. In this epic multi-part series to be posted over the next several weeks, DEVOPSdigest will explore the advantages and disadvantages; the current state of maturity and adoption; and how AI will impact the processes, the developers, and the future of software development ...
Half of all employees are using Shadow AI (i.e. non-company issued AI tools), according to a new report by Software AG ...
On their digital transformation journey, companies are migrating more workloads to the cloud, which can incur higher costs during the process due to the higher volume of cloud resources needed ... Here are four critical components of a cloud governance framework that can help keep cloud costs under control ...