650) This. width = 650; "style =" clear: Both; border-Right: 0px; border-top: 0px; margin-bottom: 8px; Vertical-align: Top; border-left: 0px; border-bottom: 0px; "src =" http://h.hiphotos.bdimg.com/album/pic/item/9f2f070828381f30ce8d489faa014c086e06f074.jpg "width =" 500 "alt =" 9f2f070828381f30ce8d489faa014c086e06f074 "/>
In the cloud computing era, desktop cloud, as the most easy-to-implement cloud computing solution, has been widely used in all walks of life. While the desktop cloud features high security, centralized management, and mobility, IT administrators are also troubled by complicated system management problems, difficult to effectively use resources, and security problems.
1. Desktop cloud Management Technology
Microsoft's systemcenter provides a complete IT system center management solution, but its deployment and management are complicated and expensive. Although lanw.symantec and others can also provide solutions such as desktop management and system backup, these are only a small part of the overall solution and cannot be integrated, and compatibility issues must be taken into account. VMWare does not provide overall management solutions such as systemcenter and management solutions such as enterpriseplus, but these products come from third parties and are expensive, there are also many problems with compatibility.
Vfoglight provides solutions for performance monitoring and management of complex VMware ESX and hyper-V environments. The questsoftware company to which vfoglight belongs has been acquired by Dell, however, vfoglight and other products are independently sold. Of course, they can be integrated with other solutions of quest. Huawei TSM is integrated into its overall desktop cloud solution, while Dell's DVS (desktop virtualization solution) solution includes its kace for internal desktop management.
2. Key Technologies of desktop cloud Management
Desktop cloud management involves web technology, cloud computing virtualization technology, data mining and other technologies. Therefore, desktop cloud management technology requires a lot of research issues, the basic technologies are platform monitoring, resource optimization, and security. The following is a brief introduction to these three technologies.
2.1. Monitor the virtualized environment and simplify O & M management
The desktop cloud system is complex and consists of multiple components, such as servers, storage, and networks. It has multiple management terminals and multiple management terminals, making it difficult to have a clear understanding of the system. It is difficult to locate faults, the fault can be solved only after comprehensive analysis of multiple systems.
650) This. width = 650; "style =" clear: Both; border-Right: 0px; border-top: 0px; margin-bottom: 8px; Vertical-align: Top; border-left: 0px; border-bottom: 0px; "src =" http://c.hiphotos.bdimg.com/album/pic/item/279759ee3d6d55fbf00ab3106e224f4a20a4dd3c.jpg "width =" 525 "alt =" 279759ee3d6d55fbf00ab3127e224f4a20a4dd3c "/>
Figure 1 desktop cloud unified architecture
Monitors the status of each component of the virtualization platform, such as the virtualization backend, virtual desktop, network, and database, and collects the log and alarm information of these components; provides a physical topology based on hosts, storage devices, and network devices in a virtualized environment. It also provides virtual hosts, switches, database servers, AD, and terminals for the devices and systems involved in the virtualized environment) collects and analyzes the associations between them. displays the system running status and performance, and establishes a Health Module Based on these statuses, intuitively reports the monitoring status of the current system and guides the Administrator on how to solve the problem.
650) This. width = 650; "style =" clear: Both; border-Right: 0px; border-top: 0px; margin-bottom: 8px; Vertical-align: Top; border-left: 0px; border-bottom: 0px; "src =" http://f.hiphotos.bdimg.com/album/pic/item/5fdf8db1cb134954a4d52d52554e9258d1094a39.jpg "width =" 562 "alt =" 5fdf8db1cb134954a4d52d52554e9258d1094a39 "/>
Figure 2 virtualization platform monitoring
The difficulty of this technology is that the relationship between various systems of users is complex, and Big Data Mining and analysis is required for problem locating and analysis; how to automatically analyze the association between systems.
2.2. Monitor the virtualized environment to improve resource utilization
Difficult to manage desktop cloud resources: it is hard to explain whether resource allocation is reasonable based on experience. As the system grows, resources are easily "implicitly" consumed. virtual machines are not shut down for a long time, unnecessary resource consumption. Monitors the usage of virtual hosts, storage devices, and virtual machines, analyzes and collects data, and recycles virtual machines with excessive resource allocation, increase resources for virtual machines with insufficient resource allocation to improve the overall resource utilization and user experience. Predict The total capacity of the virtualized environment, and evaluate the number of new users that the system can afford based on the current user's usage. Based on the historical usage of the virtualization environment, evaluate whether there will be insufficient resources in the current capacity for a certain period of time in the future.
650) This. width = 650; "style =" clear: Both; border-Right: 0px; border-top: 0px; margin-bottom: 8px; Vertical-align: Top; border-left: 0px; border-bottom: 0px; "src =" http://g.hiphotos.bdimg.com/album/pic/item/d53f8794a4c27d1e0c39fff218d5ad6eddc438ed.jpg "width =" 563 "alt =" d53f8794a4c27d1e0c39fff218d5ad6eddc438ed "/>
Figure 3 resource statistics
The difficulty of this technology is that big data needs to be mined and analyzed during capacity planning; resources can be analyzed and mined to ensure that these statistics can correctly reflect the problems of the current system.
2.3. Audit desktop user behaviors to ensure system security
Difficult to audit desktop cloud security: There is a lack of management and control over virtual desktop login behaviors, and it is difficult to audit illegal login behaviors. virtual desktop operation behaviors lack control and it is difficult to audit illegal operations.
During operations on key devices (servers and confidential machines), the operator records the screen recording of these operations. When recording screen images, the screen element information is also recorded; on the server, auditors can view audit records for auditing.
650) This. width = 650; "style =" clear: Both; border-Right: 0px; border-top: 0px; margin-bottom: 8px; Vertical-align: Top; border-left: 0px; border-bottom: 0px; "src =" http://a.hiphotos.bdimg.com/album/pic/item/37d3d539b6003af352ad1856362ac65c1038b6f5.jpg "width =" 574 "alt =" 37d3d539b6003af352ad1856362ac65c1038b6f5 "/>
Figure 4 screen Audit
This technical difficulty is: Screening unnecessary audit records, removing invalid data, saving storage space; compressing audit images with a high compression rate to improve storage efficiency; how can I search and tag images on the screen? This prevents auditors from quickly and effectively locating a pile of image data.
3. Main challenges facing the development trend of desktop cloud Management
The Development Trend of desktop cloud management technology is: to achieve an automated desktop cloud it O & M management platform, to help enterprises achieve user-independent resource allocation, and to analyze system faults automatically.
3.1. Implement the user's own Portal
The automation of desktop cloud applications reduces the workload of administrators in creating, allocating, and revoking virtual machines. The automatic workflow engine automates the creation of workflows Based on the operations required by the existing administrator to implement the IT solidification workflow engine and the user's OA system, as well as the virtual management layer (xenserver, ESX host, etc, allocate, modify, or recycle virtual machines.
3.2. achieve unified access authentication for the virtualization backend
Use a unified access authentication system. User networks are isolated before user authentication. After Authentication, only the corresponding virtual desktop network can be accessed to avoid unauthorized access. Network Access allows you to isolate and authenticate your network. You can log on to your virtual desktop after network authentication, it also guarantees the user experience.
3.3. automatically discover and analyze problems in the current environment
By monitoring the virtualized environment, you can intuitively view the overall running status of the current system, automatically discover and analyze problems in the current environment, and achieve automated problem analysis.
This article from the "Guangzhou Yuwen technology" blog, please be sure to keep this source http://gzyuwen.blog.51cto.com/9215178/1533609