0 Cloud-Computing - INTRODUCTION AND vIRTUALIZATION-m
0 Cloud-Computing - INTRODUCTION AND vIRTUALIZATION-m
It denotes a model on which a computing infrastructure is viewed as a
“cloud,” from which businesses and individuals access applications
from anywhere in the world on demand.
The main principle behind this model is offering computing, storage,
and software “as a service.”
“It is a general term for anything that involves delivering hosted services
over the internet”
Cloud computing & technology
Evolution of Cloud Computing
1960’S: John McCarthy opined that computation may someday be organized
as a public utility.
1966: Douglas Parkhill wrote a book The challenge of computer utility. He
explored characteristics of modern day cloud computing.
1990’s: Telephony by telecommunications companies enabled the use of
virtual private network services with comparable quality of services at a lower
cost. The cloud symbol was used to show the demarcation point between
responsibilities of provided users.
2006: The Amazon web service was introduced on a utility computing basis.
2008: Eucalyptus became the first open source platform for deploying private
clouds. OpenNebula became the first open source software for deploying
private and hybrid clouds .
Type of clouds
Public , Private , community and
hybrid
Private clouds
The aim of a Private Cloud is to provide local cloud users and
administrators with a flexible and agile private infrastructure to run
virtualized service workloads within the administrative domain.
A private cloud architecture leverages the power of virtualization to let you
flexibly deploy applications across a pool of resources.
By replacing fixed I/O cards with virtual I/O resources, IT managers can
significantly enhance data center agility. Connectivity can be provisioned in
real-time. And because connectivity is consolidated, the infrastructure
becomes dramatically simpler: Hundreds of cables are replaced by dozens,
most I/O adapter cards are eliminated,and overall connectivity costs drop by
up to 50%.
ENTERPRISE
PRIVATE
Traditional three-tier data center architecture.
Efficient virtualized data center architecture with virtual I/O.
Hybrid cloud
Hybrid Cloud: Hybrid describes mufti-connected private
clouds, or a combination of private and public.
In this scenario, a company enabled their private cloud
environment to burst on demand into a public cloud service
Security
Security is often cited as the greatest perceived barrier to public
cloud computing, although public cloud vendors and their
technology partners are addressing this successfully with offerings
like Cloud VPN
Whereas enterprises may be familiar with managing their own data
security, cloud computing solutions may require joint management,
and the following aspects should be considered:
Ask the cloud provider for a list of people with privileged access to your data
Query if there have there been any security breaches with the cloud provider in the past, and
if so, what the nature of these were
Request security auditing be carried out on data access and request a copy of these reports
Consider the use of data encryption, query if it is available and who would have the ability to
decrypt it
Confirm if there is any data which cannot be maintained by a 3rd party provider for security
and compliance reasons even if it is encrypted
Discuss operating procedures should a security breach occur
SLA/OLA-Cloud Provider to agree
The outsourcing of data, platforms or applications, either in
part or full, should always contain agreed and documented
Service Level Agreements (SLAs) as well as Operational
Level Agreements (OLAs)
SLAs for planned and unplanned downtime
Cloud provider to notify planned downtime, and mechanisms to accept or defer
Contractual penalties for any unplanned downtime suffered outside of the agreed SLA
Events which the cloud provider has no control over. For example, natural disasters at
the cloud provider’s data centre
OLAs which record engagement details between
the cloud provider support teams including contact details during business and non
business hours
Definition of individual support tiers contained within OLAs, including individual
responsibilities for service, process and delivery time frames
Service Provider be able to offer SLAs based on application and user requirements.
These may include:
− Application response time
− Application availability
− Issue resolution
Enterprise cloud computing
IaaS Infrastructure-as–a- Service
SaaS Software-as–b- Service
PaaS Platform-as–a- Service
IaaS
IaaS : “Infrastructure as a Service” is the delivery of
computer infrastructure (typically a platform virtualization
environment) as a service.
These ‘virtual infrastructure stacks’ are an example of the
“everything–as-a-service” trend and shares many of the
common characteristics. Rather than purchasing servers,
software, data center space or network equipment, clients
instead purchase resources as a fully outsourced service
The service is typically billed on a utility computing basis
and amount of resources consumed
Examples include Amazon EC2, Amazon S3 and GoGrid.
IaaS
IaaS-Few vendors and their IaaS
offerings
Amazon Elastic Compute Cloud The cloud computing platform pioneer,
Web (EC2), Elastic MapReduce, Amazon offers auto scaling, cloud
Services Virtual Private Cloud, etc. monitoring, and load balancing features
as part of its portfolio.
Google Apps for Education
D:\Documents and Settings\Administrator\My Documents\My Pictures\Google-apps.JP
Coherence - Oracle Coherence Data Grid for EC2 and other cloud
platforms
Force.com - Salesforce.com's application development platform
(PaaS)
GigaSpaces - middleware for the cloud, "cloudware"
Heroku - Ruby on Rails in their Cloud
Qrimp - An AJAX based PaaS
RightScale - RightScale provides a platform and expertise that enable
companies to create scalable web applications running on Amazon’s
Web Services that are reliable, easy to manage, and cost less
PaaS
PaaS
Cloud Database- DBaaS
Database as a Service (DBaaS) is an architectural and operational
approach enabling IT providers to deliver database functionality as a
service to one or more consumers. Database as a Service
architectures support the following necessary capabilities:
– Consumer-based provisioning and management of database
instances using on-demand,self-service mechanisms;
– Automated monitoring of and compliance with provider-
defined service definitions, attributes and quality of service
levels;
– Fine-grained metering of database usage enabling show-back
reporting or charge-back functionality for each individual
consumer
Cloud Database- DBaaS
Providers: Amazon RDS , Apache Cassandra , xeround , Vfabric
etc
DBaaS
VIRTUALIZATION
What virtualization can do
Today’s x86 computer hardware was designed to run a
single operating system and a single application,
leaving most machines vastly underutilized.
Virtualization lets you run multiple virtual machines on a
single physical machine, with each virtual machine
sharing the resources of that one physical computer
across multiple environments.
Different virtual machines can run different operating
systems and multiple applications on the same physical
computer.
Types of Virtualization
Hardware : acts like a real computer with an operating system
FULL : Almost complete simulation of the actual hardware e.g. Virtual Box, V-PC,
ESX, V-WORKSTATION , Hyper-V etc
PARA : presents a software interface to virtual machines that is similar but not
identical to that of the underlying hardware e.g XEN
Virtual Machine Monitor aka Hypervisor
Hypervisor as a microkernel, that is responsible for allocating RAM,
acting as an intermediary for IO, routing hardware interrupts, and
scheduling a fair share of CPU time to each virtual machine.
Both Intel/AMD have added special VT/SVM CPU extensions that
allow a special "privileged mode" of operation where a hypervisor can
run multiple Operating Systems in ring0 at the same time.
VMM Platforms
VMWARE,Hyper-V, XCP - bare metal
Xen,l-guest (not matured yet)-
Paravirtualization-
Guest Os with a special kernel interacts with the hypervisor
KVM - Hardware assisted Virtualization[ a way of
improving the efficiency of hardware virtualization. It involves employing specially
designed CPUs and hardware components that help improve the performance of a
guest environment] Manager and Scheduling by existing kernel-
Needs Intel VT and AMD's AMD-V
Virtual Appliances(VA) and Open Virtualization
Format (OVF)
VA: An application combined with the environment needed
to run it (operating system, libraries, compilers, databases,
application containers, and so forth)
OVF : In order to facilitate packing and distribution of
software to be run on Vms several vendors, including
VMware, IBM, Citrix, Cisco, Microsoft, Dell, and HP, have
devised the Open Virtualization Format.
Virtualization with ESX/ESXi and vSphere client
Enterprise Virtualization
ESXi Convergence and ESXi Value Proposition
Hardware Monitoring and System Management with ESXi
Security and Deployment Options
Command Line Interfaces
Diagnostics and troubleshooting
Answering common questions
Resources and call to action
42
What is virtualization:
Today’s x86 computer hardware was designed to run a single
operating system and a single application, leaving most
machines vastly underutilized. Virtualization lets you run
multiple virtual machines on a single physical machine, with
each virtual machine sharing the resources of that one physical
computer across multiple environments.
Different virtual machines can run different operating systems
and multiple applications on the same physical computer.
43
Virtualization for Enterprise
44
Before and after Virtualization
45
Virtualization
With
VMWARE
46
Relationships Between the Component Layers of VMware
vSphere
47
VMware vSphere , VMware ESXi or ESX
• Customers can choose to install vSphere 4.1 using either the VMware ESXi or ESX
VMware vCenter
Server
VMware ESXi: 3rd Generation Hypervisor Architecture
• Code base disk footprint: ~ 2GB • Code base disk footprint: <100 MB
• VMware agents run in Console OS • VMware agents ported to run directly on VMkernel
• Nearly all other management functionality provided by • Authorized 3rd party modules can also run in VMkernel to
agents running in the Console OS provide hw monitoring and drivers
• Users must log into Console OS in order to run • Other capabilities necessary for integration into an
commands for configuration and diagnostics enterprise datacenter are provided natively
• No other arbitrary code is allowed on the system
New Feature: Boot from SAN
Boot from SAN fully supported in ESXi 4.1
51
Active Directory Integration
52
Configuration of Active Directory in vSphere Client
54
New Feature: Total Lockdown
vSphere
vSphere
vCLI
vCLI Other
Otherutility
utility PowerCLI
PowerCLI Other
Other
scripts
scripts languages
languages
vSphere
vSphere
vSphere
vSphereSDK
SDK Client
Client
vSphere
vSphereWeb
WebService
ServiceAPI
API
56
New Feature: Additional vCLI Configuration
Commands
Storage
• esxcli swiscsi session: Manage iSCSI sessions
• esxcli swiscsi vmknic: List VMkernel NICs available for binding to particular iSCSI
adapter
• esxcli swiscsi vmnic: List available uplink adapters for use with a specified iSCSI
adapter
• esxcli vaai device: Display information about devices claimed by the VMware VAAI
(vStorage APIs for Array Integration) Filter Plugin.
• esxcli corestorage device: List devices or plugins. Used in conjunction with hardware
acceleration.
57
Summary of ESXi Diagnostics and Troubleshooting
vSphere
APIs
• Also includes
• vmkfstools
• vmware-cmd
• resxtop
59
New Feature: Additional vCLI Troubleshooting
Commands
Network
• esxcli network: List active connections or list active ARP table entries.
Storage
• NFS statistics available in resxtop
VM
• esxcli vms vm kill: Forcibly stop VMs that do not respond to normal stop operations,
by using kill commands.
• # esxcli vms vm kill --type <kill_type> --world-id <ID>
• NOTE: designed to kill VMs in a reliable way (not dependent upon well-behaving
system)
• Eliminates one of the most common reasons for wanting to use TSM.
60
DCUI-based Troubleshooting
61
New Feature: Full Support of Tech Support Mode
• Toggle on DCUI
• Disable/Enable
• Both Local and Remote
• Optional timeout
automatically disables TSM
(local and remote)
• Running sessions are not
terminated.
• New sessions are rejected
• All commands issued in Tech
Support Mode are sent to
syslog
63
Is ESXi at feature parity with ESX? Yes!!
Overview of the vSphere Installation and Setup Process
System Requirements:
[http://www.vmware.com/resources/compatibility]
• AMD Opteron series or Intel XEON Series
• ESXi 5.0 will install and run only on servers with 64-bit x86 CPUs.
• ESXi 5.0 requires a host machine with at least two cores.
• ESXi 5.0 supports only LAHF and SAHF CPU instructions
• ESXi supports a broad range of x64 multicore processors
• ESXi requires a minimum of 2GB of physical RAM
• Intel VT-x or AMD RVI) must be enabled on x64 CPUs
• One or more Gigabit or 10Gb Ethernet controllers
• SATA/SCSI Disk controllers
Installation Steps:
• Set the BIOS to boot from the CD-ROM device or the USB flash drive
• On the Select a Disk page, select the drive on which to install ESXi and press Enter.
• Select the keyboard type for the host.
• Enter the root password for the host
• You can leave the password blank, but to secure the system from the first boot, enter
a password. You can
• change the password after installation in the direct console
• Press F11 to start the installation
• When the installation is complete, remove the installation CD, DVD, or USB flash drive
• Press Enter to reboot the host.
• Set the first boot device to be the drive on which you installed ESXi
• Install the vSphere Client to manage your ESXi host. License your host
Other modes of installation- Just for information
On the Select a Disk screen, select the iSCSI target you specified in the iBFT BIOS
target parameter setting.
If the target does not appear in this menu, make sure that the TCP/IP and initiator
iSCSI IQN settings are correct. Check the network Access Control List (ACL) and
confirm that the adapter has adequate permissions to access the target.
Installation:
• If you downloaded the vSphere Client , Double-click the VMware-viclient-build
number.exe file.
• Follow the prompts in the wizard to complete the installation.
• You can use the vSphere Client to connect to an ESXi host or to connect to a vCenter
Server system.
Prerequisites
• Verify that you are a member of the Administrators group on the system.
• Verify that the system has an Internet connection.
• . The vSphere Web Client requires a 64-bit operating system for installation.
Procedure
• In the software installer directory, double-click the autorun.exe file to start the installer.
• Select VMware vSphere® Web Client (Server) and click Install.
• Follow the wizard prompts to complete the installation.
• When the vSphere Web Client installation is finished, a browser opens.
• Register one or more vCenter Servers on the vSphere Web Client Administration Application page
in the browser..
• If the browser fails to open or to display the Administration Application page correctly, open the
application from the shortcut:From the Windows Start menu, select Programs > VMware >
VMware vSphere Web Client > vSphere Administration Application.
VSphere client
Select a Datastore
• When you add a virtual machine to the vCenter Server inventory, you must select the
datastore on which to create the virtual machine's disks.
• Procedure : Select the datastore location where you want to store the virtual
machine files.
Customize the Guest Operating System
• Customizing guest operating systems can help prevent conflicts that can result if
virtual machines with identical settings are deployed, such as conflicts because of
duplicate computer names.
• Procedure : Select a customization specification from the Guest OS Customization
drop-down menu and click Next.
• Customize Virtual Machine Hardware in the vSphere Web Client
• Procedure : To add a new virtual hardware device, select the device from the Add a
device drop-down menu and click Add device.
• Click the triangle next to any virtual device to view and configure the device settings.
vSphere Virtual Machine Administration
• Select the virtual machine to clone. In the Name text box, type a name for the virtual machine.
• Select or search for the datacenter or folder in which to deploy the virtual machine.
vSphere Virtual Machine Administration
• You can deploy a virtual machine from a template to create a virtual machine
1. Select any inventory object that is a valid parent object of a virtual machine, such
as a datacenter, folder, cluster, resource pool, or host and click the Create Virtual
Machine icon ( ).
2. Select Deploy from Template and click Next
• Select a Template- Procedure
1. Browse or search to locate a template.
2. Select the template.
3. (Optional) Select Customize the operating system to customize the guest
operating system of the virtual machine.
4. (Optional) Select Customize this virtual machine's hardware to configure the
virtual machine's hardware before deployment.
5. (Optional) Select Power On Virtual Machine after creation to power on the virtual
machine after creation is complete.
6. Click Next.