Architecture and Best Practices: Recommendations for PI Systems



Similar documents
The Road Ahead: Bridging Platform Releases 1 and 2. Ken Marsh Service Manger OSI Software Asia

Whitepaper. NexentaConnect for VMware Virtual SAN. Full Featured File services for Virtual SAN

MaxDeploy Hyper- Converged Reference Architecture Solution Brief

RED HAT ENTERPRISE VIRTUALIZATION FOR SERVERS: COMPETITIVE FEATURES

Index C, D. Background Intelligent Transfer Service (BITS), 174, 191

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

CA Cloud Overview Benefits of the Hyper-V Cloud

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Installation and Upgrade. Guide. For PI Asset Framework included with PI Server 2014 R2

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

Why is the V3 appliance so effective as a physical desktop replacement?

Installing and Administering VMware vsphere Update Manager

FactoryTalk Historian Site Edition Architectures and Design Considerations

By the Citrix Publications Department. Citrix Systems, Inc.

Agenda Smal Business Mid-market 2

Symantec and VMware: Virtualizing Business Critical Applications with Confidence WHITE PAPER

The last 18 months. AutoScale. IaaS. BizTalk Services Hyper-V Disaster Recovery Support. Multi-Factor Auth. Hyper-V Recovery.

Exchange DAG backup and design best practices

vsphere Upgrade vsphere 6.0 EN

How Customers Are Cutting Costs and Building Value with Microsoft Virtualization

FOR SERVERS 2.2: FEATURE matrix

Active Directory Compatibility with ExtremeZ-IP

Introduction to VMware EVO: RAIL. White Paper

CLOUD SERVICES FOR EMS

Windows Server 2012 Hyper-V Training

PI Cloud Connect Overview

Multi-Datacenter Replication

VMware vsphere 4.1 with ESXi and vcenter

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

DataKeeper Cloud Edition. v7.6. Release Notes

Simplify VDI and RDS Private Clouds for SMBs

Windows Server 2003 Migration Guide: Nutanix Webscale Converged Infrastructure Eases Migration

Top 5 Reasons to choose Microsoft Windows Server 2008 R2 SP1 Hyper-V over VMware vsphere 5

Virtualization In Manufacturing Industries. Copyright 2012 Rockwell Automation, Inc. All rights reserved.

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

REDEFINE SIMPLICITY TOP REASONS: EMC VSPEX BLUE FOR VIRTUALIZED ENVIRONMENTS

SAP NetWeaver High Availability and Business Continuity in Virtual Environments with VMware and Hyper-V on Microsoft Windows

EMC VPLEX FAMILY. Transparent information mobility within, across, and between data centers ESSENTIALS A STORAGE PLATFORM FOR THE PRIVATE CLOUD

PI System Case Studies in the Cement Industry

CA ARCserve Replication and High Availability Deployment Options for Hyper-V

Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper

Best Practices for Monitoring Databases on VMware. Dean Richards Senior DBA, Confio Software

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

vsphere Upgrade Update 1 ESXi 6.0 vcenter Server 6.0 EN

MaxDeploy Ready. Hyper- Converged Virtualization Solution. With SanDisk Fusion iomemory products

SteelEye DataKeeper Cluster Edition. v7.5. Release Notes

Virtualization Case Study

Virtualization Support - Real Backups of Virtual Environments

Leveraging Virtualization in Data Centers

VMware ESXi 3.5 update 2

SteelEye DataKeeper Cluster Edition. v7.6. Release Notes

EMC VPLEX FAMILY. Continuous Availability and Data Mobility Within and Across Data Centers

VMware vsphere 5.0 Boot Camp

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

EMC Virtual Infrastructure for Microsoft Applications Data Center Solution

Windows Server 2008 R2 Hyper-V Live Migration

SolidFire SF3010 All-SSD storage system with Citrix CloudPlatform Reference Architecture

Virtualizing Microsoft Exchange Server 2010 with NetApp and VMware

Deployment Options for Microsoft Hyper-V Server

Citrix XenDesktop Backups with Xen & Now by SEP

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Who moved my cloud? Part I: Introduction to Private, Public and Hybrid clouds and smooth migration

Virtualization Backup/Replication Solution Comparison:

Installing and Configuring Microsoft SQL Server 2012 Express PI AF

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Virtualization Essentials

Expert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V

Windows Server 2012 授 權 說 明

FUTURE DATA Yes, it s finally coming to the PI System!

SaaS A Product Perspective

Virtualizing Business-Critical Applications with Confidence

Hyper-V R2: What's New?

White paper. ATCA Compute Platforms (ACP) Use ACP to Accelerate Private Cloud Deployments for Mission Critical Workloads. Rev 01

Emerging Technology for the Next Decade

Table of contents. Matching server virtualization with advanced storage virtualization

Always On Infrastructure for Software as a Ser vice

Security Overview Enterprise-Class Secure Mobile File Sharing

Reference Architecture for Dell VIS Self-Service Creator and VMware vsphere 4

Veritas Storage Foundation High Availability for Windows by Symantec

ABOUT NODE4. node4.co.uk

Veeam Backup Enterprise Manager. Version 7.0

An Oracle White Paper November Oracle Real Application Clusters One Node: The Always On Single-Instance Database

Cloud Computing. Chapter 1 Introducing Cloud Computing

cloud functionality: advantages and Disadvantages

RED HAT INFRASTRUCTURE AS A SERVICE OVERVIEW AND ROADMAP. Andrew Cathrow Red Hat, Inc. Wednesday, June 12, 2013

What s New in VMware vcenter 5.0

SELLING CLOUD. RapidScale 101. Author. RapidScale s CloudIntelligence Team

StoneFly SCVM TM for ESXi

Citrix XenServer Backups with SEP sesam

Technical Overview Simple, Scalable, Object Storage Software

Pervasive PSQL Meets Critical Business Requirements

Transcription:

Regional Seminar Series Chicago, IL 12 October, 2010 Architecture and Best Practices: Recommendations for PI Systems Ken Marsh COE Engineer OSIsoft, LLC Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Overview PI Server with Windows Integrated Security (WIS) PI Server High Availability PI Interface High Availability Virtualization and the PI System 2 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

New PI System Security Concepts Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

User Identity in the PI Server Nancy Bob Jim The security principal is the PI User Audit and Change logs reflect the PI User The security principal is the Windows User, not a PI User Audit and Change logs in the PI Server reflect the Windows User 4 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

PI Identities, PI Mappings PI Identities = Security Principals within the PI System Examples: PIOperators, PIEngineers, and PISupervisors PI Mappings link AD Groups to PI Identities 5 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

PI Identity vs. PI Groups and Users Differences between PI Identity and PI Users and Groups Unlike PI Users, PI identities don t have a password and can t be used for explicit login Unlike PI Groups, PI Identities can not contain PI Users Common Properties Shared by PI Identities, Users, and Groups Can be used for PI Mappings or PI Trusts (except PIWorld) Can be used in all Access Control Lists (ACL) Have the same authentication control flags 6 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Active Directory Integration PI Server must be a member of a domain to leverage Kerberos authentication Multiple AD domains must have trusts established or users and groups from other domain cannot be used One-way trusts are supported: the server domain must trust the client domain For non-domain accounts, you can use Windows Local Groups from the PI Server machine Passwords have to match for NTLM authentication 7 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Active Directory Integration Considerations when Integrating with AD Kerberos authentication can be used without creating domain groups Create a Local Group then add users from AD into those local groups Who will manage the AD Security groups? Will IT allow you to manage them? Do you want to manage them? Design Identity mappings and AD or Local Groups to ensure consistent access management across your PI System(s) with Active Directory 8 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Identity Planning Best Practices Develop a PI Identity Scheme for your Organization Protect your data Ease of maintenance Organizational separation Standardize Consider Kerberos Map AD principals directly Map AD principals to local groups 9 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Object Level Security Model 10 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Automatic Backward Compatibility Tag dataaccess datagroup dataowner sinusoid o:rw g:rw w:r pi_users bob Tag sinusoid datasecurity pi_users:a(r,w) bob:a(r,w) PIWorld:A(r) 11 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Use PIWorld for generic read access Everyone is granted at least PIWorld privileges World access is controlled through a PI Identity Default setting: read-only access You can disable PIWorld 12 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

PI Client Considerations Clients No more explicit logins Seamless authentication from a Windows session You can revert to the old method (explicit login) by selecting the authentication procedure in the SDK 13 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

How to Tighten Security 1. Use the new Security Tool to help secure your PI Server 2. Disable or protect the PIADMIN account 3. Disable PI password authentication (Explicit Logins) 4. Secure piconfig by forcing login 5. Retire PI SDK-based Trusts 6. Configure the PI Server Firewall 7. Disable PIWorld Identity 14 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Migration Planning Perform impact and risk analysis Work with the CoE to update your architecture Develop a migration plan with EPM 1. Identify access roles read-only & read-write 2. Create PI Identities 3. Create AD Groups 4. Create PI Mappings 5. Plan for AD Group Maintenance (add/remove users) 15 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

PI High Availability (HA) Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

PI High Availability Architecture System Management Tools PI SDK ProcessBook, DataLink, RtWebParts, Notifications, ACE, etc. PI Server Collective Secondary Metadata Replication PI Primary Server Metadata Replication Secondary Time-Series Data Time-Series Data Data Collection & Buffering PI Interface 17 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Built-in Benefits of HA PI The PI System is there all the time users trust it No special hardware required Routine maintenance less invasive rolling upgrades Simple design is robust, low bandwidth Geographical independence Complements virtualization strategies: PI can also monitor the virtualized environment (HyperV performance counters; VMWare SNMP interface) 18 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Customer Examples: HA Transmission & Distribution The PI System is mission critical system (e.g., Cal ISO) Dispersed sites for better client retrieval performance at all locations (International Paper) Load balance the data retrieval by users (PJM, Cal ISO) Aggregate data into one large PI System (PSE&G) Load Balancing and Failover for virtual machines NERC CIP: dedicated PI Server inside the security perimeter 19 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

PI Interface High Availability Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Native Data Source Failover for Data Collection PI SDK, PI API INTERFACE NODE Interface Buffer PRIMARY DATA SOURCE (e.g. OPC SERVER) BACKUP DATA SOURCE (e.g. OPC SERVER) PLC / INSTRUMENT SYSTEMS 21 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Interface Failover for Data Collection PI SDK, PI API PI SDK, PI API PRIMARY INTERFACE Interface Buffer Interface Buffer BACKUP INTERFACE DATA SOURCE (e.g. OPC SERVER) PLC / INSTRUMENT SYSTEMS 22 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Combination of native Data Source and Interface Failover PI SDK, PI API PI SDK, PI API PRIMARY INTERFACE Interface Buffer Interface Buffer BACKUP INTERFACE PRIMARY DATA SOURCE (e.g. OPC SERVER) BACKUP DATA SOURCE (e.g. OPC SERVER) PLC / INSTRUMENT SYSTEMS 23 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Types of Interface failover Phase 1 Maintains heartbeat via source data system Only available for selected interfaces Phase 2 Maintain heartbeat via shared file Many interfaces implement OSIsoft recommended 24 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

PI Interface Failover Interface failover provides 2 instances collecting the same data from the data source. Communication mechanism between 2 instances of the interface. Backup interface is sleeping; it means no data is sent to PI. If one fails the other will recognize it, wake up and start sending data to PI. Primary Interface Send data to PI File Backup Interface Data Collection Data Collection 25 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

PI Interface Failover Interfaces watch each other s Heartbeat and Status Failover Types Hot = No data loss Warm = Maybe data loss Cold = Some data lost (Hint: minimize data loss by using disconnected startup) 26 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Hot Failover Example Send data to PI Primary Interface Heartbeat: Device Status: 12 34 56 7 950 File Heartbeat: Device Status: Send data to PI from the last 2 intervals (4 & 5) and this one (6) 12 34 56 7 Backup Interface 0 Failure Data in the communication Collection layer Data Source Data Collection Timeline : 3.5 12 34 56 7 (interval) Possible overlap of data during intervals 4 and 5 27 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Prerequisites Make a plan Verify the PLC and/or instrument systems can support doubling the requests, including license requirements. Determine heartbeat interval. Ensure long enough to prevent false failover. Hardware will be needed Computers for file sharing system for heartbeat and the backup interface node. Supplemental networking equipment. 3 rd party software and hardware might be required. Security Manage the security on computer for the file sharing system. 28 Empowering Business in Real-time. 28 Copyright 2010, OSIsoft, LLC. All rights Reserved.

The PI System and Virtualization Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Virtualization trends in 2010 Virtualization will affect some part of your PI System if not today then in the near future In 2010 more Operating Systems will be deployed in Virtual Machines than on physical machines Paul Maritz CEO VMware Separation between the Hardware, Operating System and Application In a virtualized environment who controls the Hardware? Virtual Datacenters - Infrastructure as a Service (IaaS) Virtual datacenters are clouds of virtual machines that provide computing resources in a utility model Virtual datacenters will be some combination of private clouds and public clouds creating Hybrid clouds 30 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Virtual Machines Crossing the Performance Barrier New Generations of hardware and VM Technology Increasing performance, Decreasing Overhead Most VM s typically between.2-10% overhead Possible to achieve equal performance to physical machines Intel Nehalem processors and AMD-V Find the performance sweet spot thru testing Likely between 2-4 vcpu s Storage and its configuration has a high impact on performance Always reserve CPU/RAM for critical applications Don t rely on OS performance statistics use VMKernal level stats Always follow the best practice deployment practices for the application 31 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Virtualization Benefits Less hardware required Better utilization of hardware Reduce environmental consumption i.e. power, cooling, rack space Provide higher availability by supporting redundancy Rapidly deliver adaptive and reliable IT services Tie diverse components together into a single managed entity Storage efficiency can lead to higher storage utilization 32 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Benefits of Virtualizing the PI System Optimization of resources thru load distribution Simplifies the hardware upgrade/maintenance process Ability to add resources such as CPU/Memory on demand Easily move Virtual PI to other Hosts to upgrade hardware Provides availability in the event of a hardware failure VMotion or Failover to another host Redundant networking thru virtual switches 33 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

A Virtualized PI System PI Server Secondary PI Server Primary ACE Server Virtual Host A AF Server Virtual Host B Virtual Desktops (Clients) Interfaces VM Host Farm Virtual Host C 34 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Recommendations: Virtualized PI System Use Enterprise class hardware and Virtual Host software Microsoft Hyper-V or Vmware Vsphere Multiple hosts (cluster) Collective should be split across hosts PI System components can run as separate virtual machines for scalability and performance Optimize storage for virtual machines Reserve memory/cpu for PI do not over allocate Use resource scheduling to move other guests don t move PI or Interfaces Consider PI HA and VMotion and Hyper-V clusters complementary strategies 35 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Five Principles for Virtualization Success* Treat virtual machines as if they were physical machines Invest in Enterprise-level hardware and software Do not mix virtual and physical on the same host Use qualified Virtualization support personnel Test on the target platform *OSIsoft Center of Excellence 36 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Benefits: PI in a Virtualization Project The PI Sytem works as well in a virtual environment as it does on physical hardware The PI Sytem is perfect for monitoring a virtualized environment If you are thinking about virtualization, it s a good time to consider the value of HA PI If you are thinking about network storage, it s a good time to consider the value of virtualization and the PI Sytem with SAN support If you are thinking about problems with client software deployment, it s a good time to consider the value of Terminal Services Gateway, virtualization and the PI Sytem 37 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Desktop Virtualization Coming to a desktop near you Desktop virtualization has become hot in 2010 Credit Suisse expects the desktop virtualization market to be at least 1.8 billion by 2012 up from virtually zero. * Desktop Virtualization comes of age http://dabcc.com/documents/desktop virtualization_11_26_07.pdf A new spin on an old theme Thin clients Citrix, Terminal Services Virtual Desktops take Thin Client computing to the Virtual Datacenter by using some thin clients to connect to virtual machines How do you manage them? How do you maintain them? What is the performance? What is the ROI? What are the licensing implications? 38 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

What are Virtualized Desktops? 39 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Benefits of Application Virtualization One point of installation makes deployment simpler Access to applications secured All users have the same version of the software; no version or compatibility issues Casual users do not need to install anything to get started Save money on hardware upgrade investments by deploying client software in one place 40 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

More Information Whitepapers and Tech Support bulletins on OSIsoft web site Vendor web sites OSIsoft internal expertise Microsoft representatives for Hyper V and Terminal Server Gateway solutions 41 Empowering Business in Real-time. Copyright 2010, OSIsoft, LLC. All rights Reserved.

Thank you Copyright 2010 OSIsoft, LLC. 777 Davis St., Suite 250 San Leandro, CA 94577