Professional Documents
Culture Documents
Agenda
Trace3 Intro Define Your X NetApp Global Dynamic Lab Whats New with vSphere 4.1? Why NetApp? Whats New with View 4.5? Wyse Thin Clients Best Practices for VMware View
page 2 |
2010 Trace3. Proprietary and Confidential.
Who is Trace3?
Trace3 is a Systems Integrator focused on meeting the needs of companies looking for proven solutions in the following areas:
page 3 |
2010 Trace3. Proprietary and Confidential.
Trace3 Locations
Seattle
Portland
San Francisco
Reno
Trace3 Regions
LA OC SD
page 4 |
page 5 |
page 6 |
Define Your
page 7 |
page 8 |
Whats your X ?
page 9 |
Defining your X
Understand your Business Requirements Build a Business Case Dont focus on Cost or Technology Define Success
page 10 |
page 11 |
page 12 |
Your X Defined
Secure Anytime Anyplace Any device Automated Provisioning Private Cloud
VMware vSphere
VMware vSphere
page 13 |
Servers?!
Intel Core 2 Duo
Think Xeon 7500/5500
Large Rackmount
Think Blade Chassis
8-16 GB RAM
Think 32GB+ of RAM
L I A F
page 14 |
Network?!
100mb Hubs?
Think 10GB Ethernet
Individual Interfaces
Think VLAN Trunking
L I A F
page 15 |
Storage?!
Direct Attached Disk
Think NAS/SAN
FC vs iSCSI or NFS
Think NFS or iSCSI
L I A F
Best Practices for running VMware vSphere on Network Attached Storage http://vmware.com/files/pdf/techpaper/VMware-NFS-BestPractices-WP-EN.pdf
page 16 |
2010 Trace3. Proprietary and Confidential.
Desktops
High End Graphics
Keep Standalone
CPU Intensive
Keep Standalone
L I A F
page 17 |
Cost!?
VDI is cheaper than Traditional Desktops
Think Again
page 18 |
page 19 |
Agenda
Project Overview Partner Collaboration The Pod Based Architecture Solution Components Benefits of shared storage in VDI Value to customer
page 20 |
page 21 |
Hypervisor, Server, Network, Storage, Thin Clients View 4.5, Windows 7 VMware RAWC tool
page 22 |
Connection Broker
Hypervisor
page 23 |
Management Architecture
VMware View 4.5 3 Connection Brokers (5000 Desktops) VMware View 4.5 VMware View 4.5
HA / DRS Cluster
HA / DRS Cluster
HA / DRS Cluster
HA / DRS Cluster
page 24 |
W h a t N e tA p p T e ch n o l g y w a s u se d o
M a n a g e m e n t & D e p l ym e n t o
V S C 2 .0
P e rfo rm a n ce
D e d u p l ca ti n i o Fl sh C a ch e a T ra n sp a re n t S to ra g e C a ch e S h a ri g n
C o st E ffe cti n e ss ve
D e d u p l ca ti n & S to ra g e E ffi e n t C l n i g i o ci o n
page 26 |
A ch i ve si n i ca n t co st re d u cti n s e g fi o
Users @ 25GB Number of NetApp Gold Datastores Number of Datastores Traditional Traditional Storage Requirement NetApp Storage Needed NetApp Storage Savings NetApp Storage Savings
250 1 1 6 TB 74 GB 6 TB 99 %
Virtual Desktops
page 28 |
2010 Trace3. Proprietary and Confidential.
50 , 000
Summary
Proof-point for integrated technologies Example of collaborative partnerships Validation of multi-vendor solution Reference architecture as starting point
page 29 |
NetApp Video
page 30 |
page 31 |
Management
Decrease operating expense Manage SLAs , not components Automate the mundane , simplify the complex
Business Continuity
Ensure high availability at low cost Recover quickly and efficiently Guarantee service levels App Dev
Desktop Solutions
Enabling desktop as a service
User access across boundaries Desktop as a service , without the headache Increase security and control
Cloud Services
Enabling the bridge to the external cloud
& Test
Single way to run , manage and secure applications both internal and via external clouds Broadest choice of leading cloud service providers
VMware vSphere
page 32 |
s c i v r e S
n o t a c i l p A
AD Integratio n (host)
Availabi lity
Security
Scalabil ity
vNetwork
Network I/O Control Load Based Teaming IPv6 NIST Performance +
page 33 |
3,000 VMs / cluster (2x) 500 hosts / vCenter (5x) 10,000 VMs / vCenter (3x)
99% of VMwares 170K Customers Can Run Their Entire Datacenter in a Single VMware Cluster*
page 34 |
2010 Trace3. Proprietary and Confidential.
E n h a n ce d S ca l b i i D e fi e d a l ty n
vSphere 4 vSphere 4 . 1 Ratio
VMs per host Hosts per cluster VMs per cluster Hosts per VC
Registered VMs per VC 4500 Powered - On VMs per VC 3000 Concurrent VI Clients 30 Hosts per DC VMs per DC
100 2500
page 35 |
http://www.vmware.com/products/vsphere/esxi-upg /
page 36 |
2010 Trace3. Proprietary and Confidential.
page 37 |
Two Options
1. vCenter Server in a virtual machine running 64-bit Windows OS
page 38 |
2010 Trace3. Proprietary and Confidential.
Benefits
Basic - Make storage access rights equal between VMs Advanced - Prioritize use of storage (similar to how compute is prioritized with vSphere) per VM Business priorities now define low and high priority storage resource access Create the high speed or HOV lane for VMs
Beta Feedback
I really feel that the Storage I/O Control is a must have for our environment and we should move forward without delay.
Proof Point
1 . All VMs created equal Guarantee service levels for access to storage resources
page 39 |
2010 Trace3. Proprietary and Confidential.
32GHz 16GB
Datastore A
page 40 |
Benefits
Granular storage reporting for improved tuning and troubleshooting performance Independent of storage architectures and protocols
Beta Feedback
In the monitoring area, the enhanced storage statistics are very useful
Proof Point
page 41 |
Benefits
Basic - Make network access rights equal between flow types Advanced - Prioritized use of network, especially in 10 Gbit environments Business priorities now define low and high priority network resource access as needed Create the high speed or HOV lane for VMs
iSCSI FT NFS
Beta Feedback
The new Network I/O control feature is very interesting for consolidating network links with 10Gbit.
vMotion
Proof Point
TCP/IP
Distributed Switch
10 GigE
Benefits
Performance and Scalability More Live Migrations in Parallel (up to 8 per host pair) Elapsed time reduced by >4.5x on 10GbE tests
Point
Proof
page 43 |
Memory Compression
Description
A new hierarchy for VMwares memory overcommit technology (a VMware key differentiator)
Benefits
Optimized use of memory Safeguard for using memory overcommit feature with confidence Performance
Beta Feedback
Proof Point OS
Benefits
Tune environment according to availability, performance, and/or licensing requirements Cloud enablement
Beta Feedback
Awesome, we can separate VMs between data centers or blade enclosures with DRS host affinity rules
Proof Point
HA Enhancements
Description
Healthcheck status Operational window Optimized interaction with DRS Application-Aware API Beta Feedback
Major improvements in DRS!
Benefits
Event or alarms when configuration rules are broken No click status (cluster status available at all times) Move VMs to the Best Host Available Application awareness (with supported solution)
Point
Proof
page 46 |
FT Primary VM
FT Seconda ry VM
page 47 |
VMware vSphere
Storage vMotion
Improve Thin Provisioning Disk Performance VMFS Share Storage Pool Scalability
page 48 |
Challenges
Performance impact on host, array, network Long migration time (0.5 - 2.5 hrs for 100GB VM) Best practice: use infrequently
Improved solution
Use arrays native copy/clone functionality
page 49 |
2010 Trace3. Proprietary and Confidential.
42:27 - 39:12 = 2 Min 21 sec w/out (141 seconds) 33:04 - 32:37 = 27 Sec with VAAI 141 sec vs. 27 sec
page 50 |
Challenges
Requires a full data copy 100 GB template (10 GB to copy): 5-20 minutes FT requires additional zeroing of blocks
Improved Solution
Use arrays native copy/clone & zeroing functions
page 51 |
2010 Trace3. Proprietary and Confidential.
C o p yi g D a ta O p ti i d C l n i g w i n m ze o n th VAAI
VMFS directs storage to move data directly Much less time!
Up to 95% reduction
page 52 |
A new VAAI feature, Hardware Assisted Locking (atomic test and set) allows the vSphere host to offload the management of the required locks to the storage and avoids locking the entire VMFS file system.
2010 Trace3. Proprietary and Confidential.
page 53 |
Using Atomic Test and Set (ATS) capability provides an alternate option to use of SCSI reservations to protect the VMFS metadata from being written to by two separate ESX Servers at one time.
page 54 |
page 55 |
Will only support block based storage in 4.1 NetApp Integration with VMware
2010 Trace3. Proprietary and Confidential.
Why NetApp?
page 56 |
Low-to-High Scalability
Unified Management Same tools & processes: learn once, run everywhere Integrated data management Integrated data protection
Multi-Vendor Virtualisation
Cost/Performance
Flash Cache SSD FlexCache
page 58 |
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
D S4243
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
D S4243
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
D S4243
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
D S4243
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
page 59 |
Reduc e
50%
45 0GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
D S4243
4 5 0 GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
D S4243
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
45 0GB
4 5 0 GB
4 5 0 GB
4 5 0 GB
FC Baseline Configuration
page 61 |
VM DISK
VM DISK
VM DISK
Remember NetApp Does the Same with Transparent Page Storage Sharing?
NetApp Deduplication
page 62 |
AND
page 63 |
Set Without Extended BuiltItinto Works And with Data with Forget Migration Flash It! ONTAP ANY Cache Dataset
VM
VM
VM
VM
VM
VM
VM
VM
page 64 |
page 65 |
page 66 |
Exchange 2010
Transparent to Users
Psst Its not file level dedupe and compression
page 68 |
2010 Trace3. Proprietary and Confidential.
page 69 |
page 70 |
page 71 |
page 72 |
page 73 |
page 74 |
Datastore VM VM VM VM
Virtual Machine
Cloning
VM Template Datastore
page 75 |
Datastore VM VM VM VM
Virtual Machine
Redeploy
VM Template Datastore
page 76 |
VMware HA
MetroClu ster
Thin Replication
Building 1
Building 2
DR Site
Issue User error : Data corruption: System or site failure: Regional disasters: Planned Downtime:
page 77 |
2010 Trace3. Proprietary and Confidential.
NetApp Solution End-user recovery (Snapshots ) Instantaneous restores Transparent failover Recover in minutes Zero planned downtime
Application Mobility
Primary Site Secondary Site
AP P O
A A SP S P O O P P S S
AP P O
A P O P S
A P O P S
Use Case
Solution
page 78 |
78
Application Mobility
Primary Site Secondary Site
AP P O
A SP O P S
AP P O
A SP O P S
A P O P S
A P O P S
Host load balancing or maintenance Datastore capacity management Array balancing, maintenance or refresh
page 79 |
2010 Trace3. Proprietary and Confidential.
Use Case
Solution
79
Application Mobility
Primary Site Secondary Site
Application Application data availability access not Impacted over long distances using NetApp can introduce FlexCache latency
AP P O
A SP O P S
AP P O
A SP O P S
A P O P S
A P O P S
A P O P S
Host load balancing or maintenance Datastore capacity management Array balancing, maintenance or refresh Data mobility without affecting availability page 80 | 2010 Trace3. Proprietary and Confidential.
Use Case
VMware VMotion VMware Storage VMotion NetApp Data Motion NetApp, Cisco, VMware Long Distance VMotion
Solution
Dev/QA Environment
Production Environment
Desktop Environment
VMware
VMware
VMware
Secure environments traditionally everything Virtualize require dedicated resources Inefficient and inflexible Costly to deploy Unified computing and manage Low utilization rates Difficult to change Unified fabric one wire How to gain efficiencies of virtualization while maintaining security?
Unified storage
Dev/QA Prod Desktop
Secure Multi-tenancy
page 81 |
Multi-Tenancy
Cloud Administrator
NetApp MultiStore
vFiler vFiler vFiler vFiler
Tenant A
Tenant B
Tenant C
Tenant D
Tenant B
page 82 |
Additional References
VMware View Reference Architecture VMware View
http://www.vmware.com/products/view/
http://www.vmware.com/resources/techresources/10
http://www.vmware.com/files/pdf/resources/VMware_
page 83 |
2010 Trace3. Proprietary and Confidential.
page 84 |
V i a l za ti n & C l u d M a n a g e m e n t rtu i o o
End User Computing
Provision & deploy desktops rapidly Manage workstation images simply Deliver virtualized applications to desktop
Cloud Applications
Encapsulate applications into containers IT Business Managemen with vApps Govern cloud provisioning pr Assure application portability & performance cloud software license Track Establish service contracts with infrastructure Standardize cloud partitions
Application Management
Create a zero-touch, compliant infrastructure Build automation into platform Deliver self-service through policy-driven control
Management
User Experience
PCoIP Print Multi-monitor display Multimedia USB redirection
page 86 |
User Experience
Reduce IT Costs
Management
Platform
page 87 |
Location Based Printing & Awareness Custom display topology with zero clients FIPS140-2 compliance application Port Change to 4172 Improved WAN Performance
Details on next slide
page 88 |
No service degradation when tested with Juniper, F5, OpenVPN, and Cisco SSLVPN solutions
page 90 |
page 93 |
W h a t s ch a n g e d si ce e xp e ri e n ta l n m O ffl n e V D I i ?
Capability
Robust Transfer Infrastructure Centralized Data Control Improved Security
Details
Separate "Transfer Server" instances for scalable download/upload of VM data VM data is optimized, compressed & deduplicated (e.g. no more copying page-file bits) Optional use of 3rd party HTTP proxy caches for optimized provisioning to remote sites View Composer derived base images can be pre-loaded via alternate media
Admin can initiate "replication" of user changes back to server on demand Admin policy enforcement of whether or not users can initiate checkin or replication
Checked out desktops all encrypted with AES (128-bit by default, 256-bit option) SmartCard Authentication Support Admin can remotely revoke end user access to a checked out desktop* Admin can set policy for how frequently a client must get in touch with the server for updates/enforcement (or be deactivated)* Policy controls to allow/disallow access to USB devices like thumb-drives* Delta-Disk replication can be scheduled to occur automatically If client device is subsequently lost/destroyed, desktop can be easily reconstituted from last replicated image
Pools can be configured as "local only" to save on server & storage CAPEX Supports VM provisioning with View Composer Checked out VMs can be based on Linked Clones for further storage cost reduction
Uses latest VMware virtualization platform for great end user experience... High quality multimedia & audio (play HD moves, YouTube videos, etc) 3D with DirectX9c and Windows 7 Aeroglass Effects support Hardware accelerated encryption/decryption with Intel AES-NI capable chipsets Support for Windows 7, XP and Vista host and guest Operating Systems
page 94 |
Rollback
Discard a local desktop and make server side desktop live
Initiate Replication
page 95 |
2010 Trace3. Proprietary and Confidential.
page 96 |
User Experience
Reduce IT Costs
Management
Platform
page 97 |
Scalability
Broker Level
Broker Pod and Teaming Federated Pool Management Floating & Dedicated Pools
Non-Persistent Pool Refresh & Re-Compose
View Composer
Tiered Storage Local Disk Storage Support Disposable Disks All Users directory is no longer copied during customization Thin-Provisioned Disks
page 98 |
2010 Trace3. Proprietary and Confidential.
Desktop Administrator
User location and Filters Individual VM view - Correlation with vCenter
page 99 |
2010 Trace3. Proprietary and Confidential.
Integrated Dashboard UI
page 100 |
page 101 |
page 103 |
SSO
View Client
page 104 |
Faster checkout
ThinApp Management
Feature introduction
Associate ThinApp assignment and delivery at desktop pool level Once entitled, it supports visibility into
ThinApp status on desktops Event auditing
Benefits
Integrates View and ThinApp functionality Providing ease of management and delivery capabilities Dashboard overview of current ThinApps in a client environment
page 106 |
2010 Trace3. Proprietary and Confidential.
View Composer
page 107 |
page 108 |
Sysprep Support
Feature introduction
Support Sysprep and Quickprep for linked clone guest VMs
Why Sysprep
Supported by Microsoft as the only customization method Generates each VM with unique SID Some software (NAC, AV etc) might requires unique SID for licensing control
Restrictions
Once a pool is configured either Sysprep or Quickprep, cannot be changed Sysprep is only supported if the pool is using vSphere mode (homogeneous clusters of 4.0 or higher ESX servers)
page 109 |
2010 Trace3. Proprietary and Confidential.
Sysprep Support
page 110 |
View Manager
Pool must be configured to use vSphere mode
page 112 |
Restrictions
Recreate desktop can only be done with vSphere pools Attach Persistent Disk can only be attached to VMs in vSphere pools By default disks are archived at the root level of the same datastore they are in. This can be changed if only a single disk is archived.
page 113 |
2010 Trace3. Proprietary and Confidential.
page 114 |
User Experience
Reduce IT Costs
Management
Platform
page 115 |
High Performance
Optimized for desktop workloads Performance acceleration due to lower memory swapping
Best Density
Increased desktop VM density 16-20 VMs/core
VM
Persona APP OS
Kernel BIOS
VM
Persona APP OS
Kernel BIOS
VM
Persona APP OS
Kernel BIOS
Hardened
OS
Introspectio n
VMware vSphere
page 117 |
Tiered Storage
What is tiered storage?
Place replicas on a single datastore separate from linked clones The replicas can be shared by all linked clones
Notes
vSphere mode only (All ESX servers are 4.0 or higher) Only a single datastore can be selected for replicas The datastore for replicas must be connected to all ESX hosts in the cluster Use with caution as the replica datastore creates a single point of failure
page 118 |
2010 Trace3. Proprietary and Confidential.
Tiered Storage
page 119 |
page 120 |
Why?
Before, the volume couldnt be reclaimed by VMFS When refreshed on linked clone, it caused persistent data in C:\ drive lost
Benefits:
Provides a zero impact to user and lightweight method to reclaim disk space of OS paging file and temporary files.
page 121 |
page 122 |
page 123 |
Why?
Allows for automation and scripting Provides extensibility to Administration tasks Seamless integration from View to vCenter
page 124 |
2010 Trace3. Proprietary and Confidential.
page 125 |
Automated USB redirection Client info support for in-guest printer mapping ThinPrint GPO enabled for location based printing Use cases: airport check-in, library, amusement park event kiosk, registration desk, ticketing
page 126 |
page 128 |
WYSE
page 129 |
Desktop Thin Clients Lowest power (<7W) Wi-Fi B / G / N Small size Easy mounting 1 2 displays
Mobile Thin Clients Local browser Low power (12W) Wi-Fi B / G / N / BT Projector compatible 1 2 displays
High Performance Thin Clients Specialized or superscalar CPU / GPU Up to 2560 x 1600 res, HD Video Wi-Fi B / G / N BT /
Repurposed PC Thin Client Software For x86 PCs Wyse TC feature set Simplified management Users experience enhancement SUSE Linux-based for reliability, safety
Handheld Thin Client Software For Apple and Android Microsoft TS, RDS, VMware View, Networked PC Server-side browsing Exclusive drawing engine and cursor control
page 130 |
Supports Wyse Collaborative Processing Architecture delivers excellent quality multimedia experience Green - only 13 watts, fan-less Flexible - rich set of ports including DVI-I, audio, USB2, PS/2, serial, parallel Optional PCMCIA, Smart Card and Wi-Fi B/G Available in thin client, zero client and cloud PC models
page 132 |
2010 Trace3. Proprietary and Confidential.
page 133 |
Available in thin client, zero client and cloud PC models R class LE adds:
PCI express expansion
2010 Trace3. Proprietary and Confidential.
R L
R LE
Parallel port
W yse P C E xte n d e r
Software-only thin client Transforms supported PCs into Wyse thin clients Stops the costly management, securing, patching cycle Ideal for virtual desktops Simple deployment and centrally managed R D Multi-protocol support P (Citrix HDX, Microsoft RDP, PCoIP for VMware View, web applications, etc.)
page 135 |
2010 Trace3. Proprietary and Confidential.
Rich features
1.33GHz Intel Atom Z520 processor with Hyper threading 11.6 display with 720p HD video (1366x768) resolution Up to 8 hour battery life 3.2 Lbs. Wireless 802.11 b/g/n (CCX certified)
page 136 |
2010 Trace3. Proprietary and Confidential.
Wyse PocketCloud
For iPhone / iPod Touch, iPad NEW - beta version for Android devices free download VMware View 3.1 and 4.0 Certified Tunneling and FIPS security Desktop, thin browser 3G and Wi-Fi with Wyse exclusive drawing engine Supports high precision mouse, gestures, and auto-keyboard
page 137 |
page 138 |
page 139 |
If you try to take it all down at once, you will not succeed.
page 141 |
2010 Trace3. Proprietary and Confidential.
O MU CH TO O SO ON
2 nd Use Case
Successful Deployment
Wait for the technology to catch up with the other use cases.
page 144 |
2010 Trace3. Proprietary and Confidential.
page 145 |
page 146 |
Perform an Assessment
Assessments are valuable because:
You develop a baseline of your current environment (think before-state) Assessment data enable you to explore multiple scenarios You can quantify your business case in terms of impact and new capabilities (think transformed-state)
Bottom line:
page 147 |
2010 Trace3. Proprietary and Confidential.
Scoping
Costing
Going!
page 148 |
Challenges
IOPS load CPU/Memory load Fringe network conditions Storage footprint
Considerations
Security vulnerabilities User-installed software
page 149 |
2010 Trace3. Proprietary and Confidential.
Data
Disqualification
Devices Networks
page 150 |
2010 Trace3. Proprietary and Confidential.
page 151 |
Virtual Profiles Persistent data disk Roaming profile Third Party: AppSense, LWL Profile Unity, RES PowerFUSE
Transformation
page 153 |
Expected End-User experience, resource consumption at each stage - Dont skip steps!
Avoiding cut-offs
Steps with painful/no regression or remediation
page 155 |
Design Process
page 156 |
DR Design
Design Process
page 157 |
page 158 |
vidends many times more than any other aspect of View design work.
Desktop OS Selection
page 159 |
VM Memory Size
page 160 |
Po o lTyp e
page 161 |
Max Eight ESX hosts per cluster serving linked clones Leave room for failover and maintenance Keep max pool size to 875 for DRS enabled clusters 100 VMs per host for HA
page 162 |
page 163 |
iSCSI vendors optimizing performance Local diskgood storage location for vSwp files
page 165 |
page 166 |
OS Disk User Data & Settings Temp Files + Large Core Apps
CIFS Shares
Discardable VMDKs
Low Capacity Very High Perf Often a cache Sometimes local DRAM or SSDs
Quota based Lower Reliability Backed Up Discarded Replicated Regularly Lower Cost Sometimes local
page 167 |
Storage Design: Sizing Considerations (View 4.5)Pool datastore size= Linked Clone
VM Swap file Windows OS page file +400MB New Disposable Disk option Growth for delta files
+ (~150MB/day)
Conservative
~100 MB
iSCSI NFS
128
256
Conservative
15% overhead
page 168 |
Replica creation time greatly affected by Parent VM disk 2010 Trace3. Proprietary and Confidential. size
Adjust browser cache size to lowest useful setting Turn off NTFS Last Access statistics
FSUTIL behavior set disablelastaccess 1
Offload AV overhead to a VMSafe compatible AV Scanner Scan the Parent VM before deploying
page 170 |
Create and enforce strong naming conventions for Parent VMs and snapshots 2010 Trace3. Proprietary and Confidential.
VLAN Usage
Avoid overloading VLANs used for View desktops to avoid running out of IP addresses
This situation is difficult to troubleshoot
Recommendations
Never P2V a physical machine for a View master image
It would be more efficient to build a VM from scratch
Use vCenter Server Heartbeat to protect vCenter and View Composer Install View agent and enable the right vRAM for PCoIP
http://kb.vmware.com/selfservice/microsites/sea
page 173 |
VMware highly recommends that you use such DRS. DRS ensures that virtual machines are distributed efficiently among your hosts. We have some customers who do not use DRS for virtualized production servers. Please use it for View.
page 174 |
2010 Trace3. Proprietary and Confidential.
Avoid over-provisioning memory and vCPUs Size Windows page file between 50-100% of memory
PCoIP Tweaks
80-90% target of all users is OK Move complex users with complex systems to phase 2, 3 or leave physical. If you have 6 worker types, try to consolidate your base image to 2 or 3 versions.
Its ok to have unused applications, icons on desktop.
page 177 |
Pick 1-2 devices to support initially. Use repurposed desktops for POC. IT needs to secure corp. assets, protect data, deliver services
2010 Trace3. Proprietary and Confidential.
Questions?
page 178 |
Whats your ? How do you plan to get there? How can we help?
page 179 |