Cloud World Congress Cloud Learning Link: The first game Vsphare

Source: Internet
Author: User
Keywords We very through can server

Today we're going to introduce Vsphare, starting with the entire third generation suite, with a virtualization consolidation ratio of around 30%.

By 2010 to reach 40%, and now the fifth generation of precipitation can achieve more than 50% of the integration efficiency.

For now, all the virtualization consolidation is accelerating, because customers have realized the benefits of virtualization, the benefits of cloud computing, so the entire virtualization is expanding, the fifth generation of Vsphare has been very optimized.

This diagram is the main feature of the fifth version of the cloud computing platform, most notably VSPHARE5,SRM can provide higher node disaster tolerance. Vcenter operations is monitoring and management, VShield Security brings the marginalization of virtualization.

We used to provide some private cloud services, the so-called private cloud is in the enterprise's data center, by creating a virtualized platform to integrate all the virtual machines. A large number of operators adopt the public cloud approach, and Vsphare provides the concept of a hybrid cloud, not just a private cloud, but a public-cloud architecture in which all integration is done through the packages just mentioned.

So it's simple to just be a private cloud, because it doesn't have to be about security. If all these resources are moved from the private cloud to the public cloud, the boundary becomes a big problem, putting all the resources in a lock and protecting it so that our resources can run in the public cloud, or run into the private cloud, Running into a private cloud, its information security is very good. Operators like Singapore Telecom are using our virtualization platform to implement their public cloud services.

How do we do this cloud computing platform, we have a lot of servers, a lot of storage, many networks, first through the Vsphare integration platform, all the resources are pooled, server virtualization, storage for virtualization, into storage resources, the network again virtualization, made into port groups and virtual switches. After the completion, we will continue to classify all our resources, we can divide it into the gold level, silver grade, copper grade and so on, we have a customer come, need to lease on the cloud computing platform, how they do, all of their resources can be divided into gold, silver grade, copper class into our virtual machine inside, On the specified storage, the specified port group is driven by policy, and the administrator only needs to make a strategy that will increase speed and be much better than the original. We need to confidently deploy, confidently deploy, and our previous applications are still running well on top.

The second issue requires a quicker deployment of our applications.

The third issue is security and reliability, which is a problem we need to consider throughout the cloud.

Confident deployment of our key business, we look at this picture, this picture is very interesting, through our diagram we can see the first generation, the second generation, the third generation, the fourth generation to the fifth generation of products can support capacity, to the fifth generation of products have a very big change, vsphare What is the number of CPUs that we can support with a virtual machine? 32 CPU, a T memory, 4 times times larger than before, we can imagine a problem, 32 CPU is a what concept? A CPU corresponds to a kernel on a physical machine, and 32 CPUs are 32 cores, equivalent to 438 of servers.

This picture is Jurassic Park, Jurassic Park, the entire graphics, is made on 15 computers, what is the equivalent for us now? The ability of a virtual machine. If a database needs to process 2 million of large databases each year, in fact, a virtual machine can achieve this ability. Do not look at this virtual machine, now a virtual machine has been able to do huge processing power, the virtual machine has been very very strong. In 2010, many customers have put his key business, file services, mail services, are deployed to the virtualization platform, this is our 2010 and 2011 transfer, to 2011 after the big difference, there is a big increase. In fact, to give you a confidence that the current product has been able to be a lot of key business, the current virtualization platform has been supporting a lot of key business to do this thing.

Before our Vsphare platform is EFX, now became ESXi, the whole core only 144 trillion, means that he was attacked a smaller area, more secure, the need for a smaller patch data, more classic, running more efficient. The new platform is not just a virtualization platform, but in fact, when we integrate, there is a FIM disaster management, we all know that in a data center we can get through the embedded high availability platform. A data center is on fire, or floods, for a data center need to shut down, we can move the entire production to the backup center, we not only to achieve through the storage method of data replication, but also through software methods to replicate data, to the far end, so that low-end storage can also achieve disaster recovery function.

When there is a problem with the primary site, the backup site takes over and the production site recovers, we can recover. At present these products, many ISVs, as well as large software vendors, Microsoft has been fully explained in the official, the use of our products. VSA is also our new feature in the inside, people familiar with our products know that we have a lot of high-performance features, need to share storage, for a small customer to buy shared storage is more expensive, at least fifty thousand or sixty thousand dollars, the money to find ways to save, with the way of the site, you can see the dark blue part of this, We built a shared storage of NIS on our own site. If you have problems with shared storage through other products, when a server fails, after a problem, the other two servers are not stored, and VSA provides data replication to achieve a highly available feature, for our small business, we can move the VSA products, to use the method of the site, Achieve some shared disk functionality. Implementation is very simple, click five times can be configured, through the local disk can complete the shared disk shared storage function.

Another quick-fail business requirement is rapid deployment. Many of our businesses need to be fast online, especially in some development, in some production need rapid change, rapid deployment, you can see the test development, many times I need a virtual machine, you quickly to do it, I need to test an Oracle database, and the production system our configuration not to do repeatedly, we change to be effective, so that we can control his whole change process. By linking the clones, everyone knows that a virtual machine is an operating system, a number of virtual machines are several operating systems, each virtual machine basic operating files are the same, if you use traditional files, 20 windows, need to store 20 copies, the way to clone with a link is that you have a template, The so-called replication is incremental replication, two virtual machines are different, it is not the same address. Your administrator is an IT administrator, not a cloud platform administrator, one of your administrators deployed virtual, need to deploy this virtual machine to which physical server, which storage, which network, need to do all the changes step by step, And on top of our cloud platform, you're a cloud administrator. You don't need to know the underlying physical details, the entire share will be very fast.

Just now we have seen the integration of resources into different resource pools, if the customer has a server, his so-called VSA needs 4 9 availability, only the first Gold level resource pool can be met, it is easy to deploy the virtual machine to the first resource pool, according to your strategy, according to your SOA requirements to deploy the virtual machine, At the same time, there is a disaster backup on our platform to complete your entire business protection.

At first it is deployment, after deployment is almost monitored, in case, before the disaster, can be early warning, we take measures in advance, what is the same time? It is through our DRS that we are able to dynamically distribute our resources to other platforms. We used to have a mainframe, now there is a storage and network, can have three virtual machines, one virtual machine is mail storage, another virtual machine is a Transaction server, there is a virtual machine is a report server, Report server needs to analyze data for a long time, in the report server at work, Your mail servers and trading servers enjoy a limited amount of bandwidth, in which case we have to increase the priority of the mail server and the Transaction Server and increase efficiency by limiting the SLA.

Further down is to achieve high availability, our entire product can be the network card, storage to switch, if a server changed, through ha and FT to achieve rapid business recovery. If you have problems with your entire site, you can also recover through ha and Ft.

Automatic deployment, take a CD-ROM installed to our PC server, 1.1 installation, after the installed to do a lot of configuration, create virtual switches, many VLANs, as well as a series of network card patches to do. If you make a configuration file, after you install a server, all configurations will be deployed, you can quickly have a cloud computing platform, the original is two, now very easy to become three, if the server a lot of circumstances, a single installation, each machine needs 30 minutes, it takes 20 hours to complete data installation. It takes 10 minutes to make a standard virtual machine and then deploy it in a calculated form. In making some blade servers, you can save a lot of time by doing very similar configurations of server installations.

Finally, the reliable cloud, we do a lot of security in the cloud on the adjustment, security enhancements. Most of the time when it comes to public cloud, a lot of customers are very worried about security, let's take a look at how vsphare to achieve this part of the content, this picture is just very simple to put our Vsphare app. If I am a public cloud service provider, this batch of PC servers are not used by a certain customer or a few customers, there may be a large number of customers to implement resource scheduling, many different enterprises their virtual machines run on the same platform, both sharing and security, we let them logically isolate, he used the Vsphare App's function, also within the enterprise may have a financial system, there is a Web server, application server, as well as a database server, through ordinary users only need to access the Web server, application server and database server, although all within the network, but we can not access. In addition, Vsphare app can also make a lot of strategy, put some security hidden files, virtual machine isolation, isolation and protection, in this way to achieve compliance-level inspection.

The last is Vsphare, with the virtualization platform, anti-virus becomes easier, we put anti-virus software outside the virtual machine, through the virtual machine to open for virus scanning, after scanning all the virus-sweeping load, from the virtual machine inside down, put to the periphery of the sweep virus inside, With many methods of virus manufacturers have a good cooperation, to achieve such a process.

This is what we call the Cloud's base suite, the first is the confidence to deploy the application, he is able to achieve through our vsphare, can support to 32 CPUs, a T memory, can be a large number of mega applications, including many database applications into a virtualized platform.

Second, high availability, through HA, FT technology, to ensure our availability, through disaster tolerance system, to ensure the availability of the site.

Third, the degree of responsiveness of agile.

Four, reliable cloud, through Vsphare a series of products to ensure high security and isolation, through the Vsphare app intrusion, anti-virus function, through the Vsphare network in Iosa limit, limited remember limit, to ensure the key business of their own iosa.

(Responsible editor: Duqing first)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.