virtualization strategies: virtualization strategies:

Post on 01-Jun-2015

863 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Virtualization Strategies:Virtualization Strategies:Virtual Technology Real ResultsVirtual Technology Real Results

Bryan Von AxelsonBryan Von AxelsonIT Pro EvangelistIT Pro Evangelist

MicrosoftMicrosoft

What this session covers

�� IT ChallengesIT Challenges�� Virtualization Market TrendsVirtualization Market Trends�� Scenarios for Server VirtualizationScenarios for Server Virtualization�� Scenarios for Application VirtualizationScenarios for Application Virtualization�� Planning for Hardware VirtualizationPlanning for Hardware Virtualization

IT ChallengesIT Challenges

IT Challenges

�� Simplify ManagementSimplify Management–– Information and organizational growthInformation and organizational growth–– Patching and software updatesPatching and software updates–– Increase availabilityIncrease availability–– System deploymentSystem deployment–– Regulatory complianceRegulatory compliance

�� Reduce CostsReduce Costs–– Server sprawl Server sprawl –– System and application maintenanceSystem and application maintenance–– Infrastructure costsInfrastructure costs

�� Increase SecurityIncrease Security–– AV & Spam AV & Spam –– Threat protectionThreat protection

Virtualization Benefits

�� Reduces administrative effortsReduces administrative efforts–– Lowers operational costsLowers operational costs

•• Fewer servers to manageFewer servers to manage

–– Speeds deploymentSpeeds deployment•• Now 1Now 1--6 weeks (requisition, setup, software, test)6 weeks (requisition, setup, software, test)•• Virtual reduces this to hoursVirtual reduces this to hours

�� Reduced hardware and infrastructure costsReduced hardware and infrastructure costs�� Improves resource utilizationImproves resource utilization�� Increases availabilityIncreases availability�� Tools to enhance securityTools to enhance security

Virtualization TrendsVirtualization Trends

Virtual Server Growth

�� Tremendous growth Tremendous growth in virtual serversin virtual servers

�� 1M servers by 20091M servers by 2009�� WinHecWinHec

–– Bob MugliaBob Muglia–– Virtualization will be Virtualization will be

the normthe norm–– All workloads will be All workloads will be

virtualized in 2virtualized in 2--4 years4 years

IDC Server Virtualization September 2005

Virtualization Market Growth

�� 5 fold growth in 5 fold growth in virtualization virtualization market placemarket place

�� More expensive More expensive serversservers

�� Virtualization Virtualization managementmanagement

IDC Server Virtualization September 2005

Server Virtualization Scenarios

�� Server consolidationServer consolidation�� Multiple OS & application supportMultiple OS & application support�� Lab and deployment testingLab and deployment testing�� TrainingTraining�� Help deskHelp desk�� Disaster recoveryDisaster recovery�� Application isolationApplication isolation�� Intrusion detectionIntrusion detection�� SecuritySecurity

Server Sprawl

�� New application = new serverNew application = new server

���������

���������

���������

���� �

���� �

����������

����������

����������

����������

����������

����������

����������

����������

Problems Server Sprawl

�� HardwareHardware–– Increased hardware acquisition costsIncreased hardware acquisition costs–– Increased infrastructure requirementsIncreased infrastructure requirements–– Increased hardware maintenance costsIncreased hardware maintenance costs–– Increased hardware replacement costsIncreased hardware replacement costs

Problems of Server Sprawl

�� AdministrationAdministration–– Patch managementPatch management–– Backup and recovery Backup and recovery –– Server management and troubleshootingServer management and troubleshooting

Servers Deployed

18%

6%

6%

9%

13%

26%

13%

8%

1%

0% 10% 20% 30%

Don't know

5,000 or more

1,000 - 4,999

500 - 999

250 - 499

100 - 249

26 - 99

10 - 25

Less than 10

IDG Server Consolidation Research July 2006

Multiple Vendor Support

9%

2%

2%

1%

1%

2%

4%

13%

14%

29%

17%

6%

0% 10% 20% 30%

Don't know

Over 25 vendors

10 - 25

9

8

7

6

5

4

3

2

1 vendor

IDG Server Consolidation Research July 2006

Biggest Challenges

2%

6%

25%

27%

42%

44%

60%

63%

0% 10% 20% 30% 40% 50% 60% 70%

Don't know

Other

Downtime

Interoperability

Server sprawl

Maintenance costs

Resource utilization

Patch management

IDG Server Consolidation Research July 2006

Server Consolidation Strategy

Don’tknow2%

No28%Yes

70%

IDG Server Consolidation Research July 2006

Server Consolidation

�� Increase hardware Increase hardware utilizationutilization

�� Reduced costsReduced costs–– Fewer systemsFewer systems–– Less powerLess power–– Less coolingLess cooling–– Lower IT resourcesLower IT resources

�� Reduced InfrastructureReduced Infrastructure–– Fewer racksFewer racks–– Fewer switchesFewer switches

Multiple O/S & Applications

�� Linux InteroperabilityLinux Interoperability–– Shared hardwareShared hardware

�� Legacy OS SupportLegacy OS Support–– Windows NT 4.0Windows NT 4.0–– Limited support for Limited support for

modern hardwaremodern hardware

�� ISV ApplicationsISV Applications–– Restricted platform Restricted platform

supportsupport

OS Support

32%

24%21%

14%

3%6%

0%

10%

20%

30%

40%

5 or more 4 3 2 1 Don't know

IDG Server Consolidation Research July 2006

Types of OS Deployed

64%59%

1%

11%

28%32%

48%

72%

83%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

Windowsserver

Unix (AIX,Solaris,SCO)

Linux (RedHat,

Caldera,Debian,SUSE)

Windows2000

Proprietary(S/390,OS/400,

VMS)

WindowsNT

NetWare Other Don't know

IDG Server Consolidation Research July 2006

Training

�� Present and reset training imagePresent and reset training image–– Just reset the VMJust reset the VM–– No need to reimage the systemsNo need to reimage the systems–– Network isolationNetwork isolation

Training

�� Microsoft Virtual LabsMicrosoft Virtual Labswww.microsoft.com/technet/traincert/virtuallab/default.mspxwww.microsoft.com/technet/traincert/virtuallab/default.mspx

�� Set of preconfigured environmentsSet of preconfigured environments�� Microsoft tools and current productsMicrosoft tools and current products

–– Vista, Exchange 2007, SQL Server 2005, Windows Vista, Exchange 2007, SQL Server 2005, Windows Server 2007, Office 2007Server 2007, Office 2007

Help Desk

�� Increase ability to represent multiple product Increase ability to represent multiple product environmentsenvironments

�� Reduced infrastructureReduced infrastructure–– Physical systemsPhysical systems–– Space requirementsSpace requirements–– PowerPower–– Cabling Cabling

�� Enhanced test system accessibilityEnhanced test system accessibility�� Ability to rollback test system stateAbility to rollback test system state

Lab and Deployment Testing

�� Build a test virtual network Build a test virtual network infrastructureinfrastructure

�� Duplicate physical modelDuplicate physical model–– Same domain structure and Same domain structure and

system namessystem names–– Virtual network clientsVirtual network clients

�� Reduced physical system Reduced physical system requirementsrequirements–– No need for 1No need for 1--1 physical 1 physical

systemssystems

�� Virtual networkingVirtual networking–– Connects virtual systemsConnects virtual systems–– Isolated from production Isolated from production

networknetwork

Lab and Deployment Testing

�� Use the virtual network to testUse the virtual network to test–– Active Directory, networking, policy changesActive Directory, networking, policy changes–– Patch testingPatch testing–– Application deploymentApplication deployment

�� Roll out change to production after successful Roll out change to production after successful tests in the virtual environment tests in the virtual environment

Demo: Virtual ServerDemo: Virtual Server

Using Undo DisksUsing Undo Disks

Disaster Recovery

�� Fewer servers to manage and recover/restoreFewer servers to manage and recover/restore–– Reduces costsReduces costs

�� Server VMs are hardware independentServer VMs are hardware independent–– Can be restored to other platforms Can be restored to other platforms –– No need to match primary site and secondary site No need to match primary site and secondary site

hardwarehardware

�� VMs are encapsulatedVMs are encapsulated–– FasterFaster–– Can be replicated between sitesCan be replicated between sites–– No need for bareNo need for bare--metal installsmetal installs

Disaster Recovery

�� PhysicalPhysical--toto--VM recoveryVM recovery–– Restore physical backup to running VMRestore physical backup to running VM–– Lower costs Lower costs –– no need for 1no need for 1--toto--1 physical servers1 physical servers

�� VMVM--toto--VM recovery VM recovery –– Protects against operating system/application failureProtects against operating system/application failure–– Recover failed VM on another server Recover failed VM on another server

High Availability for Hosts

Primary Site Recovery Site

Clustering

Host to HostGuest to Guest

Cluster storage

iSCSI connection

Cluster storage

SAN or iSCSI connection

Application Isolation

�� SandboxingSandboxing�� Use browser in VMUse browser in VM�� Isolated from hostIsolated from host�� Discard changes Discard changes

when finished when finished

Application Isolation

�� VMware Browser ApplianceVMware Browser Appliance–– VMPlayerVMPlayer–– Runs any VM (VMware or Microsoft)Runs any VM (VMware or Microsoft)

www.vmware.com/download/player/www.vmware.com/download/player/

–– Browser ApplianceBrowser Appliance•• Ubuntu 5.1 & FirefoxUbuntu 5.1 & Firefoxwww.vmware.com/vmtn/appliances/directory/browserapp.htmlwww.vmware.com/vmtn/appliances/directory/browserapp.html

–– Other Virtual AppliancesOther Virtual Appliances•• 300 Prebuilt Virtual Appliances300 Prebuilt Virtual Applianceswww.vmware.com/vmtn/appliances/directory/www.vmware.com/vmtn/appliances/directory/

Intrusion Detection

�� HoneypottingHoneypotting–– Create a Create a ““production look alikeproduction look alike””–– Logging sensors to record attack activityLogging sensors to record attack activity–– Microsoft HoneymonkeyMicrosoft Honeymonkeyhttp://research.microsoft.com/HoneyMonkey/http://research.microsoft.com/HoneyMonkey/–– VM Honeypots are recongnizableVM Honeypots are recongnizable

Security

�� Forensic AnalysisForensic Analysis�� Duplicate a compromised systemDuplicate a compromised system

–– P2V makes an exact working copyP2V makes an exact working copy–– Offsite analysisOffsite analysis

�� Snapshots Snapshots –– PointPoint--inin--time copiestime copies

Application Virtualization ScenariosApplication Virtualization Scenarios

Running Incompatible Applications

�� Different versions of Microsoft OfficeDifferent versions of Microsoft Office�� Running beta softwareRunning beta software�� Running multiple Java virtual machinesRunning multiple Java virtual machines

No Touch Application Deployment

�� SoftGridSoftGrid–– SoftGrid client is deployedSoftGrid client is deployed–– Application is sequenced Application is sequenced

•• Stored on application serverStored on application server

–– User is added to AD SoftGrid groupUser is added to AD SoftGrid group–– Application is streamed from server to clientApplication is streamed from server to client

•• Partial app streaming results in fast code deliveryPartial app streaming results in fast code delivery

–– AltirisAltiris•• AppStreamAppStream

Application Reliability

�� SoftGridSoftGrid–– Application ResetApplication Reset

•• Overwrites malfunctioning applicationsOverwrites malfunctioning applications

–– User controlledUser controlled–– Application restreamedApplication restreamed

�� AltrisAltris–– Layer ResetLayer Reset–– User controlledUser controlled–– Restores original layerRestores original layer

Demo: Application VirtualizationDemo: Application Virtualization

Hardware Virtualization TechnologyHardware Virtualization Technology

Hardware Virtualization

�� Why?Why?–– PerformancePerformance–– No direct virtualization for older x86 & x64No direct virtualization for older x86 & x64–– Virtual Machine Additions Virtual Machine Additions

•• Change the guest OS allowing the VM kernel mode to run on Change the guest OS allowing the VM kernel mode to run on the processorthe processor

–– Hardware VirtualizationHardware Virtualization•• Enables VM code to run on processor in virtualized modeEnables VM code to run on processor in virtualized mode•• No significant difference for VM AdditionsNo significant difference for VM Additions•• Big difference for unsupported operating systemsBig difference for unsupported operating systems

Windows Server 2007 Hypervisor

�� Hardware assisted Hardware assisted virtualizationvirtualization–– Intel Virtualization Technology Intel Virtualization Technology

(VT)(VT)–– AMD Virtualization Technology AMD Virtualization Technology

(AMD(AMD--V)V)

�� Windows Server 2007 Windows Server 2007 HypervisorHypervisor–– 180 days after RTM180 days after RTM

�� Compatible with MS VM Compatible with MS VM ImagesImages

�� Compatible with XENCompatible with XEN--enabled enabled LinuxLinux

Virtualization Gottcha’s

�� You still need licensesYou still need licenses–– OS & any CALsOS & any CALs–– Windows Server 2003 Datacenter R2 is the exceptionWindows Server 2003 Datacenter R2 is the exception

�� PerformancePerformance–– Shared hardware resourcesShared hardware resources–– VMM overheadVMM overhead

�� Can result in more server sprawlCan result in more server sprawl

Server Consolidation Resources

�� Mixed Workload Consolidation GuideMixed Workload Consolidation Guide�� www.microsoft.com/downloads/details.aspx?FamilyId=0F70695Ewww.microsoft.com/downloads/details.aspx?FamilyId=0F70695E--

5D0B5D0B--47814781--89668966--84BE43216F9E&displaylang=en84BE43216F9E&displaylang=en

�� Consolidating SQL ServerConsolidating SQL Server�� www.microsoft.com/technet/prodtechnol/sql/2000/deploy/32bitconsowww.microsoft.com/technet/prodtechnol/sql/2000/deploy/32bitconso

lidation.mspxlidation.mspx

�� Consolidating Domain ControllersConsolidating Domain Controllers�� www.microsoft.com/technet/itsolutions/ucs/ds/dmcnmgsa.mspxwww.microsoft.com/technet/itsolutions/ucs/ds/dmcnmgsa.mspx

�� Consolidating File and Print ServersConsolidating File and Print Servers�� http://www.microsoft.com/technet/itsolutions/ucs/fp/cmfp/cmfpwnthttp://www.microsoft.com/technet/itsolutions/ucs/fp/cmfp/cmfpwnt4.4.

mspxmspx

�� Consolidating WebConsolidating Web--based applicationsbased applications�� www.microsoft.com/windowsserversystem/overview/benefits/consoliwww.microsoft.com/windowsserversystem/overview/benefits/consoli

dation/bestpractices.mspxdation/bestpractices.mspx

Additional Resources

�� Test Lab VirtualizationTest Lab Virtualization–– wwwvmblog.com/archive/2006/06/13/773.aspxwwwvmblog.com/archive/2006/06/13/773.aspx

�� Disaster RecoveryDisaster Recovery–– VMwareVMware

•• http://www.vmware.com/solutions/continuity/disasterrecoveryhttp://www.vmware.com/solutions/continuity/disasterrecovery.html.html

–– VMware Clustering VMsVMware Clustering VMs•• http://www.vmware.com/support/esx25/doc/admin/esx25admihttp://www.vmware.com/support/esx25/doc/admin/esx25admi

n_cluster_setup_esx.htmln_cluster_setup_esx.html–– Microsoft White Paper on VS2005 R2 ClusteringMicrosoft White Paper on VS2005 R2 Clustering

•• http://www.microsoft.com/downloads/details.aspx?FamilyID=http://www.microsoft.com/downloads/details.aspx?FamilyID=09cc042b09cc042b--154f154f--4eba4eba--a548a548--89282d6eb1b3&displaylang=en89282d6eb1b3&displaylang=en

Thank You!Thank You!

top related