Solaris For The Modern Data Center. Taking Advantage of Solaris 11 Features
|
|
- Lydia Williamson
- 8 years ago
- Views:
Transcription
1 Solaris For The Modern Data Center Taking Advantage of Solaris 11 Features JANUARY 2013
2 Contents Introduction... 2 Patching and Maintenance... 2 IPS Packages... 2 Boot Environments... 2 Fast Reboot... 3 Storage Enhancements... 3 ZFS File System... 3 Checksums and Self-Healing Data... 4 Snapshots... 4 Replication... 5 Clones... 5 Deduplication... 5 SMB File Sharing... 6 Network Enhancements... 6 Virtual NICS, Switches... 6 Firewall... 6 Network Load Balancer... 7 Data Center Bridging... 7 Virtualization... 7 Virtualization Technology Models... 8 Choosing Your Virtualization Model... 9 Security... 9 Summary Contact Dewpoint Today Dewpoint making technology work 1
3 Introduction Solaris 11 builds on the solid platform of Solaris 10 while remodeling some of the older sections of the code base to create an operating system that is better able to support the modern data center. In particular, the areas of system maintenance, storage, networking, and virtualization have been improved. These improvements make it much easier to manage Solaris across the full spectrum of deployment environments in use today: physical servers, virtual machines, and cloud. The features that will be explored in this paper include: Patching and Maintenance Storage Enhancements Network Enhancements Virtualization Security Patching and Maintenance IPS Packages Solaris 11 has extensive changes in the methods used to install, patch, and update software. The patching system used in previous versions of Solaris was designed over a decade ago, and was not scaling well with the increase of software size or the frequency of system updates. The older patch system made it difficult to back out some types of patches. To address these issues, Solaris 11 uses a brand new system called Imaging Packaging System (IPS). IPS is similar to patching models used in Linux that are flexible and intelligent enough to automatically address any prerequisite packages required for installations and updates. IPS is used for system software installation as well as patching. Boot Environments Solaris 11 supports multiple boot environments that bring benefits to the system maintenance processes. Each boot environment uses a snapshot of the root file system so different binary and configuration files can exist in each unique boot environment. New packages and updates can be installed into a new boot environment so they have no effect on the current running system. When out of production, the system can be booted into this new boot environment to run with the changed code. If the new environment has problems, the system can simply be re-booted into the previous boot environment to restore the original configuration. Dewpoint making technology work 2
4 Fast Reboot To better support the concept of boot environments, Solaris 11 has a fast reboot mode that avoids resetting the systems boards and running through a full post and diagnostics. When a system is functioning properly and is being re-booted to apply (or remove) package updates, running through a full diagnostic suite of tests is wasting valuable time in an outage window. Using the fast reboot mode allows a system to restart in just a few minutes. Tests have shown that fast reboot taking less than 2.5 minutes on old hardware. Storage Enhancements ZFS File System Solaris introduced the ZFS file system in Solaris 10 as a new technology that combined a volume manager and a file system into a better way to manage storage. In Solaris 11, ZFS takes center stage as it is the required file system for the root volume. ZFS provides the framework to support the new Image Packaging System (IPS) and boot environments for Solaris system management. ZFS simplifies storage management by eliminating hard partitioning of disks and file systems. ZFS protects data redundancy by using mirroring or redundant disk stripes to create disk pools from which file systems can be allocated. Storage pools can be optimized for performance (RAID 10) or capacity (RAID 5 and RAID 6). ZFS is a transactional file system, which means that the file system state is always consistent on disk. Traditional file systems overwrite data in place, which means that if the system loses power, for example, between the time a data block is allocated and when it is linked into a directory, the file system will be left in an inconsistent state. Historically, this problem was solved through the use of the fsck command. This command was responsible for reviewing and verifying the file system state, and attempting to repair any inconsistencies during the process. This problem of inconsistent file systems caused great pain to administrators, and the fsck command was never guaranteed to fix all possible problems. More recently, file systems have introduced the concept of journaling. The journaling process records actions in a separate journal, which can then be replayed safely if a system crash occurs. This process introduces unnecessary overhead because the data needs to be written twice, often resulting in a new set of problems, such as when the journal cannot be replayed properly. With a transactional file system, data is managed using copy on write semantics. Data is never overwritten, and any sequence of operations is either entirely committed or entirely ignored. Thus, the file system can never be corrupted through accidental loss of power or a system crash. Although the most recently written pieces of data might be lost, the file system itself will always be consistent. In addition, data can be flagged as synchronous and is always guaranteed to be written before returning, so it is never lost. Dewpoint making technology work 3
5 Checksums and Self-Healing Data With ZFS, all data and metadata is verified using a user-selectable checksum algorithm. Traditional file systems that do provide checksum verification have performed it on a per-block basis, out of necessity due to the volume management layer and traditional file system design. The traditional design means that certain failures, such as writing a complete block to an incorrect location, can result in data that is incorrect but has no checksum errors. ZFS checksums are stored in a way such that these failures are detected and can be recovered from gracefully. All checksum verification and data recovery are performed at the file system layer, and are transparent to applications. In addition, ZFS provides for self-healing data. ZFS supports storage pools with varying levels of data redundancy. When a bad data block is detected, ZFS fetches the correct data from another redundant copy and repairs the bad data, replacing it with the correct data. Snapshots A snapshot is a read-only copy of a file system or volume. Snapshots can be created almost instantly, and they initially consume no additional disk space within the pool. However, as data within the active dataset changes, the snapshot consumes disk space by continuing to reference the old data, thus preventing the disk space from being freed. ZFS snapshots include the following features: The snapshots persist across system reboots. The theoretical maximum number of snapshots is Snapshots use no separate backing store. Snapshots consume disk space directly from the same storage pool as the file system or volume from which they were created. Recursive snapshots are created quickly as one atomic operation. The snapshots are created together (all at once) or not created at all. The benefit of atomic snapshot operations is that the snapshot data is always taken at one consistent time, even across descendent file systems. Snapshots are used with multiple boot environments to allow patches to be installed into an alternate boot environment. Redirecting the patching outside of the current running environment protects the system from the effects of a bad patch. Different snapshots of the root file system allow the server to be booted into the new or original patch configuration. An administrator can create snapshots of application or data volumes before applying updates there as well. Using snapshots in this manner allows the system to quickly revert to the original state if an upgrade fails. Reverting to a snapshot is extremely fast and orders of magnitude simpler and quicker than restoring from a backup. Snapshots can be used to create consistent versions of the file systems that can be backed up to media or replicated to another system. Dewpoint making technology work 4
6 Replication ZFS has inherent replication abilities. A snapshot of a file system or volume can be sent to another location on the same or a different Solaris server. This replication can be used for backup, disaster recovery or test/development functions. The zfs send command creates a stream representation of a snapshot that is written to standard output. By default, a full stream is generated. You can redirect the output to a file or to a different system. The zfs receive command creates a snapshot whose contents are specified in the stream that is provided on standard input. If a full stream is received, a new file system is created as well. You can send ZFS snapshot data and receive ZFS snapshot data and file systems with these commands. Incremental replication updates are supported by taking a new snapshot of the original file system. This new snapshot is sent to the destination location using an incremental flag. In this case, only the changes since the previous snapshot and replication are sent. The use of incremental replication can greatly reduce the time and bandwidth required to update a replicated ZFS object. Clones A clone is a writable volume or file system whose initial contents are the same as the dataset from which it was created. As with snapshots, creating a clone is nearly instantaneous and initially consumes no additional disk space. In addition, you can snapshot a clone. Clones are useful if you are running virtualization on a server and want to duplicate a Solaris Zone or virtual machine. Clones are also useful to create copies of production data for development or test. Clones can only be created from a snapshot. When a snapshot is cloned, an implicit dependency is created between the clone and snapshot. Even though the clone is created somewhere else in the file system hierarchy, the original snapshot cannot be destroyed as long as the clone exists. The origin property exposes this dependency, and the zfs destroy command lists any such dependencies, if they exist. Because a clone initially shares all its disk space with the original snapshot, its used property value is initially zero. As changes are made to the clone, it uses more disk space. The used property of the original snapshot does not include the disk space consumed by the clone. Deduplication A ZFS file system that stores files containing many duplicate blocks of data can improve storage utilization by enabling deduplication on the file system. ZFS deduplication can provide storage savings for use cases like home directories, archives, or backup files. Solaris provides tools that can check a data area and determine if deduplication will actually provide real reductions in your data. Since deduplication produces overhead in a system for both processor and memory resources, deduplication should only be enabled in environments where it can provide tangible results. Dewpoint making technology work 5
7 SMB File Sharing The Oracle Solaris operating system has reached a new level of Windows interoperability with the introduction of an integrated SMB server. An Oracle Solaris server can now be an active participant in a Windows active directory domain and provide ubiquitous, cross-protocol file sharing through SMB and NFS to clients in their native dialect. The SMB server allows a native Oracle Solaris system to serve files, by means of SMB shares, to SMB enabled clients, such as Windows and Mac OS systems. A Windows client (or other SMB client) can interoperate with the SMB server as it would with a Windows server. An SMB server can operate in either workgroup mode or in domain mode. In workgroup mode, the SMB server is responsible for authenticating users locally when access is requested to shared resources. This authentication process is referred to as local login. In domain mode, the SMB server uses pass-through authentication, in which user authentication is delegated to a domain controller. In this case, the Solaris server becomes a member of the Windows Active Directory Domain. Oracle Solaris OS credentials have been enhanced to fully support Windows-style SIDs. In addition, the ZFS file system supports Windows-style ACLs and access checking. The SMB shares once created, can be managed by native Windows administration tools. Network Enhancements Solaris 11 has overhauled the network software to better support modern networking and virtualization technologies. Support for technologies such as 10 Gigabit Ethernet, Data Center Bridging, IP Version 6, Infiniband has been greatly enhanced and better integrated into the operating system. Virtual NICS, Switches Networking support for virtualization has been improved by separating the physical network devices from the logical network configuration. This separation of functions allows for more flexibility in network configuration. The operating system supports the creation of virtual switches and network interfaces in the OS software. These constructs allow for virtual machines (like containers or LDOMs) to configure their network interfaces identically to physical machines. This transparency makes it much easier to manage multiple systems regardless of where they are hosted or what the underlying hardware looks like. The virtual switching infrastructure allows Solaris virtualization hosts bridge the physical network switches in the data center through to the virtual machines contained within the servers. Firewall Solaris 11 includes an integrated firewall that can be used to secure network access to the system. The firewall is based on the open source ipfilter software packages. The firewall supports stateless packet filtering functions as well as Network Address Translation (NAT) gateway functioning. Packet filtering provides basic protection against network-based attacks. IP Filter can filter by IP address, port, protocol, Dewpoint making technology work 6
8 network interface, and traffic direction. IP Filter can also filter by an individual source IP address, a destination IP address, by a range of IP addresses, or by address pools. Network Load Balancer Solaris 11 also includes an integrated network Load Balancer that can be used to provide application redundancy. The Load Balancer operates at layers three and four of the network stack. The Load Balancer intercepts incoming requests from clients, decides which back-end server should handle the request based on load-balancing rules, and then forwards the request to the selected server. The Load Balancer performs optional health checks and provides the data for the load-balancing algorithms to verify if the selected server can handle the incoming request. By performing the above functionalities, Load Balancer spreads work load directed to the server across multiple servers. This can improve reliability, minimize response time and in general improve performance of the server. Data Center Bridging Data center bridging is a set of features that enhances traditional Ethernet networks' abilities to manage traffic especially in environments where network traffic volume and transmission rates are high. Fiber channel can be dedicated to host this type of traffic. However, using dedicated links to service only fiber channel traffic can be costly. Thus, fiber channel traffic over Ethernet (FCoE) is more commonly used when higher speed Ethernet (10 gigabit Ethernet) is deployed. DCB features address fiber channel's sensitivity to packet loss while traversing the Ethernet network. DCB enables peers to distinguish traffic based on priorities. By distinguishing priorities, hosts can ensure that for traffic with higher priorities, packet integrity is preserved in cases of congestion between hosts. With the DCB exchange protocol (DCBX), communicating hosts can exchange configuration information that affect high speed network traffic. The peers can then negotiate on a common configuration that ensures continuous traffic flow while preventing packet loss for those packets with high priority. Virtualization Solaris 11 supports multiple virtualization models to allow a large amount of flexibility in how applications are deployed. The goal of virtualization is to move from managing individual data center components to managing pools of resources. Server virtualization is important for successful server consolidation projects that require you to maintain the isolation of separate systems. Dewpoint making technology work 7
9 Successful server virtualization can lead to the following benefits: Increasing the utilization of hardware Enabling greater flexibility in resource allocation Reducing data center power requirements Minimizing management costs Lowering the cost of ownership Providing administrative and resource boundaries between applications on a system Enabling simplified high availability and disaster recovery Virtualization Technology Models The virtualization models are described by means of the following competing characteristics: The amount of execution environment isolation The amount of resource flexibility The more isolation that a model provides, the less resource flexibility it provides. The more resource flexibility that a model provides, the less isolation it provides. Because these characteristics compete, they cannot be maximized by a single model. Oracle Solaris 11.1 can be used with any of the following virtualization technology models: Operating system (OS) virtualization provides one or more isolated execution environments in a single OS instance. Each environment contains what appears to be a private copy of the OS in a container. The OS virtualization model provides near-native performance and flexibility, and has a much smaller disk, RAM, and CPU footprint than either virtual machines or physical domains. However, the OS virtualization model provides the least amount of execution environment isolation. Oracle Solaris 11.1 provides this virtualization model by means of the Oracle Solaris Zones product. Virtual machines can be used to run multiple OS instances with a single set of hardware resources. Each virtual machine that you create runs its own OS. You can run various operating systems in this way. A software or firmware hypervisor creates the illusion that each guest OS instance is running on its own separate system. Virtual machines provide less resource flexibility than a machine that uses OS virtualization, but virtual machines do provide more isolation. Oracle Solaris 11.1 provides this virtualization model by means of Oracle VM Server for SPARC and Oracle VM Server for x86. Dewpoint making technology work 8
10 Hardware partitions, also known as physical domains, provide physical separation between the running OS and its separate set of resources and power. Because this model does not use a hypervisor, it provides bare-metal performance. This virtualization model provides the most isolation, but it is much less flexible with resource configuration than either the virtual machines or OS virtualization model. Oracle provides this type of virtualization on Oracle's Sun SPARC Enterprise M-Series servers. Choosing Your Virtualization Model The following describes how you might use each Oracle Solaris 11.1 virtualization technology in your environment: Use Oracle Solaris Zones to maximize the efficiency and scalability of workloads, and to migrate Solaris 8, Solaris 9, Oracle Solaris 10, and Oracle Solaris 11 workloads to new hardware systems. Use Oracle VM Server for SPARC to deploy different Oracle Solaris 10 and Oracle Solaris 11 environments on SPARC chip multithreading (CMT) systems. Use Oracle VM Server for x86 to deploy a server with heterogeneous operating systems, including the Oracle Solaris 10 OS and the Oracle Solaris 11 OS as guests. Use Oracle SPARC M-Series servers to deploy different Oracle Solaris 10 and Oracle Solaris 11 operating systems to isolated domains. Each domain provides separation and isolation from the other domains on the M-Series server at the socket level, or at the board level to provide electrical isolation. Each domain can run a different version of the Oracle Solaris 10 or Oracle Solaris 11 OS. You can also mix virtualization technologies to maximize workload density. For example, you could configure multiple zones to run within an Oracle Solaris virtual machine or domain to leverage the strengths of the different virtualization technologies. Security Solaris 11 has added many security features to improve the security posture of the operating system. Some of the significant changes include: Auditing Solaris 11 includes an audit process that is enabled by default. The process creates an audit trail of changes to all objects in the operating system. Key Management Enhancements Solaris now operates as a PKCS#11 keystore for RSA keys. In addition, Oracle Key Manager can be used for centralized enterprise key management. ZFS file system encryption ZFS file systems can be encrypted to secure the data on the disks from unauthorized access. Dewpoint making technology work 9
11 IPFilter Firewall Solaris now includes an integrated firewall to filter port access by IP addresses. Secure by Default Solaris disables all network services during installation to minimize network exposure. Only SSH service is enabled in a new install. Role Based Access Control (RBAC) All access to system privileges is controlled by assigned roles in the system. A user is granted roles that correspond to their level of access required for the system. Removal of root user Solaris 11 is configured without a root user in accordance with current security practices. Access to the system must be performed by audited user accounts. Authorized users can assume the root role when needed. Summary Solaris 11 has been specifically architected for the modern data center and includes enhancements to patching/maintenance, storage handling, networking, virtualization and security that allow it to surpass all other operating systems for today s workloads. New features such as the Imaging Packaging System, integrated load balancer and IP Filter firewall and enhancements to existing features such as the removal of root access, improved virtualization and ZFS demonstrate that Oracle is committed to Solaris as the premier operating system for running enterprise workloads faster and better. Contact Dewpoint Today For more information and to begin investigating how your company can take advantage of these technologies to reduce costs and improve efficiencies DEWPOINT contactus@dewpoint.com Dewpoint making technology work 10
Oracle Solaris: Aktueller Stand und Ausblick
Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It
More informationFeature Comparison. Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V
Comparison and Contents Introduction... 4 More Secure Multitenancy... 5 Flexible Infrastructure... 9 Scale, Performance, and Density... 13 High Availability... 18 Processor and Memory Support... 24 Network...
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationEMC DATA DOMAIN OPERATING SYSTEM
ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read
More informationJune 2009. Blade.org 2009 ALL RIGHTS RESERVED
Contributions for this vendor neutral technology paper have been provided by Blade.org members including NetApp, BLADE Network Technologies, and Double-Take Software. June 2009 Blade.org 2009 ALL RIGHTS
More informationEMC DATA DOMAIN OPERATING SYSTEM
EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive
More informationVirtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies
Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies Kurt Klemperer, Principal System Performance Engineer kklemperer@blackboard.com Agenda Session Length:
More informationCloud Server. Parallels. An Introduction to Operating System Virtualization and Parallels Cloud Server. White Paper. www.parallels.
Parallels Cloud Server White Paper An Introduction to Operating System Virtualization and Parallels Cloud Server www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating
More informationCROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION
1 E N D U R A D A T A EDpCloud: A File Synchronization, Data Replication and Wide Area Data Distribution Solution CROSS PLATFORM AUTOMATIC FILE REPLICATION AND SERVER TO SERVER FILE SYNCHRONIZATION 2 Resilient
More informationMicrosoft SMB File Sharing Best Practices Guide
Technical White Paper Microsoft SMB File Sharing Best Practices Guide Tintri VMstore, Microsoft SMB 3.0 Protocol, and VMware 6.x Author: Neil Glick Version 1.0 06/15/2016 @tintri www.tintri.com Contents
More informationPARALLELS CLOUD SERVER
PARALLELS CLOUD SERVER An Introduction to Operating System Virtualization and Parallels Cloud Server 1 Table of Contents Introduction... 3 Hardware Virtualization... 3 Operating System Virtualization...
More informationOracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
More informationWhat s new in Hyper-V 2012 R2
What s new in Hyper-V 2012 R2 Carsten Rachfahl MVP Virtual Machine Rachfahl IT-Solutions GmbH & Co KG www.hyper-v-server.de Thomas Maurer Cloud Architect & MVP itnetx gmbh www.thomasmaurer.ch Before Windows
More informationWindows Server 2008 R2 Hyper-V Server and Windows Server 8 Beta Hyper-V
Features Comparison: Hyper-V Server and Hyper-V February 2012 The information contained in this document relates to a pre-release product which may be substantially modified before it is commercially released.
More informationBrocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
More informationWindows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services
Windows Server on WAAS: Reduce Branch-Office Cost and Complexity with WAN Optimization and Secure, Reliable Local IT Services What You Will Learn Windows Server on WAAS reduces the cost and complexity
More informationParagon Protect & Restore
Paragon Protect & Restore ver. 3 Centralized and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores Paragon
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationVirtualization Technologies ORACLE TECHNICAL WHITE PAPER OCTOBER 2015
Virtualization Technologies ORACLE TECHNICAL WHITE PAPER OCTOBER 2015 Table of Contents Introduction 3 Designing a Consolidated Infrastructure 6 Seven Areas of Consideration for Consolidation 6 Security
More informationServer and Storage Virtualization with IP Storage. David Dale, NetApp
Server and Storage Virtualization with IP Storage David Dale, NetApp SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individuals may use this
More informationBest Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring
Best Practices on monitoring Solaris Global/Local Zones using IBM Tivoli Monitoring Document version 1.0 Gianluca Della Corte, IBM Tivoli Monitoring software engineer Antonio Sgro, IBM Tivoli Monitoring
More informationSAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Pavel Anni Oracle Operating Systems & Virtualization Overview 2 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,
More informationZFS Administration 1
ZFS Administration 1 With a rapid paradigm-shift towards digital content and large datasets, managing large amounts of data can be a challenging task. Before implementing a storage solution, there are
More informationReboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive
Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting
More informationIBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE
White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores
More informationHigh Availability with Windows Server 2012 Release Candidate
High Availability with Windows Server 2012 Release Candidate Windows Server 2012 Release Candidate (RC) delivers innovative new capabilities that enable you to build dynamic storage and availability solutions
More informationIntel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family
Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL
More informationIsilon OneFS. Version 7.2.1. OneFS Migration Tools Guide
Isilon OneFS Version 7.2.1 OneFS Migration Tools Guide Copyright 2015 EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC believes the information in this publication is accurate
More informationBlueArc unified network storage systems 7th TF-Storage Meeting. Scale Bigger, Store Smarter, Accelerate Everything
BlueArc unified network storage systems 7th TF-Storage Meeting Scale Bigger, Store Smarter, Accelerate Everything BlueArc s Heritage Private Company, founded in 1998 Headquarters in San Jose, CA Highest
More informationCisco Active Network Abstraction Gateway High Availability Solution
. Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and
More informationVMware vsphere Data Protection 6.1
VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data
More informationCitrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2
Citrix Provisioning Services Administrator s Guide Citrix Provisioning Services 5.1 SP2 December 2009 Revision 4 Copyright and Trademark Notice Information in this document is subject to change without
More informationSymantec NetBackup 7.1 What s New and Version Comparison Matrix
Symantec 7.1 What s New and Version Comparison Matrix Symantec 7 allows customers to standardize backup and recovery operations across physical and virtual environments with fewer resources and less risk
More informationCitrix XenServer Design: Designing XenServer Network Configurations
Citrix XenServer Design: Designing XenServer Network Configurations www.citrix.com Contents About... 5 Audience... 5 Purpose of the Guide... 6 Finding Configuration Instructions... 6 Visual Legend... 7
More informationParallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Top Ten Considerations For Choosing A Server Virtualization Technology www.parallels.com Version 1.0 Table of Contents Introduction... 3 Technology Overview...
More informationCloud Server. Parallels. Key Features and Benefits. White Paper. www.parallels.com
Parallels Cloud Server White Paper Key Features and Benefits www.parallels.com Table of Contents Introduction... 3 Key Features... 3 Distributed Cloud Storage (Containers and Hypervisors)... 3 Rebootless
More informationהמרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר
מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.
More informationBUILDING A NEXT-GENERATION DATA CENTER
BUILDING A NEXT-GENERATION DATA CENTER Data center networking has changed significantly during the last few years with the introduction of 10 Gigabit Ethernet (10GE), unified fabrics, highspeed non-blocking
More informationVirtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric
Virtualization, Business Continuation Plan & Disaster Recovery for EMS -By Ramanj Pamidi San Diego Gas & Electric 2001 San Diego Gas and Electric. All copyright and trademark rights reserved. Importance
More informationActifio Big Data Director. Virtual Data Pipeline for Unstructured Data
Actifio Big Data Director Virtual Data Pipeline for Unstructured Data Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/.
More informationORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically
More informationDriving the New Paradigm of Software Defined Storage Solutions White Paper July 2014
Sanapptx Driving the New Paradigm of Software Defined Storage Solutions White Paper July 2014 Page 1 The New Software Defined Storage Opportunity Organizations everywhere are experiencing an explosion
More informationMCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
More informationEnterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.
ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More information319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
More informationORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
More informationRed Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Network Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Network (RHN) Satellite server is an easy-to-use, advanced systems management platform
More informationNET ACCESS VOICE PRIVATE CLOUD
Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of
More informationEvolution from the Traditional Data Center to Exalogic: An Operational Perspective
An Oracle White Paper July, 2012 Evolution from the Traditional Data Center to Exalogic: 1 Disclaimer The following is intended to outline our general product capabilities. It is intended for information
More informationOverview... 2. Customer Login... 2. Main Page... 2. VM Management... 4. Creation... 4 Editing a Virtual Machine... 6
July 2013 Contents Overview... 2 Customer Login... 2 Main Page... 2 VM Management... 4 Creation... 4 Editing a Virtual Machine... 6 Disk Management... 7 Deletion... 7 Power On / Off... 8 Network Management...
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationMigrating Workloads to Cloud Best Practices
CONTENTS 3 3 3 4 4 6 6 6 6 8 8 8 ASSESSMENT AND MIGRATION CANDIDATES Criticality Criteria Network Criteria and Impacts Storage Criteria Server inter-dependencies SYSTEM STABILITY APPLICATION AND DATA MAINTENANCE
More informationCloud Infrastructure Planning. Chapter Six
Cloud Infrastructure Planning Chapter Six Topics Key to successful cloud service adoption is an understanding of underlying infrastructure. Topics Understanding cloud networks Leveraging automation and
More informationPart 1 - What s New in Hyper-V 2012 R2. Clive.Watson@Microsoft.com Datacenter Specialist
Part 1 - What s New in Hyper-V 2012 R2 Clive.Watson@Microsoft.com Datacenter Specialist Microsoft Cloud OS Vision Public Cloud Azure Virtual Machines Windows Azure Pack 1 Consistent Platform Windows Azure
More informationThe Art of Virtualization with Free Software
Master on Free Software 2009/2010 {mvidal,jfcastro}@libresoft.es GSyC/Libresoft URJC April 24th, 2010 (cc) 2010. Some rights reserved. This work is licensed under a Creative Commons Attribution-Share Alike
More informationDeep Dive on SimpliVity s OmniStack A Technical Whitepaper
Deep Dive on SimpliVity s OmniStack A Technical Whitepaper By Hans De Leenheer and Stephen Foskett August 2013 1 Introduction This paper is an in-depth look at OmniStack, the technology that powers SimpliVity
More informationVirtualization. Dr. Yingwu Zhu
Virtualization Dr. Yingwu Zhu What is virtualization? Virtualization allows one computer to do the job of multiple computers. Virtual environments let one computer host multiple operating systems at the
More informationSecurity Overview of the Integrity Virtual Machines Architecture
Security Overview of the Integrity Virtual Machines Architecture Introduction... 2 Integrity Virtual Machines Architecture... 2 Virtual Machine Host System... 2 Virtual Machine Control... 2 Scheduling
More informationUsing Live Sync to Support Disaster Recovery
Using Live Sync to Support Disaster Recovery SIMPANA VIRTUAL SERVER AGENT FOR VMWARE Live Sync uses backup data to create and maintain a warm disaster recovery site. With backup and replication from a
More information<Insert Picture Here> Refreshing Your Data Protection Environment with Next-Generation Architectures
1 Refreshing Your Data Protection Environment with Next-Generation Architectures Dale Rhine, Principal Sales Consultant Kelly Boeckman, Product Marketing Analyst Program Agenda Storage
More information<Insert Picture Here> Oracle VM and Cloud Computing
Oracle VM and Cloud Computing Paulo Bosco Otto Sales Consultant paulo.bosco.otto@oracle.com The following is intended to outline our general product direction. It is intended for
More informationInfortrend EonNAS 3000 and 5000: Key System Features
Infortrend EonNAS 3000 and 5000: Key System Features White paper Abstract This document introduces Infortrend s EonNAS 3000 and 5000 systems and analyzes key features available on these systems. Table
More informationOracle Database 11g: New Features for Administrators DBA Release 2
Oracle Database 11g: New Features for Administrators DBA Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: New Features for Administrators DBA Release 2 training explores new change
More informationTraditionally, a typical SAN topology uses fibre channel switch wiring while a typical NAS topology uses TCP/IP protocol over common networking
Network Storage for Business Continuity and Disaster Recovery and Home Media White Paper Abstract Network storage is a complex IT discipline that includes a multitude of concepts and technologies, like
More informationMicrosoft Private Cloud Fast Track
Microsoft Private Cloud Fast Track Microsoft Private Cloud Fast Track is a reference architecture designed to help build private clouds by combining Microsoft software with Nutanix technology to decrease
More informationHow To Make A Virtual Machine Aware Of A Network On A Physical Server
VMready Virtual Machine-Aware Networking White Paper Table of Contents Executive Summary... 2 Current Server Virtualization Environments... 3 Hypervisors... 3 Virtual Switches... 3 Leading Server Virtualization
More informationADVANCED NETWORK CONFIGURATION GUIDE
White Paper ADVANCED NETWORK CONFIGURATION GUIDE CONTENTS Introduction 1 Terminology 1 VLAN configuration 2 NIC Bonding configuration 3 Jumbo frame configuration 4 Other I/O high availability options 4
More informationVMware vsphere Replication Administration
VMware vsphere Replication Administration vsphere Replication 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationTOP TEN CONSIDERATIONS
White Paper TOP TEN CONSIDERATIONS FOR CHOOSING A SERVER VIRTUALIZATION TECHNOLOGY Learn more at www.swsoft.com/virtuozzo Published: July 2006 Revised: July 2006 Table of Contents Introduction... 3 Technology
More informationWhite Paper. Virtualization with Protection for SMBs Using the ReadyDATA 5200
White Paper Virtualization with Protection for SMBs Using the ReadyDATA For most small-to-medium size businesses, building a virtualization solution that provides scalability, reliability, and data protection
More informationVistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
More informationAn Oracle White Paper April 2010. Oracle VM Server for SPARC Enabling a Flexible, Efficient IT Infrastructure
An Oracle White Paper April 2010 Oracle VM Server for SPARC Enabling a Flexible, Efficient IT Infrastructure Executive Overview... 1 Introduction... 1 Improving Consolidation Strategies Through Virtualization...
More informationHyper-V backup implementation guide
Hyper-V backup implementation guide A best practice guide for Hyper-V backup administrators. www.backup-assist.ca Contents 1. Planning a Hyper-V backup... 2 Hyper-V backup considerations... 2 2. Hyper-V
More informationNetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality
NETAPP TECHNICAL REPORT NetApp and Microsoft Virtualization: Making Integrated Server and Storage Virtualization a Reality Abhinav Joshi, NetApp Chaffie McKenna, NetApp August 2008 TR-3701 Version 1.0
More informationWeek Overview. Installing Linux Linux on your Desktop Virtualization Basic Linux system administration
ULI101 Week 06b Week Overview Installing Linux Linux on your Desktop Virtualization Basic Linux system administration Installing Linux Standalone installation Linux is the only OS on the computer Any existing
More informationVirtualization System Security
Virtualization System Security Bryan Williams, IBM X-Force Advanced Research Tom Cross, Manager, IBM X-Force Security Strategy 2009 IBM Corporation Overview Vulnerability disclosure analysis Vulnerability
More informationBackup and Recovery Solutions for Exadata. Cor Beumer Storage Sales Specialist Oracle Nederland
Backup and Recovery Solutions for Exadata Cor Beumer Storage Sales Specialist Oracle Nederland Recovery Point and Recovery Time Wks Days Hrs Mins Secs Secs Mins Hrs Days Wks Data Loss (Recovery Point Objective)
More informationWindows Server 2012 授 權 說 明
Windows Server 2012 授 權 說 明 PROCESSOR + CAL HA 功 能 相 同 的 記 憶 體 及 處 理 器 容 量 虛 擬 化 Windows Server 2008 R2 Datacenter Price: NTD173,720 (2 CPU) Packaging All features Unlimited virtual instances Per processor
More informationRed Hat Satellite Management and automation of your Red Hat Enterprise Linux environment
Red Hat Satellite Management and automation of your Red Hat Enterprise Linux environment WHAT IS IT? Red Hat Satellite server is an easy-to-use, advanced systems management platform for your Linux infrastructure.
More informationCluster File System Configuration and the Oracle Solaris Zones Model
An Oracle White Paper February 2011 Zone Clusters How to Deploy Virtual Clusters and Why Introduction... 1 Cluster Application Consolidation... 2 Server Virtualization Technologies... 3 Hardware Partitions...
More informationCA Cloud Overview Benefits of the Hyper-V Cloud
Benefits of the Hyper-V Cloud For more information, please contact: Email: sales@canadianwebhosting.com Ph: 888-821-7888 Canadian Web Hosting (www.canadianwebhosting.com) is an independent company, hereinafter
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationUnitrends Recovery-Series: Addressing Enterprise-Class Data Protection
Solution Brief Unitrends Recovery-Series: Addressing Enterprise-Class Data Protection 2 Unitrends has leveraged over 20 years of experience in understanding ever-changing data protection challenges in
More informationBEST PRACTICES GUIDE: VMware on Nimble Storage
BEST PRACTICES GUIDE: VMware on Nimble Storage Summary Nimble Storage iscsi arrays provide a complete application-aware data storage solution that includes primary storage, intelligent caching, instant
More informationCompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
More informationWHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
More informationBackup and Recovery Solutions for Exadata. Ľubomír Vaňo Principal Sales Consultant
Backup and Recovery Solutions for Exadata Ľubomír Vaňo Principal Sales Consultant Fundamental Backup and Recovery Data doesn t exist in most organizations until the rule of 3 is complete: Different Media
More informationUsing Rsync for NAS-to-NAS Backups
READYNAS INSTANT STORAGE Using Rsync for NAS-to-NAS Backups Infrant Technologies 3065 Skyway Court, Fremont CA 94539 www.infrant.com Using Rsync For NAS-To-NAS Backups You ve heard it before, but it s
More informationAvailability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
More informationSolution Overview 4 Layers...2. Layer 1: VMware Infrastructure 3...2. Components of the VMware infrastructure...2
Contents Overview...1 Key Implementation Challenges...1 Providing a Solution through Virtualization...1 Benefits of Running SQL Server with VMware Infrastructure...1 Solution Overview 4 Layers...2 Layer
More informationBest Practices for VMware ESX Server 2
Best Practices for VMware ESX Server 2 2 Summary VMware ESX Server can be deployed in many ways. In this document, we recommend specific deployment guidelines. Following these guidelines will maximize
More informationHigh Availability for Citrix XenApp
WHITE PAPER Citrix XenApp High Availability for Citrix XenApp Enhancing XenApp Availability with NetScaler Reference Architecture www.citrix.com Contents Contents... 2 Introduction... 3 Desktop Availability...
More informationEnabling Technologies for Distributed Computing
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF Multi-core CPUs and Multithreading Technologies
More informationVMware vsphere 4.1 with ESXi and vcenter
VMware vsphere 4.1 with ESXi and vcenter This powerful 5-day class is an intense introduction to virtualization using VMware s vsphere 4.1 including VMware ESX 4.1 and vcenter. Assuming no prior virtualization
More informationDell High Availability Solutions Guide for Microsoft Hyper-V
Dell High Availability Solutions Guide for Microsoft Hyper-V www.dell.com support.dell.com Notes and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationINCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT
INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability
More informationAlliance Key Manager Solution Brief
Alliance Key Manager Solution Brief KEY MANAGEMENT Enterprise Encryption Key Management On the road to protecting sensitive data assets, data encryption remains one of the most difficult goals. A major
More informationCompanies are moving more and more IT services and
Adding High Availability to the Cloud Paul J. Holenstein Executive Vice President Gravic, Inc. Companies are moving more and more IT services and utility applications to public clouds to take advantage
More information