implementing the hybrid data center

Post on 09-Jan-2017

739 Views

Category:

Technology

6 Downloads

Preview:

Click to see full reader

TRANSCRIPT

David Lefebvre

Consulting Systems EngineerOctober 2015

Changing the role of IT

Implementing the Hybrid Data Center

In partnership with:

2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Enterprise Workloads

Native CloudApplications

Big Data &Analytics

Collaboration & Video

HCS

IaaS

PaaS

Meraki

Analytics

WebEx

Security

IOE Apps

HANA aaS

IaaSPaaSNFV

vDesktop aaSvDesktop aaS

MicrosoftSuite aaS

Cisco Powered PartnerClouds

Cisco Cloud Services

Enterprise PrivateCloud

PublicClouds

3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Building Private Cloud

4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

A Major Shift

IT as a Service IaaS | PaaS | SaaS | XaaS

Flexible Consumption Models

CONSOLIDATIONVIRTUALIZATION

HYBRID CLOUDS

POLICY DRIVENAUTOMATION

TRADITIONAL DATA CENTER

We are here

CLOUD-READY DATA CENTER

5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

SaaS

Compute Storage Network

Autom

ation • Orchestration

Customer Interface

Service Catalog

Organization • Governance • Process

Risk • Security • Compliance

Applications

Platform

Abstraction • Virtualization

Infrastructure • Environmentals

10

9

8

7

2

1

3 4

5

6

PaaS

IaaS

FinanceTracking

The Domain Ten Architecture

6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Automation

7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

UCS Management Reduced time to deploy Rapid resource reallocation

Reduced infrastructure Cohesive resource pools

Unified Fabric

Compute With NO Compromise Blade and rack Integration Physical and virtual workloads

Virtualized I/O Improved scalability and flexibility Increased performance

Unified Computing Product Innovation

XML API STANDARDAPIs

9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

UCS Service Profiles

SIM CardIdentity for a Phone

Service ProfileIdentity for a Server

UCS Service Profile

Network Policy

Storage Policy

Server Policy

10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Subject Matter ExpertsDefine Policies

1

UCS: Embedded AutomationIntegrated, Policy-Based Infrastructure Management

Policies Create Service Profile Templates

Clone Templates toCreate Service Profiles

Associate Service Profiles to Configure Hardware

Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels

Server port configuration including LAN and SAN settings

Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions

Unique user ID (UUID), firmware revisions,and RAID controller settings

Service profile assigned to server, chassis slot, or pool

Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels

Server port configuration including LAN and SAN settings

Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions

Unique user ID (UUID), firmware revisions,and RAID controller settings

Service profile assigned to server, chassis slot, or pool

Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels

Server port configuration including LAN and SAN settings

Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions

Unique user ID (UUID), firmware revisions,and RAID controller settings

Service profile assigned to server, chassis slot, or pool

Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels

Server port configuration including LAN and SAN settings

Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions

Unique user ID (UUID), firmware revisions,and RAID controller settings

Service profile assigned to server, chassis slot, or pool

Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels

Server port configuration including LAN and SAN settings

Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions

Unique user ID (UUID), firmware revisions,and RAID controller settings

Service profile assigned to server, chassis slot, or pool

2 3 4

NetworkSME

ServerSME

StorageSME

11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Element ManagerSDN Controller

Automation / Orchestration

The New Data Center

Data Center 1

Campus

Core Core

Leaf Leaf Leaf

Spine Spine Spine Spine

Border Border

Data Center 2

Campus

Spine Spine Spine Spine

Core Core

Leaf Leaf Leaf Border Border

Data Center Interconnect

12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Fabric Forwarding

Leaf

Spine Spine SpineSpine

Leaf

PacketSent

Lookup NextHop

Encapsulate &forward

Decapsulate &Deliver

13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Spine Leaf Protocols

Fabric Path+ Proven

- Proprietary

Layer 3+ Interoperability

- No Layer 2

BGP EVPN+ Interoperability- Management

ACI+ Capability

- New Infrastructure

14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

APIC

Application Centric Infrastructure

ADC APP DBF/WADC

WEB

HYPERVISORHYPERVISOR HYPERVISOR

CONNECTIVITY POLICY

SECURITY POLICIES QOS STORAGE AND

COMPUTE

APPLICATION L4..7

SERVICES

SLAQoSSecurityLoadBalancing

APP PROFILE

15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Orchestration

16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Automation and Orchestration - UCS Director

17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

SaaS

Compute Storage Network

Autom

ation • Orchestration

Customer Interface

Service Catalog

Organization • Governance • Process

Risk • Security • Compliance

Applications

Platform

Abstraction • Virtualization

Infrastructure • Environmentals

10

9

8

7

2

1

4

5

6

PaaS

IaaS

FinanceTracking

The Domain Ten Architecture

18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco UCS Director

• Streamlines deployment

• Reduces provisioning by 88.4%1

• Unified provisioning & management

• Delivers consistency & speed

Principled Technologies, “Simplify server provisioning with Cisco UCS Director, December, 2014”

19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Multivendor Support

ACI / Nexus StorageUCS Hypervisor

20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Service Selection - Prime Service Catalog

21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Prime Service Catalog

Services

2. User Orders Service

Service Items

1. UCSD Offers Services

3. UCSD ProvisionsServices

4. PSC discovers and syncs attributes/status

22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Application Support in Stack Designer

23© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Intergrating Public Cloud

24© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Enterprise Workloads

Native CloudApplications

Big Data &Analytics

Collaboration & Video

HCS

IaaS

PaaS

Meraki

Analytics

WebEx

Security

IOE Apps

HANA aaS

IaaSPaaSNFV

vDesktop aaSvDesktop aaS

MicrosoftSuite aaS

Cisco Powered PartnerClouds

Cisco Cloud Services

Enterprise PrivateCloud

PublicClouds

25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

EnterprisePrivateCloud

Intercloud Fabric

VMware

vCenter

Hyper-V

SCVMM

Cloud Integration - Intercloud Fabric

User Portal

Migration

Cloud Provider

API Calls

Cloud Provider

API Calls

Cloud Provider

API Calls

Cloud Provider

API Calls

Secure Tunnel

26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

OR

Do You Have Leverage?

28© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

28

Compliance Issues

29© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Evaluate The Metrics That Matter To You

Cost Security DRAvailabilityTimeliness

Scalability Performance LeverageComplianceTroubleshooting

30© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Doing IT RightThings to consider

31© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Defining Trust

ContractsReputationKnowledgeExperience

TestingTools

Controls

Trusted Untrusted

32© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Defining TrustTrusted Untrusted

33© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Verify Your Assumptions

34© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Test And Test Again

35© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Have A Migration Plan

36© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Have A Backout Plan

37© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

4

Any Cloud

Managed

Public

Private Private Cloud

Stack

Integrated Infrastructure

3

Build Your Private Cloud

Cisco Data Center Strategy

8 Network Compute Storage Enterprise Wide Policy 9 Analytics Enterprise Wide Analytics

10SECURITY

1

Modernize Infrastructure

Network

Compute

Storage

L4-7 / Security

DATA CENTER

POLICY

Automate and Simplify

2

SecurelyTransfer Workloads

5

Self-Service Portal

6

Extend Policy

7

38© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

4

Any Cloud

Managed

Public

Private Cloud

Software Stack

Integrated Infrastructure

3

Build Your Private Cloud

Cisco Data Center Portfolio

7 Network Compute Storage Enterprise Wide Policy 9 Analytics Enterprise Wide Analytics

10SECURITY

1

Open and Programmable Infrastructure

Network

Compute

Storage

L4-7 / Security

DATA CENTER

POLICY

21

Nexus / MDS

UCS

3rd Party Storage

ASA / FirePOWER

2

UCS Director

ACI (APIC)

UCSM

Automate and Simplify

Cisco ONE Enterprise

Cloud / OpenStackUCS Integrated Infrastructure

3

8 UCS Mini + 3rd party storage Data VirtualizationAnalytics Platform + Solutions9

CISCO SECURITY SOLUTIONS (Network + AMP + E-mail + Web )10

4

Move Data and Workloads Securely

5

Move Services AcrossCatalogs

6

Extend Policy Model

Cisco Intercloud Fabric

5

Cisco Prime Services Catalog

6

ACI Policy Model

Intercloud

77

Thank You. Visit us in the World of Solutions.

In partnership with:

top related