harbour it & vmware - vforum 2010 wrap
Post on 16-Apr-2017
809 Views
Preview:
TRANSCRIPT
vForum Wrap All the best bits from VMware’s vForum 2010
© 2009 VMware Inc. All rights reserved
Confidential
Harbour IT Breakfast BriefingAccelerating Your Journey to the Cloud
Wibowo Leksono
Vmware Solution System Engineer
6 Confidential
The Journey to IT as a Service
COST EFFICIENCY QUALITY OF
SERVICE
Evolve to IT as a Service
via Cloud Computing
Architecture
Achieve Unprecedented
Reliability
Get the Most Out of Your
Infrastructure
Stage 1 Stage 2 Stage 3
BUSINESS AGILITY
Improving PRODUCTIONof IT Services
Improving CONSUMPTIONof IT Services
IT as a ServiceBusiness ProductionIT Production
Preserving Freedom of Choice Through Open Standards
© 2009 VMware Inc. All rights reserved
Confidential
Production
8 Confidential
VMware vSphere
VMware vSphere
VMware vCenter Suite
App App App App
Existing Applications Future Applications
ApplicationServices
InfrastructureServices
vMotionStorage vMotion
HAvShield Zones
VMSafeDRS
Hot Add
ESX and ESXiDRS and DPM
VMFSThin Provisioning
Distributed SwitchNetwork I/O Control
Private Cloud Resource Pools Public Cloud
Availability Scalability
Storage Network
Security
Compute
Fault ToleranceData Recovery
App App App App
MemoryOvercommit
Storage I/OControl
9 Confidential9
Enhanced Scalability
vSphere 4 vSphere 4.1 RatioVMs per host 320 320 1xHosts per cluster 32 32 1xVMs per cluster 1280 3000 >2xHosts per VC 300 1000 >3xRegistered VMs per VC 4500 15000 >3xPowered-On VMs per VC 3000 10000 >3xConcurrent VI Clients 30 120 4xHosts per DC 100 500 5xVMs per DC 2500 5000 2x
10 Confidential
10
% o
f App
licat
ions
20,000
800 Mb/s
16 GB
2 vCPU
1. Source: VMware Capacity Planner assessments
ESX 3.5
100,000
9 Gb/s
64 GB
4 vCPU
ESX 4
> 300,000
30 Gb/s
255 GB
8 vCPU
< 10,000
380 Mb/s
< 4 GB
1 vCPU
ESX 3ESX 2
20% - 30% <10% - 20% <2% - 10%30% - 60% Overhead
Performance
11 Confidential
Virtualising Business Critical Apps
Source: Survey of VMware customers in North America (US, Canada), Europe (UK, France, Germany), and Asia (Australia/New Zealand, China, Japan, India); Sample size =1038+; Q1 2010 Questions: For each product, please indicate the total number of instances of that product / workload deployed in your organisation and the percentage of those instances that are virtualized (running in VMs). Your best estimate is fine for both of these.
Microsoft SQL
Microsoft Exchange
Microsoft SharePoint Oracle DB SAP
12 Confidential
virtual data center
Fault Tolerance
HA still available for lower tier apps
Identify VM’s you want for fault tolerance and start the service
A shadow VM is created and takes over if host failure
occurs
X
Service Level Agreement – HA & FT
13 Confidential
virtual data center
Storage Replication
virtual data center
Primary DR
Service Level Agreement – Site Recovery Manager
14 Confidential
Management
Infrastructure & Operations Management
Application Management
End-User Computing Management End User Computing
Cloud Applications
VMware Management Solutions
IT Business Management
Public/Private/Hybrid Cloud Virtualized Infrastructure
Availability & Performance
Capacity Compliance & Security
Configuration
Discovery & Mapping Application Performance
vAppPackaging
Business Continuity
Administration Deployment
Provisioning
Updating
Asset Management
Request Fulfillment
Chargeback
Service Desk
15 Confidential
Virtualization & Cloud Management: VMware Products
Infrastructure & Operations Management
Application Management
End-User Computing Management End User Computing
Cloud Applications
VMware Management Solutions
IT Business Management
Public/Private/Hybrid Cloud Virtualized Infrastructure
vCenter Server CapacityIQ
Site Recovery Manager
Configuration Manager
vCenter Orchestrator
Application Discovery Mgr AppSpeed Studio Hyperic
Chargeback
Service Manager
View Manager View Composer ThinApp
16 Confidential
1st and 2nd Generation Monitoring
Monitoring Solutions Insufficient for Performance Management
1st generation – good data collection, but alert storms
2nd generation – rules can’t adapt to change
Result:• Performance problems often occur
with no real warning
• Performance problems require time consuming manual effort to resolve
• Virtual infrastructure is blamed for application performance problems that originate elsewhere
3/4/08 16:45 Host 1 processingTimeServ The Processing Time Service Level on process… n/a n/a n/a
3/4/08 16:45 Host 1 Processor_Table 0 Processor 0 is at 87.0%. A CPU Bottleneck is….. n/a 0 Windows_System
3/4/08 16:44 Host 2 System_Table The number of hardware interrupts per second… n/a 0 Windows_System
3/4/08 16:30 Host 2 Processor_Table 1 Processor 1 is at 84.0%. A CPU Bottleneck is …. n/a 0 Windows_System
3/4/08 16:25 n/a responseTimeServ… The Response Time Service Level on Toadwor.. n/a n/a n/a
3/4/08 16:20 n/a processingTimeServ.. The Processing Time Service Level on Prospec.. n/a n/a n/a
3/4/08 16:08 Host 1 Ora_Sql_Hogs_Alert Oracle: SFPRD A CPU Hog has been detected n/a OraSF Oracle
3/4/08 16:08 Host 1 Ora_Sql_Hogs_Alert Oracle: SFPRD SQL with high
* New Approach – uses analytics to turn a sea of data into information
18 Confidential
Proactive Analytics
3rd Generation – Holistic, Real Time Analytics
Flexible INTEGRATION
to many data sources
EnterpriseSCALABILITY
Patented performanceANALYTICS
I can put all my monitoring tools to good use and get better performance analytics.
Powerful informationDASHBOARDS
19 Confidential
End User Computing
MODERNIZE THE DESKTOP
Secure and Optimize the Traditional Windows Environment
Desktop, Desktop App, User Data, Virtual Machine
UNIFY USERMANAGEMENT
Bridge Legacy and Cloud Architectures
Legacy, SaaS, and Device Apps, User Data, Users
DELIVER USER CENTRIC COMPUTING
Collaborative User Workspace
Users and Policies, Any App and Data
20 Confidential
End-User Perspective
Enterprise Apps
SaaS Apps
Windows Apps
21 Confidential
End-User Perspective
Enterprise Apps
SaaS Apps
Windows Apps
22 Confidential
End-User Computing = User Centricity
Enterprise Apps
SaaS Apps
Windows Apps
Secure Access to All Applications
Native from Any Device
23 Confidential
End-User Computing Emanates from the Cloud
Enterprise Apps
SaaS Apps
Windows Apps
Image & Persona Mgmt Storage Optimization
Application Virtualization Authentication Services
End-user Freedom. IT Control.
24 Confidential
Directory FederationAD
Policy Management
Access Security
Unify User Management
OS
Data
Apps
OS
Data
Apps
OS
Data
Apps
Public Cloud
OS
Data
Apps
AD
SaaS Apps
Data
VMware
ADOS
Desktop Apps
Data
Published Apps
Private Cloud
25 Confidential
Roadmap: Project Horizon
User Experience• Single sign on • Self Service• Cross Platform Support
Cloud Ready Identity• Legacy, SaaS, Published apps under unified management• Extend enterprise policy to the cloud• Secure identity management across hybrid cloud
ThinApp Factory• Automated packaging and updating of native applications
Industry First: Unified user management of legacy and cloud applications
Project Horizon: Policy-based Delivery of
Diverse Apps and Data
© 2009 VMware Inc. All rights reserved
Confidential
Consumption
27 Confidential
vCloud Director
Share Virtual Datacenter (VDC) resources with multiple tenants
Decide how VDC resources are allocated
28 Confidential
IT can define multiple consumption models for an Organization
Capacity-as-you-go • “Pay-Per-VM” model
• No upfront resource allocation
• Org VDC allocated resources only as users create vApps
• IT can set compute limits to cap usage
Reservation pools• Guaranteed container
• 100% of container guaranteed
• Organization given resource management capabilities (shares and reservations)
Allocation Pools• Resources allocated, but not guaranteed
• Similar to the “airline seat” model
• IT given resource management role and can over provision
29 Confidential
Users are given direct, on-demand access to hardware
Direct access through web-based user portals
Integrate into IT workflows and request processes
Programmatic access through vCloud API
30 Confidential
Self-Service Policies in VMware vCloud Director
Define deployment and storage lease defaults and VM
quotas
31 Confidential
Simplify deployment with central catalogs
Multiple Types of Object in Catalogs• Template catalogs (personalize
when used)
• vApp catalogs (don’t personalize)
• Media catalogs (ISOs, virtual floppies)
Multiple Catalog Scopes• Catalogs are associated with one or
more organizations
• Users can be given permission to create organization-wide catalogs
• Organizations can be given permission to create datacenter-wide catalogs
Linux Templates
Windows Templates
Weblogic vApps
Basic Media Catalog
Oracle vApps
Premium Media Catalog
32 Confidential
******
user
Connecting…
33 Confidential
34 Confidential
Monte Carlo vApp
35 Confidential
36 Confidential
VM created in under 3 minutes; user experience like iTunes!
37 Confidential
Introducing vCloud Request Manager!
• Add sophisticated workflow driven approvals processes to provisioning requests.
1. Provisioning with Approvals
• Automatically track software license usage in the cloud.
2. Software License Tracking
• Simplify the creation of “Organizations” and enforce standardization through “Blueprints”.
3. Policy Based Cloud Partitioning
38 Confidential
Workflow Automation with vCloud Request Manager
39 Confidential
Cloud Consumer (eg: QA Engineer): Requests new vApp based on template.
Approver (eg: Line Manager): Receives email notification and approves via email.
Key Value: Controlled approvals and governance
Capability: vApp Provisioning with Approvals
Initiate Request Approval Workflow Email Notification
40 Confidential
Add Application
Select vApp Templates
from Catalog.
41 Confidential
Add Application: Workflow
Dynamic Approval
Addressee Lookup
Software License
Allocation
VMware vCloud Director
Provisioning
Email Notification
42 Confidential
Asset Manager: Associates software licenses with vApp templates.
Key Value:Automatically track software license usage in the Cloud.
Capability: Software License Tracking
Licenses Allocated on vApp Creation Licenses Freed on vApp Deletion
43 Confidential
Capability: Policy Based Cloud Partitioning via “Blueprints”
Cloud Consumer (eg: Project Manager, QA Manager): Requests new “Cloud”.
Approver (eg: Line-Manager): Receives email notification and approves via email.
Initiate Request Approval Workflow Email Notification
Key Value:Simplify creation and management of Organizations.
44 Confidential
COST EFFICIENCY QUALITY OF
SERVICE
Evolve to IT as a Service
via Cloud Computing
Architecture
Achieve Unprecedented
Reliability
Get the Most Out of Your
Infrastructure
Stage 1 Stage 2 Stage 3
BUSINESS AGILITY
Improving PRODUCTIONof IT Services
Improving CONSUMPTIONof IT Services
IT as a ServiceBusiness ProductionIT Production
Preserving Freedom of Choice Through Open Standards
Summary
45 Confidential
Harbour IT
top related