re-imagining the datacenterebiz.pmgasia.com/web/intel_cloudsummit/pdf/partner/day1/software...40%...

24
RE-IMAGINING THE DATACENTER Lynn Comp Director of Datacenter Solutions and Technologies

Upload: nguyencong

Post on 29-Jun-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

RE-IMAGINING THE DATACENTER

Lynn Comp Director of Datacenter Solutions and Technologies

IT: Period of Transformation

Focused on

Productivity through automation

Focused on

Rapid Service Delivery through cloud & devices

Focused on

Cost Reduction through connectivity

Computer-Centric Network-Centric Human-Centric

Which has Seismic Effects on the CIO

CIO on the hook…

• 5x9’s Reliability & Availability

• New: Public Cloud Economics

• New: Extreme Flexibility and Agility

Business Expectations

• Consumer-like expectations

• Tech-savvy

• “outside” alternatives

Datacenter Operations Under Stress

Server

Average utilization <50% despite

virtualization4

Network

2-3 weeks to provision new services1

Storage

40% data growth CAGR, 90% unstructured3

1: Source: Intel IT internal estimate

2: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012–2017

3: IDC’s Digital Universe Study, sponsored by EMC, December 2012

4: IDC Server Virtualization and The Cloud 2012

Legacy Datacenters - Insufficient for the Next Wave

RIGID architecture & infrastructure

LABOR-INTENSIVE provisioning and

maintenance

SLOW to stand up new services

Software Defined Infrastructure

DYNAMIC. AUTOMATED. FEDERATED

Datacenter Today

Time to Provision New Service:

8+ Weeks1

Time to Provision New Service:

Days/Minutes1

1: Source: Intel IT internal estimate

Re-architect the Datacenter

RIGID. LABOR-INTENSIVE. SLOW

SERVICE

Re-Architecting for Software Defined Infrastructure

Composable Resources

Network Storage Server

Dynamic, automated Infrastructure

Networking: Dynamic, standards based

Standards based, SW defined Composable Resources

Storage: Storage as a service

Server Dynamic resource allocation

Memory Compute I/O

App App App Pooled

Compute

Pooled

Memory

Pooled

I/O

App

Manual to Automated

Static, Purpose built to Dynamic, Composable

Warm

Hot

Cold

server server

server

server

server

HPC

OLTP

Office

Prod.

Firewall Message Router

PE Router

DPI

Firewall Message Router

Virtual fabric

Re-architect the Network Software Defined Network (SDN)

Standardize. Virtualize. Automate.

MANUAL

FIXED

HARDWARE

DEFINED

AUTOMATED

FLEXIBLE

SOFTWARE

DEFINED

Accelerators

Storage SoCs

Next Gen NVM

Storage Software

Cache

Acceleration Software

Other brands and names are the property of their respective owners.

Enterprise

Edition for

Lustre

Intelligence for

Efficiency and Resiliency

Tiered for

Capacity and Availability

Re-architect Storage Software Defined Storage

`

Today

Application-driven allocation of

resources for greater efficiency

Applications constrained to

resources “in the box”

Software Defined Infrastructure: Application driven resources

Memory Compute I/O

App App App

Tomorrow:

Composable Resources

Pooled

Compute

Pooled

Memory

Pooled

I/O

App

Diversity of Datacenter Workloads

Break down silos

Automate Services and Infrastructure

Simplify deployment and maintenance

Breaking down silos Intel Covering the Full Solution Space

Greater Efficiency through App Optimization & Arch Consistency

Efficient Performance

Dense Efficient (Integer)

Dense Parallelism (Vector)

Expandable Performance

Enterprise Portfolio Refresh in next 6 months

Efficient Performance

Dense Efficient (Integer)

Dense Parallelism (Vector)

Today 2013 2H

Avoton 5-20 Watts, 22nm

Intel® Atom S1200 2 cores, 6 Watts, 32nm

Intel® Xeon E3 v3 processor family

2-4 cores, 13-45 Watts, 22nm

Ivy Bridge-EP 4-12 cores, 60-130 Watts, 22nm

Intel® Xeon E5 processor family

2-6 cores, 60-130 Watts, 32nm

Intel® Xeon Phi Coprocessors 57-61 cores, 225-300 Watts, 22nm

2014 1H

Ivy Bridge-EX 95-155 Watts, 22nm

Expandable Performance

Intel® Xeon E7 processor family

6-10 cores, 95-130 Watts, 32nm

Automate Services and Infrastructure

Independent Telemetry, Metrics & Sensors

Power

Delivery Cooling &

Airflow

Utilization

Physically-oriented security:

Air gaps for security zones,

1:1 workload to system relationships, limited threats Automated compliance to SLA

Automated audit

Automated Geo-fencing

Automated workload placement

Automated power/cooling

Automate Services and Infrastructure Power Management

Intel® Xeon® processor-based

servers

with

Intel Node Manager firmware

Power management

consoles

with

Intel Data Center Manager software

40% More rack density

15-17% Reduction in

datacenter power

Visibility Control Compliance

IT manager

VM VM

IT manager

Policy: sensitive FISMA VM

requires trusted host, requires

US host

Automate Services and Infrastructure Trust and compliance

HW based platform integrity Store/report location

Trust status and asset descriptor control virtual workloads

Trust status and asset descriptor assert policy

Verify controls

The End Game

Agility Automation Efficiency

From silos to standards based software on high-volume servers

Ongoing security & operational telemetry assists automation

Software Compatibility

Global Ecosystem

Technology Portfolio

Architecture Consistency

Workload Optimized

Silicon

Most Energy Efficient

Transistors

Intel’s Unmatched Assets

Client to Cloud Security Demo

Trust Control

Configuration

and Event Data

to EPO

Policy to

Client

Trust Data

Placed in EPO

Trust Data

from vSphere Policy

Enforcement

Web

Apps Web

Apps

Server-Side Enforcement

Client-Side Enforcement

Intel TXT Integrity

McAfee Deep Defender Integrity

McAfee ePO Policy

Management

Non-Intel TXT

Migration to Trusted

Server is OK

Migration to Untrusted Server is Restricted

ePO Serves as Policy Enforcer

Trapezoid extracts TXT

values and uses

them as trust control triggers

Trusted Client is allowed access only to apps on Trusted Servers

SEIM Logs and Shows

events

Enforce policies: 1. Block access to

trusted host workloads from low integrity clients

2. Block access from High integrity clients to workloads on untrusted host

• Uses McAfee ePO to enforce security policies across data centers & client devices

• Demonstrates use of Intel® TXT for enhanced server integrity1

• Highlights client policy enforcement & integrity using McAfee Deep Defender

• Video Demo: http://www.intel.com/content/www/us/en/enterprise-security/enterprise-security-txt-client-to-cloud-

video.html

1 Integrating McAfee ePolicy Orchestrator (ePO) with Intel TXT requires custom integration work

Legal Disclaimers All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.

Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. Go to: http://www.intel.com/products/processor_number

Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request.

Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM). Functionality, performance or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit http://www.intel.com/go/virtualization

No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security

Intel, Intel Xeon, Intel Atom, Intel Xeon Phi, Intel Itanium, the Intel Itanium logo, the Intel Xeon Phi logo, the Intel Xeon logo and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

Other names and brands may be claimed as the property of others.

Copyright © 2013, Intel Corporation. All rights reserved.

Apache Hadoop Performance Test Configuration 4 hours to 7 minutes

Cluster Configuration 1 Head Node (name node, job tracker)

10 Workers (data nodes, task trackers)

10-Gigabit Switch: Cisco Nexus 5020

Software Configuration Intel Distribution for Apache Hadoop 2.1.1

Apache Hadoop 1.0.3

RHEL 6.3

Oracle Java 1.7.0_05

Head Node Hardware 1 x Dell r710 1U servers

Intel: 2x3.47GHz Intel® Xeon®

processor X5690

Memory: 48G RAM

Storage: 10K SAS HDD

Intel® Ethernet 10 Gigabit SFP+

Intel® Ethernet 1 Gigabit

Worker Node Hardware 10 x Dell r720 2U servers

Intel: 2 x 2.90Ghz Intel® Xeon® processor E5-2690

Memory: 128G RAM

Storage: 520 Series SSDs

Intel® Ethernet 10 Gigabit SFP+

Intel® Ethernet 1 Gigabit

Results have been estimated based on internal Intel analysis and are provided for

informational purposes only. Any difference in system hardware or software design or

configuration may affect actual performance. Software and workloads used in

performance tests may have been optimized for performance only on Intel

microprocessors. Performance tests, such as SYSmark and MobileMark, are

measured using specific computer systems, components, software, operations and

functions. Any change to any of those factors may cause the results to vary. You

should consult other information and performance tests to assist you in fully

evaluating your contemplated purchases, including the performance of that product

when combined with other products. www.intel.com/performance

Software Defined Infrastructure

Datacenter Today

Idea for service

IT scopes Needs

Balance user demands

Manually configure devices

Service running

Set up compute, storage &

network services

Time to Provision New Service:

8+ Weeks1

1: Source: Intel IT internal estimate

Strategy: Re-architect the Datacenter

Service running

Time to Provision New Service:

Days/Minutes1

Services Orchestrated SW components assembled

Infrastructure resources composed

Public Private

Internet of things

SERVICE Automated

Automated