NEC SigmaSystemCenter 3.0 highlights NEC Corporation 2nd IT Software Division IT Network Global Solutions Division Sept. 2011 NEC SigmaSystemCenter 3.0 highlights Cloud Management Multitenancy Resource Pool Role Management Life Cycle Management Service Portal Logical Network/IP Address Pool Expanding supported hypervisor Supporting distributed switch High-speed Scale-out VM Optimized Creation Machine Profile/Host Profile Enhanced Datastore Management VM Optimized Placement Rule Page 2 © NEC Corporation 2011 Simple configuration of physical computers and virtual hosts Enhanced Performance Monitoring Agentless Monitoring Enhanced Console Access Function DeploymentManager 6.0 and ESMPRO/ServerManager Ver.5 Enhanced SIGMABLADE Integration Cloud Management Multitenancy Resource Pool Role Management Life Cycle Management Service Portal Logical Network/IP Address Pool Virtualization management is enhanced in SSC(*1)3.0, which realize infrastructure management in cloud environment. These feature also helps the customer who has not deployed cloud system, realizing efficient implementation and operation. *1 Abbreviation of NEC SigmaSystemCenter Page 3 © NEC Corporation 2011 How clouds operate with SSC Users Tenant A Resource reservation and VM creation App App App OS OS OS Maintenance and troubleshooting by users The VM and resources of other tenants cannot be accessed Service portal Configu ration Tenant administrator Sub Resource Pool IP/VLAN pool Users Tenant B Resource reservation and VM creation App App OS OS OS Service portal Configu ration Tenant administrator Image library App Sub Resource Pool IP/VLAN pool Tenant creation/ Creation of user for tenant administrator/ Allocation of sub resource pool System administrator Resource pool Resource pool creation/extraction from the sub resource pool Servers Page 4 © NEC Corporation 2011 Storage devices Maintenance and troubleshooting by users Network devices Images Image library Cloud Management - Multitenancy Improve resource utilization by sharing resources between multiple tenants The resources managed by SSC are shared among the tenants. Because you do not need to assign specific servers, storage devices, or switches to each tenant, the resources in the system can be used efficiently. This is explained in further detail in the resource pool section on the next slide. Security must be a consideration while sharing resources. Users from other tenants should not be able to view resource usage or control a guest OS. SSC offers protection against this security issue. More information is provided in the section on role management. Page 5 © NEC Corporation 2011 Cloud Management Resource Pool Managing resources in a large-scale environment is simple In a resource pool, management is simplified because resources are managed as virtual resources such as virtual CPU and virtual memory which compose virtual machine. Resources can be managed at the tenant level A portion of the resources are extract to form a sub resource pool that is assigned to a tenant for use. The efficient use of resources is possible through the sharing of one resource pool among multiple tenants. Visualize resource usage Visualize the usage of a resource pool to view the usage of resource pools and sub resource pools. This makes possible the prediction of shortages and planned increases of resources. Page 6 © NEC Corporation 2011 Cloud Management - Resource Pool Conceptual diagram App App App OS OS OS Extract sub resource pools Create resource pool Tenant A Sub resource pool A Servers Storage devices Physical resources Resource pool App App App OS OS OS Tenant B Resource pool usage status Sub resource pool B Page 7 © NEC Corporation 2011 Cloud Management Role Management Your system is secure because users from other tenants cannot access the guest OS or resources. Manage tenant users through a tenant administrator You can limit the resources to which each user has access by specifying roles to each tenant user. Page 8 © NEC Corporation 2011 Cloud Management Life Cycle Management Manage usage history The strict management of resource expiration dates is important. It is especially so for the tenant lending service, in which charges are based on the beginning and end date of usage and how much the resource was used. Therefore, managing the resource life cycle and understanding its usage history is necessary. You can also keep a track on the history of a guest OS powering on and shutting down. Manage a history of configuration changes You can manage a history of changes made to the guest OSs. Make groups through smart grouping(*) Service start date Service end date The number of days remaining until service start date The number of days elapsed sine the service end date (*)Smart groups can be specified through a command-line interface. Page 9 © NEC Corporation 2011 Cloud Management Service Portal Making the SSC screen available to end users There are instances in which a guest OS must be restarted because a guest OS sometimes stalls. A service portal is offered in which users can solve such problems themselves without going through a tenant administrator. Log in as a tenant user Create a guest OS Start or restart the guest OS Etc. Tenant users Portal Page 10 © NEC Corporation 2011 Cloud Management Logical Network/IP Address Pool Defines logical networks composed of tenant VLAN IDs and guest OS IP address pools. You can centrally manage which VLAN ID and IP address are pooled with which tenant. Automatically specifies linked VLANs and IP addresses when a virtual host or guest OS specified by the logical network starts operation. The logical network settings can be made available for reference to only certain tenants in order to ensure security between tenants. Page 11 © NEC Corporation 2011 Expanding supported hypervisor KVM is now supported in addition to VMware, XenServer, and Hyper-V RHEL6.0 KVM is supported. XenServer Hyper-V KVM VMware Page 12 © NEC Corporation 2011 Supporting distributed switch Support VMware vNetwork Standard Switch / Distributed Switch Creating port group (VLAN) from SSC is possible and port group is assigned dynamically in guest OS creation. vDS can make private VLAN which realize flexible network design by Network isolation is important in security point of view for multi tenant environment in cloud. Page 13 © NEC Corporation 2011 High-speed Scale-out Guest OS high-speed scale out by Differential Clone Differential Clone is an option feature and must be purchased separately VM01 Reference Master VM Differential disk Extended disk Reference Reference System disk VM02 Differential disk Extended disk User-specific data sent to extended disk space VM03 Differential disk Extended disk Dramatically reduce VM creation time by Differential Clone. The more guest OS you create, the more effective you receive. (Around 5 minutes to create 50VM.) Disk usage reduction is also possible using this technology. Page 14 © NEC Corporation 2011 High-speed Scale-out Differential Clone also brings benefits from an operations perspective. Reconstruct Applies a patch to the master VM and rapidly updates every VM Master VM Changing the reference VM01 Extended disk VM02 Patch System disk after patch application Extended disk space is retained Extended disk Revert The increased differencing disks are discarded and the state at the time of creation is restored. Suitable for operations such as help desks in which returning to the initial state occurs at regular intervals VM01 Discard Master VM Disk difference VM02 Discard System disk Disk difference Page 15 © NEC Corporation 2011 High-speed Scale-out Reduce time to apply individual information Reduce time to set up Windows Vista, Windows 7, Windows Server 2008, Windows Server 2008 R2 using disk duplication function, which will help to improve gust OS creation process in Hyper-V, XenServer. Page 16 © NEC Corporation 2011 VM Optimized Creation Automatic selection of the best host and storage device when creating a guest OS Selects the most suitable host and balances CPU and memory loads Selects the most suitable storage device and balances storage consumption Selects a host App App App App App App OS OS OS OS OS OS Server B Server A Management server Server C Selects a storage device Storage Storage Creates guest OS on servers to distribute the host and storage device loads. Page 17 © NEC Corporation 2011 Machine Profile/Host Profile Support host profile in addition to machine profile and those profile can be referred from specific tenant. Machine profile Definition of machine specification such as virtual CPU, virtual memory. Created guest OSs with different of specification using the same template. Hardware spec information have been separated from templates. Guest OS is created based on machine profile specification. Possible to reconfigure by changing machine profile Host profile Definition of OS setting information. User name/password, Workgroup/Domain setting. DNS/WINS Host Profile setting is used when a machine is activated in SSC. Page 18 © NEC Corporation 2011 Machine Profile/Host Profile Creating guest OSs with different specifications using the same template is possible by machine profile. App VM creation CPU: 2 Memory: 4 GB NIC: eth0, eth1 Disk: System - 10 GB Extended - 20 GB OS App VM01 CPU: 1 Memory: 2 GB NIC: eth0 Disk: System - 10 GB Extended - 10 GB OS Template App VM creation OS VM02 CPU: 4 Memory: 8 GB NIC: eth0, eth1, eth2 Disk: System - 10 GB Extended - 120 GB Batch modification of guest OS configurations CPU: 1 Memory: 2 GB NIC: eth0 Disk: System - 10 GB Extended - none Change © NEC Corporation 2011 App App OS OS OS VM01 VM02 VM03 App App App OS OS OS VM01 VM02 VM03 Computer profile CPU: 2 Memory: 4 GB NIC: eth0, eth1 Disk: System - 10 GB Extended - 20 GB Page 19 App Reflection Enhanced Datastore Management Datastore configuration Users can specify priority levels and exceptions for datastores. The maximum usage (%) and the number of VMs that can be created can also be specified for each datastore. Specifying a datastore through attributes Users can specify a tag attribute such as gold and silver to datastores. By specifying tags to datastores in a computer profile, the guest OS is created in the most suitable datastore with the specified attribute tag. Guest OS creation Management server Page 20 © NEC Corporation 2011 datastore selection CPU: 2 Memory: 4 GB NIC: eth0, eth1 Disk: System - 10GB datastore: gold tag App App OS OS Tag: gold Tag: gold Tag: gold Tag: silver Tag: silver VM Optimized Placement Rule In addition to VM-VMS(Pin) rule VM-VM(EQ) rule is also supported. VM-VMS(Pin) rule relates a specific virtual machine to a specific host. VM-VM(EQ) rule relates a specific virtual machine to another specific virtual machine. Runs related multiple guest OSs on the same host. Realize reduction of service response and performance degradation. Live migration or failover Operational group 2 Operational group 2 Operational group 1 App02 App01 OS Web01 OS OS Host01 Page 21 © NEC Corporation 2011 Web02 OS App App OS OS App App OS Host02 OS App App02 Web02 OS OS OS Host03 Simple configuration of physical computers and virtual hosts Control of network devices connected to physical computers and virtual hosts (such as switches and load balancers) and storage devices can be implemented from the UI of SSC. VLANs (including tagged VLANs) and storage devices that have been set to the group are automatically assigned when starting operations on a computer. Users can centrally configure and manage systems without manually specifying each server, network, and storage device. virtual switch and virtual distributed switch, and Hypervirtual network can also be configured. When changing configuration, you can modify system configuration settings (such as additional tagged VLAN or storage settings) and then these changes can be reflected to the machines running in a group at once. Page 22 © NEC Corporation 2011 Enhanced Performance Monitoring Integrate SystemMonitor console to SSC view. Power consumption monitoring Page 23 © NEC Corporation 2011 Agentless Monitoring Ping monitoring/Port monitoring PET report reception Monitor server not supported by ESMPRO ServerAgent. ESXi and ESX in vSphere5 A certain level of failure detection is possible by monitoring failure via vCenter. XenServer Page 24 © NEC Corporation 2011 Enhanced Console Access Function Console access to VM Hyper-V, XenServer, KVM is also supported in addition to VMware. Remote access to serial console on physical machine. The serial console uses IPMI Serial Over Lan (SOL) and opens a SOL session to BMC of a machine to communicate with. App App OS OS App App OS OS App App OS OS Access to a console using utilities such as Remote Desktop or a dedicated tool is not needed. All machines can be operated from a management server. The BIOS screen can be used before staring up the OS. It is effective for failure analysis. Page 25 © NEC Corporation 2011 DeploymentManager 6.0 and ESMPRO/ServerManager 5.0 DeploymentManager 6.0 Web UI renewal Improve operation and realize to manage images centrally Backup/Restore can be executed though SSC without scenario setting. ESMPRO/ServerManager 5.0 Web UI renewal Integrate server management function for In-Band/Out-of-Band Page 26 © NEC Corporation 2011 Enhanced SIGMABLADE Integration Improve N+1 operation by controlling vIO Control function, IO Shared Switch in SIGMABLADE. Replace vIO Control function is a technology that virtualizes MAC addresses, WWN and UUID. Path switching The information configured by vIO Control function (such as virtual MAC, virtual WWN, and virtual UUID) can be controlled from SSC. If a failure should occur so the spare machine can be activated with the same setting as the failed machine. Page 27 © NEC Corporation 2011