SlideShare a Scribd company logo
1 of 34
Reliable Security Always™
Security and Observability of
Application Traffic in
Kubernetes
Akshay Mathur
@akshaymathu
2.
Multi Clouds Will be Dominant Deployment Model
71%
Multi
18%
PUBLIC
CLOUD ONLY
6%
PRIVATE
CLOUD ONLY
Source: RightScale State of the Cloud Report
GLOBAL HYBRID CLOUD MARKET
Asia Pacific region would exhibit the
highest CAGR of 25.3% during 2018 - 2025
Source: https://www.alliedmarketresearch.com/hybrid-cloud-market
Growing Industry Trend: Multi-Cloud
4
NEW DE-FACTO STANDARDS:
Growing Industry Trend: Containers and Kubernetes
APPLICATIONS
Moving from Monolith to Micro Services
APPLICATION DEPLOYMENTS
Moving from Hardware Servers or
Virtual Machines to Containers
o Adopted by all industry major players
– AWS, Azure, Google, VMWare, RedHat.
o 10X increase in usage in Azure and GCP last year
o 10X increase in deployment last 3 years
o Deployment Size increased 75% in a year
Growing Kubernetes Adoption
5
APP/IT
TEAMS
NEED
Speed Roll-out
Of Revenue-
Generating
Services
Team Agility
Self-Service
BUSINESS
NEEDS
Data Security
& Privacy
Protection For
Customers
Prevent
External Attacks
& Access Control
Between
Distributed
Microservices
Ease-of-
Operations &
Improved Team
Efficiency
Ensure
Excellent &
Consistent User
Experience
6
Cloud Provider Is One Piece of The Ecosystem
They secure only Infrastructure - Application owners need to do their bit
AWS
Source: https://cloud.google.com/blog/products/containers-kubernetes/exploring-container-security-the-shared-
responsibility-model-in-gke-container-security-shared-responsibility-model-gke
Source :https://www.redhat.com/en/topics/security/cloud-security
OpenShift Shared Security Model
Secure
Container host
and platform on
any cloud
Secure container registry
Secure container deployments
Secure networking
Secure build pipeline
OpenShift Shared Security Model
Secure
Container host
and platform on
any cloud
Secure container registry
Secure container deployments
Secure networking
Secure build pipeline
App Svc App Svc App Svc App Svc App Svc
Load Balancing and Security
for North-South TrafficSecurity for East-West Traffic
9
Real-world Challenges
10
An E-Com Company: Access Control between Microservices
• Security and compliance require
monitoring traffic between
microservices
• In absence of policy
enforcement, this company
isolated clusters
Kubernetes Node
Kubernetes Node
Kubernetes Node
Kubernetes Node
11
A FinTech Company: Access Control and Traffic Flow Visibility problem
• Separated microservices via
namespaces
• Controlled traffic flow via
application Gateway
Kubernetes Node Kubernetes Node
Kubernetes NodeKubernetes Node
12
All Companies: Need to keep latency at minimum
• Multiple traffic handling layers
add its own latency
◦ IPS/IDS
◦ L7 LB
◦ Kube Proxy
Kubernetes Node
13
A Media Service Company: Security Increased Cost of Operations
• Istio sidecar model was tried
for security implementation
• Sidecar model increased
resource requirement leading
to increased cost
Kubernetes Node
14
All Companies: Need to Manage Security across Environments
• Not all workloads are in
Kubernetes
• Managing security separately
for each env was challenging
Public Private
Data
Center
15
Security & Policy
Enforcement
Security is Required
One need to know how to embrace it
Security built into application Security provided by ecosystem
17
Combine Traffic Handling and Security
Modern Approach:
Unified solution providing load
balancing as well as application
traffic security
Pros:
• Operational simplicity
• Better application
performance
Kubernetes Node
Traditional Approach:
Load Balancing and application
traffic security deployed
separately
Cons:
• Operational Complexity
• Increased latency
18
For East-West Traffic
• Access control between
microservices
• Transparent encryption for traffic
between nodes
• Lower resource requirement as
compare to sidecar service mesh
model
• Application layer traffic visibility
and analytics
Node 1 Node 2
S1
S2
19
For North-South Traffic
• Container-native load balancer for L7 traffic
routing (with ability to route traffic based
on any info in HTTP header)
• SSL offload
• Reduced application response time
• Web Application Firewall
• L7 DDoS protection
• Central management for load balancer
• Application layer traffic visibility and
analytics
Kubernetes Cluster
20
More about the LB
• Deployed as DaemonSet
◦ Image on Docker Hub
◦ Uses host networking
• Based on NginX core
◦ 3rd party modules – ModSec, LuaJit
etc.
◦ Custom modules
• Connection Pooling
• Distributed Limit Enforcement
• Dynamic Upstream
21
More about the Kubernetes Connector
• Deployed as K8s ‘Deployment’
◦ Image on Docker Hub
◦ One instance in a cluster
• Monitors Lifecycle of Containers
and Ingress Resource
• Calls APIs to update LB
22
Policy Configuration
• Infrastructure as code
• Kubernetes Service aand
Ingress definitions are
extended via annotations
• Simple annotations to
configure policies
23
Application Layer Visibility
24
Descriptive Analytics
• Health Status
• Logs & Events
PERFORMANCE
MONITORING Diagnostic Analytics
• Per-App metrics
• Trend Analysis
FASTER
TROUBLESHOOTING Predictive Analytics
• Anomalies/Threats
• Correlation
INSIGHTS
Prescriptive Analytics
• Policy updates
• Behavior Analysis
ADAPTIVE
CONTROLS
Visibility, Analytics & Insights
25.
Per-Service Visibility, Analytics & Reporting
o Comprehensive
metrics & logs
o View, monitor and
analyze
o Efficient
troubleshooting
o Generate custom
reports
26.
27.
A10 ADC: Per-app Visibility : End-to-End Latency
o Distinguish between application,
client and infrastructure issues
o Quickly identify consistent or
one-off glitch
o Pinpoint concerns and take
corrective action
28.
Detecting And Blocking Application Attack
29
Blue-Green through Advance Load Balancer
with control over user experience
• Split traffic based on any info in
HTTP header
◦ Browser, Device, OS
◦ Country, IP Network
◦ User Identification
• Move with Confidence
◦ Compare Before/After Metrics
• 1-click Roll-out or Roll-backA10 Lightning ADC Cluster
Harmony Controller
Harmony Portal
Version 1
Version 2
Offline Payment for Online Service – Blue-Green Roll-out At A Few Clicks
31
Minimizing Cost of Operations
vs
Kubernetes NodeKubernetes Node
Sidecar Proxy Deployment Hub-Spoke Proxy Deployment
Resource intensive
Expensive TCO
Low overhead
Lower TCO
32
Takeaways: Simplified and Improved Security & Analytics
• Simple Architecture
• Clear ‘Dev’ and ‘Ops’ separation
• ‘Config as code’ for automation
• Application Traffic Analytics for efficiency
33
Thank You
@akshaymathu
amathur@a10networks.com
Skype: mathurakshay
Sample Config Files @ https://gist.github.com/c-success
Steps to try @ http://docs.hc.a10networks.com/IngressController/2.0/a10-ladc-ingress-controller.html
Thank You
Reliable Security Always™

More Related Content

What's hot

Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...
Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...
Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...Codit
 
IoTforReal Seminar slidedeck
IoTforReal Seminar slidedeckIoTforReal Seminar slidedeck
IoTforReal Seminar slidedeckCodit
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Altoros
 
OK, I Need an IoT Service. Now What??
OK, I Need an IoT Service. Now What??OK, I Need an IoT Service. Now What??
OK, I Need an IoT Service. Now What??Guy Vinograd ☁
 
Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...
Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...
Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...Codit
 
[WSO2Con USA 2018] Adaptive and Iterative Integration for Microservices and C...
[WSO2Con USA 2018] Adaptive and Iterative Integration for Microservices and C...[WSO2Con USA 2018] Adaptive and Iterative Integration for Microservices and C...
[WSO2Con USA 2018] Adaptive and Iterative Integration for Microservices and C...WSO2
 
Software Defined Networking - Next-Gen Enterprise Networks
Software Defined Networking - Next-Gen Enterprise NetworksSoftware Defined Networking - Next-Gen Enterprise Networks
Software Defined Networking - Next-Gen Enterprise NetworksOpen Networking Summits
 
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016ThousandEyes
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMahbubul Alam
 
Akachain Hyperledger Fabric best practices
Akachain Hyperledger Fabric best practicesAkachain Hyperledger Fabric best practices
Akachain Hyperledger Fabric best practicesEledra Nguyen
 
IoT in the Cloud: Build and Unleash the Value in your Renewable Energy System
IoT in the Cloud: Build and Unleash the Value in your Renewable Energy SystemIoT in the Cloud: Build and Unleash the Value in your Renewable Energy System
IoT in the Cloud: Build and Unleash the Value in your Renewable Energy SystemMark Heckler
 
Blockchain in Practice
Blockchain in PracticeBlockchain in Practice
Blockchain in PracticeCodit
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Codit
 
Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Kemp
 
COMIT Community Day - Summer 2017 Ecologic slides
COMIT Community Day - Summer 2017 Ecologic slidesCOMIT Community Day - Summer 2017 Ecologic slides
COMIT Community Day - Summer 2017 Ecologic slidesComit Projects Ltd
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...NETSCOUT
 
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...Codit
 
Affordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlAffordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlInductive Automation
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?Ahmed Banafa
 

What's hot (20)

Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...
Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...
Event-Driven Serverless Architecture - the next big thing in the cloud (Cleme...
 
IoTforReal Seminar slidedeck
IoTforReal Seminar slidedeckIoTforReal Seminar slidedeck
IoTforReal Seminar slidedeck
 
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
Unified Analytics in GE’s Predix for the IIoT: Tying Operational Technology t...
 
OK, I Need an IoT Service. Now What??
OK, I Need an IoT Service. Now What??OK, I Need an IoT Service. Now What??
OK, I Need an IoT Service. Now What??
 
Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...
Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...
Hoe het Azure ecosysteem een cruciale rol speelt in uw IoT-oplossing (Glenn C...
 
[WSO2Con USA 2018] Adaptive and Iterative Integration for Microservices and C...
[WSO2Con USA 2018] Adaptive and Iterative Integration for Microservices and C...[WSO2Con USA 2018] Adaptive and Iterative Integration for Microservices and C...
[WSO2Con USA 2018] Adaptive and Iterative Integration for Microservices and C...
 
Software Defined Networking - Next-Gen Enterprise Networks
Software Defined Networking - Next-Gen Enterprise NetworksSoftware Defined Networking - Next-Gen Enterprise Networks
Software Defined Networking - Next-Gen Enterprise Networks
 
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
Monitoring Apps & Networks in a Cloud-Centric World at Gartner IOSS 2016
 
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul AlamMaking IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
Making IoT a Reality_Axeda _ May 8 2013 _Mahbubul Alam
 
Akachain Hyperledger Fabric best practices
Akachain Hyperledger Fabric best practicesAkachain Hyperledger Fabric best practices
Akachain Hyperledger Fabric best practices
 
IoT in the Cloud: Build and Unleash the Value in your Renewable Energy System
IoT in the Cloud: Build and Unleash the Value in your Renewable Energy SystemIoT in the Cloud: Build and Unleash the Value in your Renewable Energy System
IoT in the Cloud: Build and Unleash the Value in your Renewable Energy System
 
Blockchain in Practice
Blockchain in PracticeBlockchain in Practice
Blockchain in Practice
 
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
Volwassen IoT-oplossingen met Microsoft Azure (Sam Vanhoutte at CONNECT17)
 
Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF
 
COMIT Community Day - Summer 2017 Ecologic slides
COMIT Community Day - Summer 2017 Ecologic slidesCOMIT Community Day - Summer 2017 Ecologic slides
COMIT Community Day - Summer 2017 Ecologic slides
 
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...End to End Application Visibility and Troubleshooting Across the Virtual Clou...
End to End Application Visibility and Troubleshooting Across the Virtual Clou...
 
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
Flight Delay Compensation: How SwissRe is exploring new territories in Busine...
 
5G Enablers and Use Cases, an European Pespective
5G Enablers and Use Cases, an European Pespective5G Enablers and Use Cases, an European Pespective
5G Enablers and Use Cases, an European Pespective
 
Affordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlAffordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process Control
 
What is Web-Scale IT ?
What is Web-Scale IT ?What is Web-Scale IT ?
What is Web-Scale IT ?
 

Similar to Security and Observability of Application Traffic in Kubernetes

4 Key Considerations for Advanced Load Balancing & Traffic Insights for Kuber...
4 Key Considerations for Advanced Load Balancing & Traffic Insights for Kuber...4 Key Considerations for Advanced Load Balancing & Traffic Insights for Kuber...
4 Key Considerations for Advanced Load Balancing & Traffic Insights for Kuber...DevOps.com
 
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft AzureModernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft AzureMitchell Pronschinske
 
Kubernetes Journey of a Large FinTech
Kubernetes Journey of a Large FinTechKubernetes Journey of a Large FinTech
Kubernetes Journey of a Large FinTechAkshay Mathur
 
Driving success in the cloud with NGINX
Driving success in the cloud with NGINXDriving success in the cloud with NGINX
Driving success in the cloud with NGINXNGINX, Inc.
 
ISTIO Deep Dive
ISTIO Deep DiveISTIO Deep Dive
ISTIO Deep DiveYong Feng
 
Enabling Fast IT using Containers, Microservices and DevOps Model
Enabling Fast IT using Containers, Microservices and DevOps ModelEnabling Fast IT using Containers, Microservices and DevOps Model
Enabling Fast IT using Containers, Microservices and DevOps ModelCisco DevNet
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxAvi Networks
 
Enabling Production Grade Containerized Applications through Policy Based Inf...
Enabling Production Grade Containerized Applications through Policy Based Inf...Enabling Production Grade Containerized Applications through Policy Based Inf...
Enabling Production Grade Containerized Applications through Policy Based Inf...Docker, Inc.
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPOlivia LaMar
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...AlgoSec
 
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...Konveyor Community
 
Kubernetes: Dive into the Future of Infrastructure
Kubernetes: Dive into the Future of InfrastructureKubernetes: Dive into the Future of Infrastructure
Kubernetes: Dive into the Future of InfrastructureGlobalLogic Ukraine
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecaseRENJITHKNAIR5
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshowpatmisasi
 
Webinar unlock the power of adc management and automation AppViewX
Webinar unlock the power of adc management and automation AppViewXWebinar unlock the power of adc management and automation AppViewX
Webinar unlock the power of adc management and automation AppViewXAppViewX
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart CityFanky Christian
 
3 reasons to pick a time series platform for monitoring dev ops driven contai...
3 reasons to pick a time series platform for monitoring dev ops driven contai...3 reasons to pick a time series platform for monitoring dev ops driven contai...
3 reasons to pick a time series platform for monitoring dev ops driven contai...DevOps.com
 
Serverless: Market Overview and Investment Opportunities
Serverless: Market Overview and Investment OpportunitiesServerless: Market Overview and Investment Opportunities
Serverless: Market Overview and Investment OpportunitiesUnderscore VC
 

Similar to Security and Observability of Application Traffic in Kubernetes (20)

4 Key Considerations for Advanced Load Balancing & Traffic Insights for Kuber...
4 Key Considerations for Advanced Load Balancing & Traffic Insights for Kuber...4 Key Considerations for Advanced Load Balancing & Traffic Insights for Kuber...
4 Key Considerations for Advanced Load Balancing & Traffic Insights for Kuber...
 
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft AzureModernizing Application Deployments with HashiCorp Consul on Microsoft Azure
Modernizing Application Deployments with HashiCorp Consul on Microsoft Azure
 
Kubernetes Journey of a Large FinTech
Kubernetes Journey of a Large FinTechKubernetes Journey of a Large FinTech
Kubernetes Journey of a Large FinTech
 
Driving success in the cloud with NGINX
Driving success in the cloud with NGINXDriving success in the cloud with NGINX
Driving success in the cloud with NGINX
 
ISTIO Deep Dive
ISTIO Deep DiveISTIO Deep Dive
ISTIO Deep Dive
 
Enabling Fast IT using Containers, Microservices and DevOps Model
Enabling Fast IT using Containers, Microservices and DevOps ModelEnabling Fast IT using Containers, Microservices and DevOps Model
Enabling Fast IT using Containers, Microservices and DevOps Model
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
 
Enabling Production Grade Containerized Applications through Policy Based Inf...
Enabling Production Grade Containerized Applications through Policy Based Inf...Enabling Production Grade Containerized Applications through Policy Based Inf...
Enabling Production Grade Containerized Applications through Policy Based Inf...
 
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAPSecuring Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
Securing Kubernetes Clusters with NGINX Plus Ingress Controller & NAP
 
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
Accelerate Application Deployment Across Cisco ACI Fabric, On-Premise Firewal...
 
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
[Konveyor] migrate and modernize your application portfolio to kubernetes wit...
 
Kubernetes: Dive into the Future of Infrastructure
Kubernetes: Dive into the Future of InfrastructureKubernetes: Dive into the Future of Infrastructure
Kubernetes: Dive into the Future of Infrastructure
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
Primend Praktiline Konverents - Rakenduse keskne IT infrastruktuur / Cisco Ap...
 
F5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 RoadshowF5 Synthesis Toronto February 2014 Roadshow
F5 Synthesis Toronto February 2014 Roadshow
 
Webinar unlock the power of adc management and automation AppViewX
Webinar unlock the power of adc management and automation AppViewXWebinar unlock the power of adc management and automation AppViewX
Webinar unlock the power of adc management and automation AppViewX
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
Cloud computing for Smart City
Cloud computing for Smart CityCloud computing for Smart City
Cloud computing for Smart City
 
3 reasons to pick a time series platform for monitoring dev ops driven contai...
3 reasons to pick a time series platform for monitoring dev ops driven contai...3 reasons to pick a time series platform for monitoring dev ops driven contai...
3 reasons to pick a time series platform for monitoring dev ops driven contai...
 
Serverless: Market Overview and Investment Opportunities
Serverless: Market Overview and Investment OpportunitiesServerless: Market Overview and Investment Opportunities
Serverless: Market Overview and Investment Opportunities
 

More from Akshay Mathur

Documentation with Sphinx
Documentation with SphinxDocumentation with Sphinx
Documentation with SphinxAkshay Mathur
 
Kubernetes as Orchestrator for A10 Lightning Controller
Kubernetes as Orchestrator for A10 Lightning ControllerKubernetes as Orchestrator for A10 Lightning Controller
Kubernetes as Orchestrator for A10 Lightning ControllerAkshay Mathur
 
Cloud Bursting with A10 Lightning ADS
Cloud Bursting with A10 Lightning ADSCloud Bursting with A10 Lightning ADS
Cloud Bursting with A10 Lightning ADSAkshay Mathur
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSAkshay Mathur
 
Techniques for scaling application with security and visibility in cloud
Techniques for scaling application with security and visibility in cloudTechniques for scaling application with security and visibility in cloud
Techniques for scaling application with security and visibility in cloudAkshay Mathur
 
Introduction to Node js
Introduction to Node jsIntroduction to Node js
Introduction to Node jsAkshay Mathur
 
Object Oriented Programing in JavaScript
Object Oriented Programing in JavaScriptObject Oriented Programing in JavaScript
Object Oriented Programing in JavaScriptAkshay Mathur
 
Getting Started with Angular JS
Getting Started with Angular JSGetting Started with Angular JS
Getting Started with Angular JSAkshay Mathur
 
Releasing Software Without Testing Team
Releasing Software Without Testing TeamReleasing Software Without Testing Team
Releasing Software Without Testing TeamAkshay Mathur
 
Getting Started with jQuery
Getting Started with jQueryGetting Started with jQuery
Getting Started with jQueryAkshay Mathur
 
Creating Single Page Web App using Backbone JS
Creating Single Page Web App using Backbone JSCreating Single Page Web App using Backbone JS
Creating Single Page Web App using Backbone JSAkshay Mathur
 
Getting Started with Web
Getting Started with WebGetting Started with Web
Getting Started with WebAkshay Mathur
 
Getting Started with Javascript
Getting Started with JavascriptGetting Started with Javascript
Getting Started with JavascriptAkshay Mathur
 
Using Google App Engine Python
Using Google App Engine PythonUsing Google App Engine Python
Using Google App Engine PythonAkshay Mathur
 
Testing Single Page Webapp
Testing Single Page WebappTesting Single Page Webapp
Testing Single Page WebappAkshay Mathur
 

More from Akshay Mathur (18)

Documentation with Sphinx
Documentation with SphinxDocumentation with Sphinx
Documentation with Sphinx
 
Kubernetes as Orchestrator for A10 Lightning Controller
Kubernetes as Orchestrator for A10 Lightning ControllerKubernetes as Orchestrator for A10 Lightning Controller
Kubernetes as Orchestrator for A10 Lightning Controller
 
Cloud Bursting with A10 Lightning ADS
Cloud Bursting with A10 Lightning ADSCloud Bursting with A10 Lightning ADS
Cloud Bursting with A10 Lightning ADS
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWS
 
Techniques for scaling application with security and visibility in cloud
Techniques for scaling application with security and visibility in cloudTechniques for scaling application with security and visibility in cloud
Techniques for scaling application with security and visibility in cloud
 
Introduction to Node js
Introduction to Node jsIntroduction to Node js
Introduction to Node js
 
Object Oriented Programing in JavaScript
Object Oriented Programing in JavaScriptObject Oriented Programing in JavaScript
Object Oriented Programing in JavaScript
 
Getting Started with Angular JS
Getting Started with Angular JSGetting Started with Angular JS
Getting Started with Angular JS
 
Releasing Software Without Testing Team
Releasing Software Without Testing TeamReleasing Software Without Testing Team
Releasing Software Without Testing Team
 
Getting Started with jQuery
Getting Started with jQueryGetting Started with jQuery
Getting Started with jQuery
 
CoffeeScript
CoffeeScriptCoffeeScript
CoffeeScript
 
Creating Single Page Web App using Backbone JS
Creating Single Page Web App using Backbone JSCreating Single Page Web App using Backbone JS
Creating Single Page Web App using Backbone JS
 
Getting Started with Web
Getting Started with WebGetting Started with Web
Getting Started with Web
 
Getting Started with Javascript
Getting Started with JavascriptGetting Started with Javascript
Getting Started with Javascript
 
Using Google App Engine Python
Using Google App Engine PythonUsing Google App Engine Python
Using Google App Engine Python
 
Working with GIT
Working with GITWorking with GIT
Working with GIT
 
Testing Single Page Webapp
Testing Single Page WebappTesting Single Page Webapp
Testing Single Page Webapp
 
Mongo db
Mongo dbMongo db
Mongo db
 

Recently uploaded

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 

Recently uploaded (20)

Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 

Security and Observability of Application Traffic in Kubernetes

  • 1. Reliable Security Always™ Security and Observability of Application Traffic in Kubernetes Akshay Mathur @akshaymathu
  • 2. 2. Multi Clouds Will be Dominant Deployment Model 71% Multi 18% PUBLIC CLOUD ONLY 6% PRIVATE CLOUD ONLY Source: RightScale State of the Cloud Report
  • 3. GLOBAL HYBRID CLOUD MARKET Asia Pacific region would exhibit the highest CAGR of 25.3% during 2018 - 2025 Source: https://www.alliedmarketresearch.com/hybrid-cloud-market Growing Industry Trend: Multi-Cloud
  • 4. 4 NEW DE-FACTO STANDARDS: Growing Industry Trend: Containers and Kubernetes APPLICATIONS Moving from Monolith to Micro Services APPLICATION DEPLOYMENTS Moving from Hardware Servers or Virtual Machines to Containers o Adopted by all industry major players – AWS, Azure, Google, VMWare, RedHat. o 10X increase in usage in Azure and GCP last year o 10X increase in deployment last 3 years o Deployment Size increased 75% in a year Growing Kubernetes Adoption
  • 5. 5 APP/IT TEAMS NEED Speed Roll-out Of Revenue- Generating Services Team Agility Self-Service BUSINESS NEEDS Data Security & Privacy Protection For Customers Prevent External Attacks & Access Control Between Distributed Microservices Ease-of- Operations & Improved Team Efficiency Ensure Excellent & Consistent User Experience
  • 6. 6 Cloud Provider Is One Piece of The Ecosystem They secure only Infrastructure - Application owners need to do their bit AWS Source: https://cloud.google.com/blog/products/containers-kubernetes/exploring-container-security-the-shared- responsibility-model-in-gke-container-security-shared-responsibility-model-gke Source :https://www.redhat.com/en/topics/security/cloud-security
  • 7. OpenShift Shared Security Model Secure Container host and platform on any cloud Secure container registry Secure container deployments Secure networking Secure build pipeline
  • 8. OpenShift Shared Security Model Secure Container host and platform on any cloud Secure container registry Secure container deployments Secure networking Secure build pipeline App Svc App Svc App Svc App Svc App Svc Load Balancing and Security for North-South TrafficSecurity for East-West Traffic
  • 10. 10 An E-Com Company: Access Control between Microservices • Security and compliance require monitoring traffic between microservices • In absence of policy enforcement, this company isolated clusters Kubernetes Node Kubernetes Node Kubernetes Node Kubernetes Node
  • 11. 11 A FinTech Company: Access Control and Traffic Flow Visibility problem • Separated microservices via namespaces • Controlled traffic flow via application Gateway Kubernetes Node Kubernetes Node Kubernetes NodeKubernetes Node
  • 12. 12 All Companies: Need to keep latency at minimum • Multiple traffic handling layers add its own latency ◦ IPS/IDS ◦ L7 LB ◦ Kube Proxy Kubernetes Node
  • 13. 13 A Media Service Company: Security Increased Cost of Operations • Istio sidecar model was tried for security implementation • Sidecar model increased resource requirement leading to increased cost Kubernetes Node
  • 14. 14 All Companies: Need to Manage Security across Environments • Not all workloads are in Kubernetes • Managing security separately for each env was challenging Public Private Data Center
  • 16. Security is Required One need to know how to embrace it Security built into application Security provided by ecosystem
  • 17. 17 Combine Traffic Handling and Security Modern Approach: Unified solution providing load balancing as well as application traffic security Pros: • Operational simplicity • Better application performance Kubernetes Node Traditional Approach: Load Balancing and application traffic security deployed separately Cons: • Operational Complexity • Increased latency
  • 18. 18 For East-West Traffic • Access control between microservices • Transparent encryption for traffic between nodes • Lower resource requirement as compare to sidecar service mesh model • Application layer traffic visibility and analytics Node 1 Node 2 S1 S2
  • 19. 19 For North-South Traffic • Container-native load balancer for L7 traffic routing (with ability to route traffic based on any info in HTTP header) • SSL offload • Reduced application response time • Web Application Firewall • L7 DDoS protection • Central management for load balancer • Application layer traffic visibility and analytics Kubernetes Cluster
  • 20. 20 More about the LB • Deployed as DaemonSet ◦ Image on Docker Hub ◦ Uses host networking • Based on NginX core ◦ 3rd party modules – ModSec, LuaJit etc. ◦ Custom modules • Connection Pooling • Distributed Limit Enforcement • Dynamic Upstream
  • 21. 21 More about the Kubernetes Connector • Deployed as K8s ‘Deployment’ ◦ Image on Docker Hub ◦ One instance in a cluster • Monitors Lifecycle of Containers and Ingress Resource • Calls APIs to update LB
  • 22. 22 Policy Configuration • Infrastructure as code • Kubernetes Service aand Ingress definitions are extended via annotations • Simple annotations to configure policies
  • 24. 24 Descriptive Analytics • Health Status • Logs & Events PERFORMANCE MONITORING Diagnostic Analytics • Per-App metrics • Trend Analysis FASTER TROUBLESHOOTING Predictive Analytics • Anomalies/Threats • Correlation INSIGHTS Prescriptive Analytics • Policy updates • Behavior Analysis ADAPTIVE CONTROLS Visibility, Analytics & Insights
  • 25. 25. Per-Service Visibility, Analytics & Reporting o Comprehensive metrics & logs o View, monitor and analyze o Efficient troubleshooting o Generate custom reports
  • 26. 26.
  • 27. 27. A10 ADC: Per-app Visibility : End-to-End Latency o Distinguish between application, client and infrastructure issues o Quickly identify consistent or one-off glitch o Pinpoint concerns and take corrective action
  • 28. 28. Detecting And Blocking Application Attack
  • 29. 29 Blue-Green through Advance Load Balancer with control over user experience • Split traffic based on any info in HTTP header ◦ Browser, Device, OS ◦ Country, IP Network ◦ User Identification • Move with Confidence ◦ Compare Before/After Metrics • 1-click Roll-out or Roll-backA10 Lightning ADC Cluster Harmony Controller Harmony Portal Version 1 Version 2
  • 30. Offline Payment for Online Service – Blue-Green Roll-out At A Few Clicks
  • 31. 31 Minimizing Cost of Operations vs Kubernetes NodeKubernetes Node Sidecar Proxy Deployment Hub-Spoke Proxy Deployment Resource intensive Expensive TCO Low overhead Lower TCO
  • 32. 32 Takeaways: Simplified and Improved Security & Analytics • Simple Architecture • Clear ‘Dev’ and ‘Ops’ separation • ‘Config as code’ for automation • Application Traffic Analytics for efficiency
  • 33. 33 Thank You @akshaymathu amathur@a10networks.com Skype: mathurakshay Sample Config Files @ https://gist.github.com/c-success Steps to try @ http://docs.hc.a10networks.com/IngressController/2.0/a10-ladc-ingress-controller.html

Editor's Notes

  1. Let’s take a look at some of the struggles and business challenges IT experts and CISO’s are dealing with on a daily basis: The average enterprise is running applications in at least 5 clouds. That represents quite a complex application networking and security environment. According to a recent survey by 451 Research, 71% of enterprises are either using or evaluating container orchestration options like Kubernetes and Docker. On the other hand and according to a study by Ponemon, 65% of all security issues are due to human error and inadequate in-house security expertise. The Ponemon Institute published a study recently whereas 79% of enterprises lack a comprehensive DDoS attack and mitigation strategy.