English (4.66MB)

NEC SigmaSystemCenter 3.0 highlights
NEC Corporation
2nd IT Software Division
IT Network Global Solutions Division
Sept. 2011
NEC SigmaSystemCenter 3.0 highlights
Cloud Management
Multitenancy
Resource Pool
Role Management
Life Cycle Management
Service Portal
Logical Network/IP Address Pool
Expanding supported hypervisor
Supporting distributed switch
High-speed Scale-out
VM Optimized Creation
Machine Profile/Host Profile
Enhanced Datastore Management
VM Optimized Placement Rule
Page 2
© NEC Corporation 2011
Simple configuration of physical
computers and virtual hosts
Enhanced Performance Monitoring
Agentless Monitoring
Enhanced Console Access Function
DeploymentManager 6.0 and
ESMPRO/ServerManager Ver.5
Enhanced SIGMABLADE Integration
Cloud Management
Multitenancy
Resource Pool
Role Management
Life Cycle Management
Service Portal
Logical Network/IP Address Pool
Virtualization management is enhanced in SSC(*1)3.0, which
realize infrastructure management in cloud environment.
These feature also helps the customer who has not deployed
cloud system, realizing efficient implementation and operation.
*1 Abbreviation of NEC SigmaSystemCenter
Page 3
© NEC Corporation 2011
How clouds operate with SSC
Users
Tenant A
Resource
reservation
and VM
creation
App
App
App
OS
OS
OS
Maintenance and
troubleshooting by
users
The VM and
resources of
other tenants
cannot be
accessed
Service portal
Configu
ration
Tenant
administrator
Sub Resource Pool IP/VLAN pool
Users
Tenant B
Resource
reservation
and VM
creation
App
App
OS
OS
OS
Service portal
Configu
ration
Tenant
administrator
Image library
App
Sub Resource Pool IP/VLAN pool
Tenant creation/
Creation of user for tenant
administrator/
Allocation of sub resource pool
System
administrator
Resource
pool
Resource pool
creation/extraction
from the sub
resource pool
Servers
Page 4
© NEC Corporation 2011
Storage
devices
Maintenance and
troubleshooting by
users
Network
devices
Images
Image library
Cloud Management - Multitenancy
Improve resource utilization by sharing resources between multiple
tenants
The resources managed by SSC are shared among the tenants.
Because you do not need to assign specific servers, storage devices,
or switches to each tenant, the resources in the system can be used
efficiently. This is explained in further detail in the resource pool
section on the next slide.
Security must be a consideration while sharing resources. Users from
other tenants should not be able to view resource usage or control a
guest OS. SSC offers protection against this security issue. More
information is provided in the section on role management.
Page 5
© NEC Corporation 2011
Cloud Management
Resource Pool
Managing resources in a large-scale environment is simple
In a resource pool, management is simplified because resources are
managed as virtual resources such as virtual CPU and virtual memory
which compose virtual machine.
Resources can be managed at the tenant level
A portion of the resources are extract to form a sub resource pool that
is assigned to a tenant for use. The efficient use of resources is
possible through the sharing of one resource pool among multiple
tenants.
Visualize resource usage
Visualize the usage of a resource pool to view the usage of resource
pools and sub resource pools. This makes possible the prediction of
shortages and planned increases of resources.
Page 6
© NEC Corporation 2011
Cloud Management - Resource Pool
Conceptual diagram
App
App
App
OS
OS
OS
Extract sub
resource pools
Create
resource
pool
Tenant A
Sub resource pool A
Servers
Storage
devices
Physical
resources
Resource
pool
App
App
App
OS
OS
OS
Tenant B
Resource pool usage status
Sub resource pool B
Page 7
© NEC Corporation 2011
Cloud Management
Role Management
Your system is secure because users from other tenants cannot
access the guest OS or resources.
Manage tenant users through a tenant administrator
You can limit the resources to which each user has access by
specifying roles to each tenant user.
Page 8
© NEC Corporation 2011
Cloud Management
Life Cycle Management
Manage usage history
The strict management of resource expiration dates is important. It is
especially so for the tenant lending service, in which charges are based on the
beginning and end date of usage and how much the resource was used.
Therefore, managing the resource life cycle and understanding its usage
history is necessary. You can also keep a track on the history of a guest OS
powering on and shutting down.
Manage a history of configuration changes
You can manage a history of changes made to the guest OSs.
Make groups through smart grouping(*)
Service start date
Service end date
The number of days remaining until service start date
The number of days elapsed sine the service end date
(*)Smart groups can be specified through a command-line interface.
Page 9
© NEC Corporation 2011
Cloud Management
Service Portal
Making the SSC screen available to end users
There are instances in which a guest OS must be restarted because a
guest OS sometimes stalls. A service portal is offered in which users
can solve such problems themselves without going through a tenant
administrator.
Log in as a tenant user
Create a guest OS
Start or restart the
guest OS
Etc.
Tenant users
Portal
Page 10
© NEC Corporation 2011
Cloud Management
Logical Network/IP Address Pool
Defines logical networks composed of tenant VLAN IDs and guest
OS IP address pools.
You can centrally manage which VLAN ID and IP address are pooled
with which tenant.
Automatically specifies linked VLANs and IP addresses when a virtual
host or guest OS specified by the logical network starts operation.
The logical network settings can be made available for reference to
only certain tenants in order to ensure security between tenants.
Page 11
© NEC Corporation 2011
Expanding supported hypervisor
KVM is now supported in addition to VMware, XenServer, and Hyper-V
RHEL6.0 KVM is supported.
XenServer
Hyper-V
KVM
VMware
Page 12
© NEC Corporation 2011
Supporting distributed switch
Support VMware vNetwork Standard Switch / Distributed Switch
Creating port group (VLAN) from SSC is possible and port group is
assigned dynamically in guest OS creation.
vDS can make private VLAN which realize flexible network design by
Network isolation is important in security point of view for multi tenant
environment in cloud.
Page 13
© NEC Corporation 2011
High-speed Scale-out
Guest OS high-speed scale out by Differential Clone
Differential Clone is an option feature and must be purchased separately
VM01
Reference
Master
VM
Differential disk
Extended disk
Reference
Reference
System disk
VM02
Differential disk
Extended disk
User-specific data
sent to extended
disk space
VM03
Differential disk
Extended disk
Dramatically reduce VM creation time by Differential Clone.
The more guest OS you create, the more effective you
receive. (Around 5 minutes to create 50VM.)
Disk usage reduction is also possible using this technology.
Page 14
© NEC Corporation 2011
High-speed Scale-out
Differential Clone also brings benefits from an operations perspective.
Reconstruct
Applies a patch to the master VM and rapidly updates every VM
Master
VM
Changing the
reference
VM01
Extended disk
VM02
Patch
System disk
after patch
application
Extended disk
space is retained
Extended disk
Revert
The increased differencing disks are discarded and the state at the time of creation
is restored.
Suitable for operations such as help desks in which returning to the initial state
occurs at regular intervals
VM01
Discard
Master
VM
Disk difference
VM02
Discard
System disk
Disk difference
Page 15
© NEC Corporation 2011
High-speed Scale-out
Reduce time to apply individual information
Reduce time to set up Windows Vista, Windows 7, Windows Server
2008, Windows Server 2008 R2 using disk duplication function, which
will help to improve gust OS creation process in Hyper-V, XenServer.
Page 16
© NEC Corporation 2011
VM Optimized Creation
Automatic selection of the best host and storage device when creating a guest OS
Selects the most suitable host and balances CPU and memory loads
Selects the most suitable storage device and balances storage consumption
Selects a
host
App
App
App
App
App
App
OS
OS
OS
OS
OS
OS
Server B
Server A
Management
server
Server C
Selects a
storage device
Storage
Storage
Creates guest OS on servers to distribute the host and storage device loads.
Page 17
© NEC Corporation 2011
Machine Profile/Host Profile
Support host profile in addition to machine profile and those profile
can be referred from specific tenant.
Machine profile
Definition of machine specification such as virtual CPU, virtual memory.
Created guest OSs with different of specification using the same template.
Hardware spec information have been separated from templates.
Guest OS is created based on machine profile specification.
Possible to reconfigure by changing machine profile
Host profile
Definition of OS setting information.
User name/password, Workgroup/Domain setting. DNS/WINS
Host Profile setting is used when a machine is activated in SSC.
Page 18
© NEC Corporation 2011
Machine Profile/Host Profile
Creating guest OSs with different specifications using the same
template is possible by machine profile.
App
VM creation
CPU: 2
Memory: 4 GB
NIC: eth0, eth1
Disk: System - 10 GB
Extended - 20 GB
OS
App
VM01
CPU: 1
Memory: 2 GB
NIC: eth0
Disk: System - 10 GB
Extended - 10 GB
OS
Template
App
VM creation
OS
VM02
CPU: 4
Memory: 8 GB
NIC: eth0, eth1, eth2
Disk: System - 10 GB
Extended - 120 GB
Batch modification of guest OS configurations
CPU: 1
Memory: 2 GB
NIC: eth0
Disk: System - 10 GB
Extended - none
Change
© NEC Corporation 2011
App
App
OS
OS
OS
VM01
VM02
VM03
App
App
App
OS
OS
OS
VM01
VM02
VM03
Computer profile
CPU: 2
Memory: 4 GB
NIC: eth0, eth1
Disk: System - 10 GB
Extended - 20 GB
Page 19
App
Reflection
Enhanced Datastore Management
Datastore configuration
Users can specify priority levels and exceptions for datastores. The
maximum usage (%) and the number of VMs that can be created can
also be specified for each datastore.
Specifying a datastore through attributes
Users can specify a tag attribute such as gold and silver to datastores.
By specifying tags to datastores in a computer profile, the guest OS is
created in the most suitable datastore with the specified attribute tag.
Guest OS
creation
Management
server
Page 20
© NEC Corporation 2011
datastore
selection
CPU: 2
Memory: 4 GB
NIC: eth0, eth1
Disk: System - 10GB
datastore: gold tag
App
App
OS
OS
Tag: gold Tag: gold Tag: gold
Tag: silver Tag: silver
VM Optimized Placement Rule
In addition to VM-VMS(Pin) rule VM-VM(EQ) rule is also
supported.
VM-VMS(Pin) rule relates a specific virtual machine to a specific host.
VM-VM(EQ) rule relates a specific virtual machine to another specific
virtual machine.
Runs related multiple guest OSs on the same host.
Realize reduction of service response and performance degradation.
Live migration or failover
Operational group 2
Operational group 2
Operational group 1
App02
App01
OS
Web01
OS
OS
Host01
Page 21
© NEC Corporation 2011
Web02
OS
App
App
OS
OS
App
App
OS
Host02
OS
App
App02
Web02
OS
OS
OS
Host03
Simple configuration of physical computers and virtual hosts
Control of network devices connected to physical computers and
virtual hosts (such as switches and load balancers) and storage
devices can be implemented from the UI of SSC.
VLANs (including tagged VLANs) and storage devices that have been
set to the group are automatically assigned when starting operations
on a computer. Users can centrally configure and manage systems
without manually specifying each server, network, and storage device.
virtual switch and virtual distributed switch, and Hypervirtual network can also be configured.
When changing configuration, you can modify system configuration
settings (such as additional tagged VLAN or storage settings) and
then these changes can be reflected to the machines running in a
group at once.
Page 22
© NEC Corporation 2011
Enhanced Performance Monitoring
Integrate SystemMonitor console to SSC view.
Power consumption monitoring
Page 23
© NEC Corporation 2011
Agentless Monitoring
Ping monitoring/Port monitoring
PET report reception
Monitor server not supported by ESMPRO ServerAgent.
ESXi and ESX in vSphere5
A certain level of failure detection is possible by monitoring failure via
vCenter.
XenServer
Page 24
© NEC Corporation 2011
Enhanced Console Access Function
Console access to VM
Hyper-V, XenServer, KVM is also supported in addition to VMware.
Remote access to serial console on physical machine.
The serial console uses IPMI Serial Over Lan (SOL) and opens a SOL
session to BMC of a machine to communicate with.
App
App
OS
OS
App
App
OS
OS
App
App
OS
OS
Access to a console using utilities such as Remote Desktop or a dedicated
tool is not needed. All machines can be operated from a management server.
The BIOS screen can be used before staring up the OS. It is effective for
failure analysis.
Page 25
© NEC Corporation 2011
DeploymentManager 6.0 and ESMPRO/ServerManager 5.0
DeploymentManager 6.0
Web UI renewal
Improve operation and realize to manage images centrally
Backup/Restore can be executed though SSC without scenario
setting.
ESMPRO/ServerManager 5.0
Web UI renewal
Integrate server management function for In-Band/Out-of-Band
Page 26
© NEC Corporation 2011
Enhanced SIGMABLADE Integration
Improve N+1 operation by controlling vIO Control function, IO
Shared Switch in SIGMABLADE.
Replace
vIO Control function is a technology
that virtualizes MAC addresses,
WWN and UUID.
Path switching
The information configured by vIO Control function (such as virtual MAC, virtual
WWN, and virtual UUID) can be controlled from SSC. If a failure should occur
so the spare machine can be activated with the same setting as the failed
machine.
Page 27
© NEC Corporation 2011