Archiver Search Blogs

Using F5 BIG-IP to Eliminate Tiers When Scaling Apps in Containers

by: Lori MacVittie

Or is that ‘tears’ of frustration? ¯\_(ツ)_/¯ Perhaps it’s both. There is a relationship between network and application architectures. Usually we like to talk about how changes and shifts in application architectures impact the...

Open Source Spotlight: F5 Enables A/B Testing and Blue/Green Deployments with Red Hat OpenShift

by: Lori MacVittie

Today’s fast-paced, digitally-enabled data centers need to be able to direct traffic, not just distribute it. Red Hat OpenShift is in use by 21% of respondents according to the State of Application Delivery 2018. A/B Testing and Blue/Gre...

Security Rule Zero: A Warning about X-Forwarded-For

by: Lori MacVittie

Proxies operate on the premise that they exist to forward requests from one system to another. They generally add some value like load balancing (scale), data leak prevention (security), or compression (performance).

Speed and Scale: F5 BIG-IP as Ingress control for Kubernetes

by: Lori MacVittie

There’s as much confusion as there is chaos in container land. Every day seems to bring some new capability or component to the world of container orchestration environments. That’s necessary, because it’s still maturing as use of containers...

Scary Candy Week: KRACK and ROCA

by: David Holmes

What You Need to Know and What You Need to Do – It’s not a coincidence that Halloween falls in October. We humans have a heightened fear perception this time of year; it’s some kind of vestigial response to the shortening of days.

Open Source Spotlight: Auto Scaling Mesos

by: Lori MacVittie

Thanks to cloud, auto scaling applications is now nearly synonymous with scalability. And until recently, auto scaling apps with Mesos was a mostly manual endeavor.

Programmable Proxies are the Duct Tape of the Internet

by: Lori MacVittie

Programmable proxies protect ports from predators – like those targeting SMB today.   When the Internet was in its infancy, my oldest three children were teenagers. Even then – with a far smaller Internet - unfettered access was not...

Realizing FIPS Validation in Virtualized, SDN, and Cloud Data Centers

by: Henry Tam

Securing your data and infrastructure while transitioning to cloud (and software-defined everything) is complicated, but throw in tighter, stricter regulatory compliance and then you really have complexity and risk.

OpenStack向けのF5プライベートクラウドソリューションパッケージ

by: Guido Vosmeer

今日の経済はソフトウェアで定義・制御されるようになっており、この中で企業は競合に打ち勝つため、より迅速に動くことが求められるようになっています。これは新しいアプリケーションを展開する場合でも同様です。高い競争力を獲得するには、スピードと俊敏性が欠かせません。IT部門はビジネスのこのような要求に応えるため、DevOpsに対して積極的に取り組む必要があります。そしてこの目的を達成する上で重要なツールとなるのが、プライベートクラウドです。多くの企業は独自のアーキテクチャに縛られることを望んでおら...

F5 Private Cloud Solution Package for OpenStack

by: Henry Tam

This week, F5 introduced the first and only turnkey solution package that includes advanced application and security services that are engineered, tested, and certified to run with the Red Hat OpenStack Platform.