You are on page 1of 52

Deploying Cloud Based Services

Colin Li colli@cisco.com lli@ i Consulting Solution Architect Asia Pac CTO office

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

1. What are the top applications or workloads that you see

customers moving (or consider moving) to a cloud ?


a) b) c) ) d) Virtual Desktop Development and/or Test Environments Disaster recovery environment y All of the above

2. 2 What are the top concerns for your customers to move to a

cloud?
a) b) c) d) Economic Benefits Unclear (e.g. TCO) Security Concerns Loss of Control Application Migration

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Cloud Defined
IT resources and services that are abstracted from the underlying infrastructure provided on ondemand and at scale in a multi-tenant environment
Essential Characteristics
On-Demand Self Service Measured Service Rapid Elasticity p y

Broad Network Access

Resource Pooling

Service Models

Software as a Service (SaaS)

Platform as a Service (PaaS)

Infrastucture as a Service (IaaS)

Deployment Models

Public

Private

Hybrid

Community

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

Cisco IaaS Cloud Services VMDC 2.0


Solution Architecture A Systems Approach y pp
Application Software App 1
App App OS

Virtual Machine

VSwitch

Storage & SAN

Compute

Access

Services

Core/Agg.

Peering

IP-NGN Backbone

Subscriber A Application 1 Subscriber B Application 1 App 1 Subscriber A Application 2 App 2

App OS

OS

App App App OS App App App OS OS OS OS OS

Internet

IP-NGN

Subscriber B Application 2 App 2


App App App OS OS OS

Partners

ACE

Subscriber C Application 2 App 2 Cisco and Third-Party Applications

FW
App App App OS OS OS

10G Ethernet 10G FCoE 4G FC 1G Ethernet VM to vSwitch vSwitch to HW App to HW / VM

Nexus 1000v SAN Switches Rack Servers Nexus 5000 ( Salaak ( 1.0 )) Salaak 1.0 ) MDS ( Salaak UCS ( Salaak 1.1) 1.1 ) 2010 Cisco and/or its affiliates. All rights reserved. Consolidated Storage VMWare Vspehere 4 ESX 4

Cat 6500 VSS as Services Chassis)

Nexus 7000

7600 CRS ASR9k

L2, L3 MPLS Internet

Cisco Confidential

On-Demand Consumption

Autoprovisioningofallvirtualmachineattributes throughconvergedinfrastructuremanagement Virtualization aware network/storage/compute Virtualizationawarenetwork/storage/compute automationenabledbyNexus,MDSandUCS Flexibledesigntoenabledifferentclassesofservicefor differenttenants TrafficisolationviadynamicprovisioningofVLANs, VRFs,ACLs,andVirtualDataCenters VRFs ACLs and Virtual Data Centers ProvenDataCenteroftheFutureandNextGeneration Networkingscalability N t ki l bilit AddCapacitytotheSystemasaWhole,NOT Individually,ServiceByService

Multi-Tenant Architecture

Capacity C it At Scale

DifferentiationBeginsWithGreatInfrastructure.
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5

Attributes no longer tied to physical hardware


Not just identity Seamless server mobility Within interconnect domain

SAN

LAN

Dynamic Provisioning y g
Complete infrastructure repurposing Integrated with 3rd part tools

Server Name: LS-A UUID: UUID 56 4dcd3f 59 5b 61 61 MAC : 08:00:69:02:01:FC WWN: 5080020000075740 Boot Order: SAN, LAN

Chassis-1/Blade-5

Chassis-9/Blade-2
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6

VirtualizedNetwork
Layer 3virtualizationwithVRFs Layer3 virtualization with VRFs Layer2virtualizationwithvlans,otherencaps Servicevirtualizationwithvirtualcontexts VMlevelgranularity&advancednetworking features Virtualizationawarecomputefabric Networkadaptervirtualization VSANs

Data base

Web

App

nNICs

mHBAs

VIC
2 x 10G ports

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

NetworkContainer:AbstractstheServicePath
Touchpoints: per-tenant variables/logical boundaries (IP Address blocks, VLANS, VRFs, VDCs) & virtual services (security vFWs or LB contexts) ( y )
IP/NGN Backbone CRS BGP
P E CE

Branch or Campus network

Customer Red Customer Green Customer Blue

L3orL2VPN Access

N7k Core

BGP
N7k AggVRF

Eachtenantcontainedina uniqueVRF
FW Outer VLAN
FW Inner VLAN, ACE Outside VLAN

BGP
DSN VSS Pair

Vlan/vrfmapstounique VirtualFW/loadbalancer

Static
N7k Acc VRF

L3 L2
Data base VM VLANs Data base (N1k) Data 2010 Cisco and/or its affiliates. All rights reserved. base App App App Web Web Web

TenantVRFmapstounique Tenant VRF maps to unique vlans VLAN perapplicationtier


Cisco Confidential 8

Add Capacity For System Not Single Service System, Capa acity Consumed
Available Capacity
Service 1

Available Capacity

Service 2

Service 3

Service 4

Time Ti

Added infrastructure is dynamically discovered, and comes online to meet any required demand.

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

On-Demand Consumption p

Autoprovisioningofallvirtualmachineattributes throughconvergedinfrastructuremanagement Virtualizationaware network/storage/compute Virtualization awarenetwork/storage/compute automationenabledbyNexus,MDSandUCS Flexibledesigntoenabledifferentclassesofservice fordifferenttenants TrafficisolationviadynamicprovisioningofVLANs, VRFs,ACLs,andVirtualDataCenters ProvenDataCenteroftheFutureandNextGeneration Networkingscalability Networking scalability AddCapacitytotheSystemasaWhole,NOT Individually,ServiceByService

Multi-Tenant Architecture

Capacity At Scale

DifferentiationBeginsWithGreatInfrastructure.
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

MultiTenancyPathIsolation MultiTenancyPathIsolation
Each tenant is logically isolated from the others using VRF as a container Dedicated logical instances of vrf,vlan,fw,SLB etc .. for each tenant to provide security , privacy and policy control Customer=VRF Customer=VRF VRFBlue VRFPurple

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

11

Service Class Details


3 WorkloadTypes Large yp g VMpercore Differentiated QoS,Network QoS Network Svcs. Backup DataProtection D P i 1:1ov 8VMsperserver Gold:40%BWReservation,CoS 5 FW,SLB,SSLOffload RetentionLength 1m,6m,1y Clone Mi Cl Mirrorcopy(localsite) (l l i ) SNAPcopiesevery4hr;36hr retention Remotereplication SRDF Medium 2:1ov 16VMsperserver Silver:30%BWReservation, CoS 2 SLB,SSLOffload RetentionLength 1m,6m,1y Snap Vi S Virtualcopy(localsite) l (l l i ) SNAPcopiesevery8hr;36hr retention Remotereplication SRDF Small 4:1ov 32VMs perserver Bronze:20%BWRes., CoS 0 RetentionLength 1m,6m,1y none

Disaster Recovery

none

3Differentstorage& RAMsizes RAM sizes

Large g 300 16 50 50

Medium 150 8 50 50

Small 50 4 50 50

Storage(GB) RAM(GB) StorageGrowth Storage Growth Increments(GB)


2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

12

Pre-packaged NW Services as Containers


Silver Multiple VLANs Bronze VPN Offload Firewall LB, 1 VLAN Gold Multiple VLANs VPN Offload Firewall SLB & SSL offload System Configs

System Configs

Virtual FW + pVLANs

Virtual FW + pVLANs Virtual FW + pVLANs

Shared VMFS, No Data Protection


2010 Cisco and/or its affiliates. All rights reserved.

Dedicated VMFS, DP via Snapshots

Dedicated VMFS, 100% DP, Cloning


Cisco Confidential 13

Network Services Automation


Logical Topology

Self Provisioning Once complex and manual process are automated Provides the customer with a fully segmented environment Elimination of administrative errors through service automation Removal of manual resource usage documentation and tracking Reduction in service deployment time Minimizing the intergroup coordination of technologies Abstraction of complexities from the user

Customer 1

Step 1: Create Network Container

Customer 2

Service Provider Load Balancer Pool Create MPLS Backbone


web db

Step Optional:

Customer 1

app

Step 2 & 3: Bulk VM create Individual VM create

Logical T L i l Topology l

Step 1: Create Network Container


Step Optional: Load Balancer Pool Create

Customer 2

web

db

app

Step 2 & 3: Bulk VM create Individual VM create Physical Topology


2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

Common Physical Infrastructure


Routers R t

Infrastructure Service Management Software


Network Manager

Data Center Fabric Cisco

Compute Manager Orchestration Engine User Portal & Service Catalog

Virtualized Resources Compute Network Storage

Virtualized Resources Compute Network Storage

Storage Manager

Pod
2010 Cisco and/or its affiliates. All rights reserved.

Pod

Virtualization Manager

Cisco + Partners (e.g. VCE)

BMC
Cisco Confidential 15

Pods =Physically assignedResources

NetworkContainers Virtuallyandsecurely isolatedbytenant isolated by tenant withinaPod UniqueBenefit:Logical Multi tenancy Multitenancy allowscreationof onetomanyzones

Zones Contain Customizedpolicy Customized policy basedworkloads UniqueBenefit: CLMpolicydriven CLM policy driven placementmakes decisiononbest resourceplacement.

UCS Manager for the Unified Computing System


2010 Cisco and/or its affiliates. All rights reserved.

Cisco Switching Platforms

Cloud Lifecycle Management


Cisco Confidential 16

BMC CLM configures and places services within Network Containers and Zones

Full Stack Provisioning (hardware to business application) from Days to Minutes


2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

BMC CLM 1.01 System Test Results


Average 10-15 minutes to config containers

E2E
Automation of over 200 command lines per

container
10 requests in queue at same time Injected physical and logical error conditions Troubleshooting with trace capabilities 90% HA coverage, improve in next release De-provisioning and resource reclamation Base product, production quality

Provisioning: Average 15-20 minutes. Bronze3 - Start - End: 5:20:19 PM - 5:38:56 PM Bronze2 - Start - End: 5:20:11 PM - 5:36:45 PM WedDeepika - Start - End: 5:19:50 PM - 5:49:23 PM WedBronze1 - Start - End: 5:19:49 PM - 5:34:19 PM WedDeepika2 - Start - End: 5:19:44 PM - 5:51:19 PM WedBronze4 - Start - End: 5:19:40 PM - 5:32:08 PM WedDeepika3:- Start - End: 5:19:38 PM - 5:47:09 PM WedGold3 Start End: 5:21:12 W dG ld3 - St t - E d 5 21 12 PM - 5 55 11 PM 5:55:11 WedGold2 - Start - End: 5:22:20 PM - 5:44:01 PM WedGold1 - Start - End: 5:21:32 PM - 5:46:18 PM

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

18

On-Demand Consumption

A t Autoprovisioningofallvirtualmachineattributes ii i f ll i t l hi tt ib t throughconvergedinfrastructuremanagement Virtualizationawarenetwork/storage/compute automationenabledbyNexus,MDSandUCS Flexibledesigntoenabledifferentclassesofservicefor differenttenants different tenants TrafficisolationviadynamicprovisioningofVLANs, VRFs,ACLs,andVirtualDataCenters ProvenDataCenteroftheFutureandNextGeneration Networkingscalability g y AddCapacitytotheSystemasaWhole,NOT Individually,ServiceByService

Multi-Tenant M lti T t Architecture

Capacity At Scale

DifferentiationBeginsWithGreatInfrastructure.
2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19

Foundation: Pre-Integrated Systems


PODisabuildingblock,comprisingcompute,storageandnetworkresources.
Scalable repeatable and homogeneous Scalable,repeatableandhomogeneous construct EachPodisdiscoveredbythesystem,integrated intotheresourcepools,andassignedworkloads asneeded.

NAS

NAS

SAN UCS61xx

UCS61xx

SAN

........

BasePOD
2010 Cisco and/or its affiliates. All rights reserved.

PODn
Cisco Confidential 20

POD Combinations 2sizesandEachwith2combinations


Large 512servers 10GEwith 10 GE ith SAN&NAS 1GEwith SAN&NAS SAN & NAS
2010 Cisco and/or its affiliates. All rights reserved.

Compact 64servers 10GEwith 0G i h SAN&NAS 1GE with SAN&NAS SAN & NAS
Cisco Confidential 21

Compact POD sizing


Access Nexus 5020 NAS

64serverPODCharacteristics
2 UCS clusters, each of 32 blades 64 x B200 Blade server @ 96GB RAM 512 Cores 512 Gold VMs 1vCore per VM (1:1) ov 1024 SilverVMs 0.50vCore per VM (2:1) ov 2048 Bronze VMs 0 25vCore per VM(4:1) ov 0.25vCore 5-9 VMs/VLAN

UCS61xx

SAN

64servers

Combination of all 3 workload types in a POD NoofCores NoofVMs Large,20% Medium,30% Small,50% 102 154 256 TotalVMs
2010 Cisco and/or its affiliates. All rights reserved.

102(1:1ov) 308(2:1ov) 1024(4:1ov) 1434


Cisco Confidential 22

Phase 2 Architecture Principles


Minimumof64servers,4,096VMs . Theoreticalmaximumof384servers, 24,572VMs
Core/Aggregation Nexus 7010

Access Nexus 5020

NAS

Access Nexus 5020

NAS

UCS61xx

SAN

UCS61xx

SAN

........
64server,4,096VMs 64 server 4 096 VMs

POD1 POD 1

64server,24,572VMs 64 server 24 572 VMs

POD6 POD 6
Cisco Confidential 23

MaximumscalabilityisdependentontheCore/aggmacaddresslimitof 128K
2010 Cisco and/or its affiliates. All rights reserved.

Large POD sizing


NAS

512serverPODCharacteristics
8x8-chassis UCS systems (Vblock Type 2 Max) 8 blades/ESX cluster 512 x B200 Blade server @ 96GB RAM 4,096 4 096 Cores 816 Large VMs1vCore per VM (1:1) ov 2,464 Med. VMs0.50vCore per VM (2:1) ov 8,192 Sm. VMs0.25vCore per VM(4:1) ov ( ) 5-9 VMs/VLAN in lab (1/8th of a pod in lab) 500-1000 tenants = 12-23 VMs/VLAN

UCS61xx

SAN

512servers

POD1

Combination of all 3 workload types in a POD yp NoofCores NoofVMs Large,20% Medium,30% Small,50% 816 1,232 2,048 TotalVMs
2010 Cisco and/or its affiliates. All rights reserved.

816(1:1ov) 2,464(2:1ov) 8,192(4:1ov) 11,472


Cisco Confidential 24

Phase 2 Architecture Principles


Minimumof512servers. TheoreticalMaximumof3,672servers,98,304 VMs VM
Core Nexus 7010

Access/Aggregation Nexus 7018

NAS

Access/Aggregation Nexus 7018

NAS

UCS61xx

SAN

UCS61xx

SAN

........
512server,16,384VMs
2010 Cisco and/or its affiliates. All rights reserved.

POD1

512server,16,384VMs

POD6
Cisco Confidential 25

MaximumscalabilityisafunctionofCoreportdensity:7018wouldallowforfurtherL2scale.

1. What are the most important Cloud features for your

organization ?
a) b) c) ) d) Cloud Management /Orchestration Scalability On demand / Elasticity y All of the above

2. 2 What do you believe are the main benefits of an Integrated

Solution VMDC 2.0


a) b) c) d) Reduce Integration Cost See before You buy Single point of Responsibility All of Above

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

26

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

27

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

28

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

29

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

30

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

31

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

32

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

33

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

34

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

35

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

36

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

37

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

38

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

39

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

40

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

41

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

42

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

43

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

44

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

45

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

46

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

47

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

48

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

49

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

50

Enterprise IT Capability
App App App OS OS OS Virtual Data Center Application Security Services Virtual Data App App Center App OS OS OS Application Security Services App App App OS OS OS App App App OS OS OS

Cloud OS

Cloud OS

Network Services (Security, Performance, Monitoring) Network Transport Virtualization (VPN) IP-NGN

Enterprise Network

Network Service Provider

Cloud Service Provider

Cisco is the only systems vendor with value-add solutions for the entire cloud computing infrastructure ecosystem. p g y

2010 Cisco and/or its affiliates. All rights reserved.

Cisco Confidential

51

Thank you.
colli@cisco.com @

You might also like