In the last two days, our team worked together to complete the virtualization Simulation Drill project.
Drill method:Simulated drills in the test environment
Drill personnel:In group (4 persons)
Drill cycle:Two days
Schedule:The 1th day will be discussed by the group and an integrated implementation scheme will be developed. At three o'clock P.M., the group representative will introduce the scheme. 2th day morning, the team carried out the integration implementation work, and checked and discussed the implementation results at three o'clock P.M.
Drill requirements:
1. Be able to elaborate on the implementation scheme and architecture;
2. meet customer needs;
3. completed within the specified time
Project Background
To improve the operating efficiency and reliability of the IT system, a company purchases a new batch of PC servers to meet the daily work of the company's marketing department, ERP department, and R & D center. The total investment is 0.3 million RMB, of which the marketing department shares 0.15 million RMB, and the ERP and R & D center shares 0.15 million RMB. Currently, all devices have arrived, and the IT Support Service Department is required to mount, install, and configure devices as needed.
Arrival status: 1 c2core 6 GB memory 10 Gb Storage Server 2
1 c2core GB memory 10 Gb Storage Server 2
All IP addresses allocated by four users for external storage of 150 GB
Note: VC and Apsara stack can be directly installed on wk, but the resources used must be subtracted from the total resources. resources must be allocated again and cannot be used in the experiment environment.
Lab requirements
1. virtual machines can achieve dynamic migration.
2. virtual machines can implement failover.
3. Three marketing department administrators (WINXP environment );
Three ERP Department administrators (win2k3 and winxp2 );
2 R & D center administrators (WINXP/Linux );
Each administrator must have at least one virtual machine;
6. The use of system resources is proportional to the Department investment.
7. The virtual machines allocated by the R & D center must be started in sequence.
8. Each department has an administrator account, but only the resources of this department can be managed.
9. When the resource pool CPU usage exceeds 75%, an alarm is triggered.
10. resource pools can only be accessed through VC, but cannot be accessed directly from esxi hosts.
11. The VM ensures time synchronization with esxi.
12. The resource pool can implement distributed resource scheduling.
Lab plan
Project architecture:
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M00/48/5A/wKiom1QHEv-Q6MQcAADu5FLxwAk049.jpg "Title =" 1.jpg" alt = "wKiom1QHEv-Q6MQcAADu5FLxwAk049.jpg"/>
Division of labor and lab environment planning:
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/48/5A/wKiom1QHFR6iIttWAADRIrE2gSY172.jpg "Title =" 4.jpg" alt = "wkiom1qhfr6iittwaadrire2gsy172.jpg"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/48/5A/wKiom1QHFRixu1hyAAD-MNzgsRk349.jpg "Title =" 2.jpg" alt = "wKiom1QHFRixu1hyAAD-MNzgsRk349.jpg"/>
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M02/48/5C/wKioL1QHFSHjHKQZAAFAtfni5zk210.jpg "Title =" 3.jpg" alt = "wkiol1qhfshjhkqzaafatfni5zk210.jpg"/>
Implementation steps:
1. Set the IP addresses of each device.
2. Add a network card for each esxi instance and vcenter to establish a distributed network.
3. Use Apsara stack to provide shared storage NFS (150 GB) for vcenter)
4. Create a virtual machine in the vcenter cluster resource pool vapp
5. Solve the accesscontrol (access and identity control permissions) Problem: department administrators can only access their own departments; cannot directly access esxi hosts; resource pools can only be accessed through vcenter
6. Implement ha, DRS, and alarm Functions
With the cooperation of four people in our group, we completed the project implementation within the specified time, but there are still some places that violate the experimental requirements and do not use the specified memory experiment, which exceeds the allocation limit; no lab report is written. These two points are the key points of a project. When the memory is exceeded, the high availability and security of the virtual machine will be affected. If no reports are provided, the operations of other engineers during maintenance will be affected. These two points I learned in this experiment.
This article from the "Gao Songtao-genie on the road" blog, please be sure to keep this source http://gaoxin1993.blog.51cto.com/9151134/1548492
Virtualization case Simulation Drill