Welcome MEEC Members! SDDC: A New Architecture for a New Era of Ed IT PRESENTED BY Chuck Kiessling Data Networks Solutions Architect Dan Radke VMware Network and Security Specialist M E E C M E M B E R C O N F E R E N C E A P R I L 2 3, 2 0 1 5
THANKS FOR JOINING US! VISIT BOOTH #13 Vmware vrealize and VDI live demo Enter to win a $100 Best Buy gift card DON T FORGET! Please fill out a session evaluation and leave it with Amy/Jan TODAY S AGENDA What is the Software Defined Data Center? Software-Defined Components Virtual Storage Virtual Networking Wrap-Up and Questions 2
COMMON DATA CENTER CHALLENGES PLANNING Understanding the needs of all BU s Understanding the structure of all internal orgs Designing a reference architecture Procuring components from different vendors Time investment before first VM deployment PROVISIONING Making disparate infrastructure (compute, storage, network) work together Lack of automation and tools for workload provisioning and deployment Many points of control LIFECYCLE MANAGEMENT Troubleshooting Support calls to multiple vendors Business interruption during maintenance Upgrade Planning and Implementation 3
WHAT MOTIVATES YOU? Time is Money 4
ENTER THE SOFTWARE-DEFINED DC Wikipedia Software-Defined Data Center (SDDC) SDDC (also Virtual Data Center- VDC) is a vision for IT infrastructure that extends virtualization concepts such as abstraction, pooling, and automation to all of the data center s resources and services to achieve IT as a service (ITaaS). In a software-defined data center, all elements of the infrastructure networking, storage, CPU and security are virtualized and delivered as a service. 5
PHYSICAL COMPONENTS Compute Nodes Network Nodes Storage Nodes 6
SOFTWARE-DEFINED COMPONENTS Virtualization Platform Management Layer Software Layer 7
SDDC: A NEW ARCHITECTURE VIRTUAL STORAGE 9
THE SAN OF YESTERDAY Server Storage Shared Storage New Forms Key Drivers 20-30 years ago 10-15 years ago Today Falling Storage Prices Abundant CPU Cycles Converged Infrastructure Cloud Economics 10
HYPERVISOR = NEW OPPORTUNITIES The Virtualization Platform Knows the needs of all apps in real time vsphere Global view of underlying infrastructure Sits directly in the I/O path New way of provisioning and managing storage x86 Servers SAN / NAS Cloud Storage 11
THE HYPERVISOR TRANSFORMS STORAGE TODAY SOFTWARE-DEFINED STORAGE LUN LUN LUN LUN LUN vsan Storage Pool SAN/NAS Pool Object-based Pool Abstract and pool (Virtualized Data Plane) Array A Array B vsphere x86 Servers SAN / NAS Cloud Object Storage 12
HOW DOES IT WORK? Virtual SAN is Designed to Ensure Data is Never Lost in Case of Failures Simple to set up via policy Delivered on per VM basis vsphere + Virtual SAN Zero data loss in case of disk, network or host failures Ensures zero downtime from disk or network failures Interoperable with vsphere HA and Maintenance Mode 13 13
WHY VIRTUAL SAN? Radically Simple High Performance Lower TCO Two click Install Single pane of glass Policy-driven Self-tuning Integrated with VMware stack Embedded in vsphere kernel Flash-accelerated 90,000 iops per Host Up to 8.8 PB per Cluster Up to 64 Hosts Granular and linear scaling Server-side economics No large upfront investments Grow-as-you-go Easy to operate with powerful automation No specialized skillset 14
SDDC: A NEW ARCHITECTURE VIRTUAL NETWORKING 18
RAVE REVIEWS FOR NSX The NSX solution should be considered by existing VMware customers as a way of providing network agility and reducing network operational challenges within the data center. Gartner Data Center Networking Magic Quadrant, April 24, 2014 19
THE VALUE OF NSX Admin/IT Execs Speed and Agility Secure Infrastructure Time-to-Market Competitive Advantage IT Operations Efficiency of Change De-risking Change IT Infrastructure & Security Data Center Micro-segmentation Network Hardware Choice Compute Capacity Utilization 20
TAKING WHAT WE HAVE LEARNED Automated Operational Model Programmatically Create, Snapshot, Store, Move, Delete, Restore Software Applications Virtual Machines Server Virtualization Intelligence in the virtualization layer Vendor independent x86 capacity Transformative operational model Automated configuration & management Hardware Manual Operational Model Compute Capacity Network Storage Intelligence in hardware Dedicated, vendor specific infrastructure Manual configuration & management 21
TO DELIVER AN SDDC APPROACH Automated Operational Model Programmatically Create, Snapshot, Store, Move, Delete, Restore Software Virtual Machines Applications Virtual Networks Data Center Virtualization Virtual Storage Hardware Compute Capacity Network Capacity Storage Capacity Pooled compute, network and storage capacity Vendor independent, best price/performance Simplified configuration & management 22 Location Independence
NETWORK VIRTUALIZATION OVERVIEW Application Application Application Workload Workload Workload x86 Environment Virtual Machine Virtual Machine Virtual Machine Software L2, L3, L4-7 Network Services Virtual Network Virtual Network Virtual Network Server Hypervisor Requirement: x86 Decoupled Network Hypervisor Requirement: IP Transport Hardware General Purpose Server Hardware General Purpose Networking Hardware 23
CURRENT NEW NETWORK ENVIRONMENT PROVISIONING 1 2 3 4 5 6 7 8 9 Request & Define Network Determine Review & Change Order Config Config Security Config Load Provision Review & Security Changes Approval Scheduling Network (vlan, (FW) Balancer Environment Network & Environment Required Process (CAB) routing) Security (Capacity Resources Availability) Pre-Prod: 1 Prod: 1 Pre-Prod: 3 Prod: 4.5 Pre-Prod: 3 Prod: 4.5 Pre-Prod: 0.3 Prod: 0.5 Pre-Prod: 0.5 Prod: 0.5 Pre-Prod: 1 Prod: 1 Pre-Prod: 1 Prod: 1 Pre-Prod: 1 Prod: 1 Pre-Prod: 0.3 Prod: 0.3 1 Day 3 Days 3 Days 5 Days 5 Days 8% 2 Days 8% 2 Days 8% 2 Days.025 Days Process Duration 23 Days 24
FUTURE NEW NETWORK ENVIRONMENT PROVISIONING 1 2 3 4 5 6 7 8 9 Request & Define Network Determine Review & Change Order Config Config Security Config Load Provision Review & Security Changes Approval Scheduling Network (vlan, (FW) Balancer Environment Network & Environment Required Process (CAB) routing) Security (Capacity Resources Availability) Pre-Prod: 0 Prod:0 Pre-Prod: 0.5 Prod: 1 Pre-Prod: 0 Prod:0 Pre-Prod: 0 Prod: 0.5 Pre-Prod: 0 Prod:0 Pre-Prod: 0 Prod:0 Pre-Prod: 0 Prod:0 Pre-Prod: 0 Prod:0 Pre-Prod: 0.3 Prod: 0.3 0 Days 0 Days 0 Days 0 Days 0 Days 0 Days 0 Days 0 Days 0 Days Process Duration less than a Day 25
THE M&M APPROACH TO SECURITY In today s new threat landscape, this M&M and trust but verify is no longer an effective way of enforcing security. Forrester Research In Response to NIST RF 130208119-3119-01I Developing a Framework to Improve Critical Infrastructure Cyber-Security 26
PROBLEM: DC NETWORK SECURITY Perimeter-centric network security has proven insufficient, and micro-segmentation is operationally infeasible Internet Internet Little or no lateral controls inside perimeter Insufficient Operationally Infeasible 27
WHAT DOES THIS ENABLE? Regain control of your security posture and build practical measures to protect your infrastructure This is the future of data center networking and security! 28
About Data Networks Simplifying enterprise IT for our customers since 1983 Complete solutions include: End User Computing Data Center Optimization Infrastructure and Security Full-time staff of 60+ with flexible staffing model that scales to customer needs VMware Enterprise Partner Visit DataNetworks.com for More E N D U S E R C O M P U T I N G D ATA C E N T E R O P T I M I Z AT I O N I N F R A S T R U C T U R E + S E C U R I T Y