NEC SigmaSystemCenter 3.0 highlights NEC Corporation 2nd IT Software Division IT Network Global Solutions Division Sept. 2011
NEC SigmaSystemCenter 3.0 highlights Cloud Management Multitenancy Resource Pool Role Management Life Cycle Management Service Portal Logical Network/IP Address Pool Expanding supported hypervisor Supporting distributed switch High-speed Scale-out VM Optimized Creation Machine Profile/Host Profile Enhanced Datastore Management VM Optimized Placement Rule Simple configuration of physical computers and virtual hosts Enhanced Performance Monitoring Agentless Monitoring Enhanced Console Access Function DeploymentManager 6.0 and ESMPRO/ServerManager Ver.5 Enhanced SIGMABLADE Integration Page 2
Cloud Management Multitenancy Resource Pool Role Management Life Cycle Management Service Portal Logical Network/IP Address Pool Virtualization management is enhanced in SSC(*1)3.0, which realize infrastructure management in cloud environment. These feature also helps the customer who has not deployed cloud system, realizing efficient implementation and operation. *1 Abbreviation of NEC SigmaSystemCenter Page 3
How clouds operate with SSC Users Tenant A Resource reservation and VM creation Maintenance and troubleshooting by users The VM and resources of other tenants cannot be accessed Service portal Configu ration Tenant administrator Sub Resource Pool IP/VLAN pool Users Tenant B Resource reservation and VM creation Service portal Configu ration Tenant administrator Image library Sub Resource Pool IP/VLAN pool Tenant creation/ Creation of user for tenant administrator/ Allocation of sub resource pool System administrator Resource pool Resource pool creation/extraction from the sub resource pool Servers Page 4 NEC Corporation 2011 Storage devices Maintenance and troubleshooting by users Network devices Images Image library
Cloud Management - Multitenancy Improve resource utilization by sharing resources between multiple tenants The resources managed by SSC are shared among the tenants. Because you do not need to assign specific servers, storage devices, or switches to each tenant, the resources in the system can be used efficiently. This is explained in further detail in the resource pool section on the next slide. Security must be a consideration while sharing resources. Users from other tenants should not be able to view resource usage or control a guest. SSC offers protection against this security issue. More information is provided in the section on role management. Page 5
Cloud Management Resource Pool Managing resources in a large-scale environment is simple In a resource pool, management is simplified because resources are managed as virtual resources such as virtual CPU and virtual memory which compose virtual machine. Resources can be managed at the tenant level A portion of the resources are extract to form a sub resource pool that is assigned to a tenant for use. The efficient use of resources is possible through the sharing of one resource pool among multiple tenants. Visualize resource usage Visualize the usage of a resource pool to view the usage of resource pools and sub resource pools. This makes possible the prediction of shortages and planned increases of resources. Page 6
Cloud Management - Resource Pool Conceptual diagram Extract sub resource pools Create resource pool Tenant A Sub resource pool A Servers Storage devices Physical resources Resource pool Tenant B Resource pool usage status Sub resource pool B Page 7 NEC Corporation 2011
Cloud Management Role Management Your system is secure because users from other tenants cannot access the guest or resources. Manage tenant users through a tenant administrator You can limit the resources to which each user has access by specifying roles to each tenant user. Page 8
Cloud Management Life Cycle Management Manage usage history The strict management of resource expiration dates is important. It is especially so for the tenant lending service, in which charges are based on the beginning and end date of usage and how much the resource was used. Therefore, managing the resource life cycle and understanding its usage history is necessary. You can also keep a track on the history of a guest powering on and shutting down. Manage a history of configuration changes You can manage a history of changes made to the guest s. Make groups through smart grouping(*) Service start date Service end date The number of days remaining until service start date The number of days elapsed sine the service end date (*)Smart groups can be specified through a command-line interface. Page 9
Cloud Management Service Portal Making the SSC screen available to end users There are instances in which a guest must be restarted because a guest sometimes stalls. A service portal is offered in which users can solve such problems themselves without going through a tenant administrator. Log in as a tenant user Tenant users Create a guest Start or restart the guest Etc. Portal Page 10
Cloud Management Logical Network/IP Address Pool Defines logical networks composed of tenant VLAN IDs and guest IP address pools. You can centrally manage which VLAN ID and IP address are pooled with which tenant. Automatically specifies linked VLANs and IP addresses when a virtual host or guest specified by the logical network starts operation. The logical network settings can be made available for reference to only certain tenants in order to ensure security between tenants. Page 11
Expanding supported hypervisor KVM is now supported in addition to VMware, XenServer, and Hyper-V RHEL6.0 KVM is supported. XenServer Hyper-V KVM VMware Page 12
Supporting distributed switch Support VMware vnetwork Standard Switch / Distributed Switch Creating port group (VLAN) from SSC is possible and port group is assigned dynamically in guest creation. vds can make private VLAN which realize flexible network design by Network isolation is important in security point of view for multi tenant environment in cloud. Page 13
High-speed Scale-out Guest high-speed scale out by Differential Clone Differential Clone is an option feature and must be purchased separately VM01 Master VM System disk Reference Reference Reference Differential disk VM02 Differential disk Extended disk Extended disk User-specific data sent to extended disk space VM03 Differential disk Extended disk Dramatically reduce VM creation time by Differential Clone. The more guest you create, the more effective you receive. (Around 5 minutes to create 50VM.) Disk usage reduction is also possible using this technology. Page 14
High-speed Scale-out Differential Clone also brings benefits from an operations perspective. Reconstruct lies a patch to the master VM and rapidly updates every VM Patch Master VM System disk after patch application Revert Changing the reference VM01 VM02 VM01 Extended disk Extended disk The increased differencing disks are discarded and the state at the time of creation is restored. Suitable for operations such as help desks in which returning to the initial state occurs at regular intervals Discard Extended disk space is retained Master VM System disk Disk difference VM02 Discard Disk difference Page 15
High-speed Scale-out Reduce time to apply individual information Reduce time to set up Windows Vista, Windows 7, Windows Server 2008, Windows Server 2008 R2 using disk duplication function, which will help to improve gust creation process in Hyper-V, XenServer. Page 16
VM Optimized Creation Automatic selection of the best host and storage device when creating a guest Selects the most suitable host and balances CPU and memory loads Selects the most suitable storage device and balances storage consumption Selects a host Server A Server B Server C Management server Selects a storage device Storage Storage Creates guest on servers to distribute the host and storage device loads. Page 17
Machine Profile/Host Profile Support host profile in addition to machine profile and those profile can be referred from specific tenant. Machine profile Definition of machine specification such as virtual CPU, virtual memory. Created guest s with different of specification using the same template. Hardware spec information have been separated from templates. Host profile Guest is created based on machine profile specification. Possible to reconfigure by changing machine profile Definition of setting information. User name/password, Workgroup/Domain setting. DNS/WINS Host Profile setting is used when a machine is activated in SSC. Page 18
Machine Profile/Host Profile Creating guest s with different specifications using the same template is possible by machine profile. CPU: 2 Memory: 4 GB NIC: eth0, eth1 Disk: System - 10 GB Extended - 20 GB Template VM creation VM creation Batch modification of guest configurations VM01 VM02 CPU: 1 Memory: 2 GB NIC: eth0 Disk: System - 10 GB Extended - 10 GB CPU: 4 Memory: 8 GB NIC: eth0, eth1, eth2 Disk: System - 10 GB Extended - 120 GB CPU: 1 Memory: 2 GB NIC: eth0 Disk: System - 10 GB Extended - none VM01 VM02 VM03 Change Computer profile CPU: 2 Memory: 4 GB NIC: eth0, eth1 Disk: System - 10 GB Extended - 20 GB Reflection VM01 VM02 VM03 Page 19
Enhanced Datastore Management Datastore configuration Users can specify priority levels and exceptions for datastores. The maximum usage (%) and the number of VMs that can be created can also be specified for each datastore. Specifying a datastore through attributes Users can specify a tag attribute such as gold and silver to datastores. By specifying tags to datastores in a computer profile, the guest is created in the most suitable datastore with the specified attribute tag. Guest creation CPU: 2 Memory: 4 GB NIC: eth0, eth1 Disk: System - 10GB datastore: gold tag Management server datastore selection Tag: gold Tag: gold Tag: gold Tag: silver Tag: silver Page 20
VM Optimized Placement Rule In addition to VM-VMS(Pin) rule VM-VM(EQ) rule is also supported. VM-VMS(Pin) rule relates a specific virtual machine to a specific host. VM-VM(EQ) rule relates a specific virtual machine to another specific virtual machine. Runs related multiple guest s on the same host. Realize reduction of service response and performance degradation. Live migration or failover Operational group 2 Operational group 2 Operational group 1 01 02 Web01 Web02 02 Web02 Host01 Host02 Host03 Page 21
Simple configuration of physical computers and virtual hosts Control of network devices connected to physical computers and virtual hosts (such as switches and load balancers) and storage devices can be implemented from the UI of SSC. VLANs (including tagged VLANs) and storage devices that have been set to the group are automatically assigned when starting operations on a computer. Users can centrally configure and manage systems without manually specifying each server, network, and storage device. virtual switch and virtual distributed switch, and Hypervirtual network can also be configured. When changing configuration, you can modify system configuration settings (such as additional tagged VLAN or storage settings) and then these changes can be reflected to the machines running in a group at once. Page 22
Enhanced Performance Monitoring Integrate SystemMonitor console to SSC view. Power consumption monitoring Page 23
Agentless Monitoring Ping monitoring/port monitoring PET report reception Monitor server not supported by ESMPRO ServerAgent. ESXi and ESX in vsphere5 A certain level of failure detection is possible by monitoring failure via vcenter. XenServer Page 24
Enhanced Console Access Function Console access to VM Hyper-V, XenServer, KVM is also supported in addition to VMware. Remote access to serial console on physical machine. The serial console uses IPMI Serial Over Lan (SOL) and opens a SOL session to BMC of a machine to communicate with. Access to a console using utilities such as Remote Desktop or a dedicated tool is not needed. All machines can be operated from a management server. The BI screen can be used before staring up the. It is effective for failure analysis. Page 25
DeploymentManager 6.0 and ESMPRO/ServerManager 5.0 DeploymentManager 6.0 Web UI renewal Improve operation and realize to manage images centrally Backup/Restore can be executed though SSC without scenario setting. ESMPRO/ServerManager 5.0 Web UI renewal Integrate server management function for In-Band/Out-of-Band Page 26
Enhanced SIGMABLADE Integration Improve N+1 operation by controlling vio Control function, IO Shared Switch in SIGMABLADE. Replace Path switching vio Control function is a technology that virtualizes MAC addresses, WWN and UUID. The information configured by vio Control function (such as virtual MAC, virtual WWN, and virtual UUID) can be controlled from SSC. If a failure should occur so the spare machine can be activated with the same setting as the failed machine. Page 27