SlideShare une entreprise Scribd logo
1  sur  30
Open Source Tools for 
IT Infrastructure 
Management 
Meenakshi Lakshmanan – Senior Manager and Leader Cloud 
Systems Development CoE 
Satya Routray – Senior Engineer, Cloud Systems Development CoE 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
• IT Infrastructure Model 
• FCAPS and Applying FCAPS to 
the Virtual World / IaaS 
• Introduction to some 
OpenSource Tools and Demo 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
• New IT Infrastructure Model 
Virtualized Compute, Storage, 
Network Model. 
Mix of Bare Metal and VMs 
Mix of physical and virtual Devices 
Mix of Hypervisors and OS’s 
Traditional Apps and Mobile Apps into 
the traditional IT 
In premise Apps and Mix of SaaS and 
PaaS 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
Cloud Client 
SP Net / Internet 
Cloud Services Layer 
PaaS 
IaaS 
SaaS 
Abstraction KVM Hyper V ESX 
Virtualization Hypervisor Layer 
Compute/VM Storage Network 
Fault Management 
Capacity Management 
Accounting Management 
Performance Management 
Security Management 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
Finance 
App 
OS 
Virtual 
Machine 
App 
OS 
Virtual 
Machine 
Mktg 
App 
OS 
Virtual 
Machine 
Engineering 
App 
OS 
Virtual 
Machine 
HR 
App 
OS 
Virtual 
Machine 
App 
OS 
Virtual 
Machine 
Corp 
App 
OS 
Virtual 
Machine 
F Cloud Infrastructure Cloud Service 
Infrastructure Service 
C 
A 
P 
S 
Physical 
Server 
Storage 
Physical 
Server 
Physical 
Server 
Storage 
Physical 
Server 
DB Service 
Queue 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
• FCAPS was introduced within the first Working Drafts 
(N1719) of ISO 10040, the Open Systems Interconnection 
(OSI) Systems Management Overview (SMO) standard. 
• FCAPS is an acronym for fault, configuration, accounting, 
performance, security, the management categories into which 
the ISO model defines the tasks 
• Can we apply FCAPS to the new IT infrastructure model 
and review the opensource tools around. 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
• Fault management is a set of functions that detects, isolates and 
corrects the malfunction. 
• Mainly of 2 types 
Active 
Active fault management actively monitor devices via tools such as ping to determine if 
the device is active and responding. If the device stops responding, active monitoring 
will throw an alarm showing the device as unavailable and allows for the proactive 
correction of the problem 
Passive 
Passive fault management is done by collecting alarms from devices when something 
happens in the devices 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
• Nagios 
• Telemetry 
• OpenNMS 
• NMIS 
• Vendor Specific 
CiscoWorks 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
• Pros: 
Open Source 
Polls actual services for response. (HTTP, SMTP, etc.) 
Flexible Add-ons for specialized testing 
Good Trending data and Uptime Statistics 
• Cons: 
Configuration is done via text files. 
Linux only 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
• Monitoring OpenStack can be placed widely into two buckets. 
Monitor OpenStack infrastructure 
performed using Nagios. Monitoring aspects such as CPU, RAM, Disk Space, 
Network, installed OpenStack processes (e.g. nova-conductor, nova-scheduler, swift-proxy 
etc. ) 
Monitor OpenStack services grouped by tenants/projects 
performed using Telemetry API. 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
• Efficiently collects the metering data about the CPU and network 
usages. 
• Collects data by monitoring notifications sent from services or by polling 
the infrastructure. 
• Configures the type of collected data to meet various operating 
requirements. Accessing and inserting the metering data through the 
REST API. 
• Expands the framework to collect custom usage data by additional plug-ins. 
• Produces signed metering messages that cannot be repudiated. 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
• Establish and maintain consistency of deployments across systems by 
controlling changes 
• Keys: 
Gather 
Collect configuration on scheduled basis 
Store 
Storing the configurations 
Track 
Monitor and report the changes 
Automate 
Make changes across systems with limited user inputs 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
• Puppet 
• Juju 
• Ironic, etc. 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
• Puppet Labs and OpenStack community members Cisco, Red Hat, 
Rackspace, and others have together designed and developed Puppet 
modules for OpenStack. There are several benefits of this collaboration: 
Encapsulation of Best Practices. The community members all have 
significant IT experience, and the Puppet OpenStack configuration modules 
represent OpenStack deployment ‘best practices’ developed since the 
beginning of the project. 
Cross-Platform Support. The Puppet configuration modules for OpenStack 
enable deployment of OpenStack public or private clouds across a wide range 
of operating systems, databases, and hypervisors. You are not limited to a 
single vendor’s platform or technology. 
Active Community. All community members have a vested interest in the 
Puppet OpenStack configuration modules and are actively contributing to the 
technology’s evolution and support. You are not reliant on any individual 
member’s ability to support or provide technical direction. 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
• Cisco Webex uses Puppet+openstack 
• Cisco Webex uses puppet to deploy openstack nodes and configuration 
changes across the nodes 
• OpenStack technologies Cisco WebEx uses: 
Openstack Compute (Nova) 
Openstack Block Storage (Cinder) 
Openstack Network(Neutron) 
Openstack Dashboard (Horizon) 
Openstack Identity Service (Keystone) 
Openstack Image Service (Glance) 
For More Details :http://www.openstack.org/user-stories/cisco-webex/ 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
• When eNovance decided to build their own Public Cloud to provide 
Hybrid solutions to their clients, it turned to OpenStack. 
• Deployment tool used puppet 
• OpenStack technologies eNovance uses: 
Openstack Compute (Nova) 
Openstack Block Storage (Cinder) 
Openstack Network(Neutron) 
Openstack Dashboard (Horizon) 
Openstack Identity Service (Keystone) 
Openstack Image Service (Glance) 
For more details: http://www.openstack.org/user-stories/enovance/ 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
The goal of account management is to gather usage statistics for 
users. 
Accounting management is concerned with tracking 
network utilization information, such that individual users, 
departments, or business units can be appropriately billed 
or charged for accounting purposes. 
For non-billed networks, "administration" replaces "accounting". 
The goals of administration are to administer the set of 
authorized users by establishing users, passwords, and 
permissions, and to administer the operations of the equipment 
such as by performing software backup and synchronization. 
Accounting is often referred to as billing management. 
Using the statistics, the users can be billed and usage 
quotas can be enforced. These can be disk usage, link 
utilization, CPU time, etc. 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
LDAP , OpenLDAP : The Lightweight Directory Access 
Protocol (LDAP; /ˈɛldæp/) is an open, vendor-neutral, industry 
standard application protocol for accessing and maintaining distributed 
directory information services over an Internet Protocol (IP) 
network.[1] Directory services play an important role in 
developing intranet and Internet applications by allowing the sharing of 
information about users, systems, networks, services, and applications 
throughout the network 
Keystone : Typically used in an Openstack Environment, but can be 
used as a standalone auth as a service. Generates tokens with 
reference to each service providing access related info to the service. 
It can use a key/value pair, LDAP, Kerberos, etc as a backend 
Kerberos : Kerberos is a computer network authentication protocol which 
works on the basis of 'tickets' to allow nodes communicating over a non-secure 
network to prove their identity to one another in a secure manner. 
Telemetry (Cielometer ) : Metering project in Openstack that lets you 
know the utilisation of different resources in measurable units. Billing 
can be based upon the same. 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
Performance management is focused on ensuring that the 
systems’ performance remains at acceptable levels. It enables 
the manager to prepare the system for the future, as well as to 
determine the efficiency of the current network 
In Openstack – Perfomance management is embedded in 
different components. 
You can collect and track perfomance of various parameters 
related to Openstack Cloud Via Telemetry/Cielometer. 
Telemetry (Cielometer ) : Metering project in Openstack that 
lets you know the utilisation of different resources 
in measurable units. Billing can be based upon the same. 
Many 3rd party tools for VmWare and Hyper-V 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
The goal is to control the access to assets in the network 
What is to be secured? 
1. Data 
2. Software 
3. Physical devices etc., 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
Components to be monitored 
1. Authentication, security policies and roles 
2. Firewalls and security groups 
3. Antivirus and protection against malware 
4. Physical security of devices 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
Authentication and Security policies 
1. Token based authentication – Keystone 
2. Authentication as a Service – SafeNet 
3. Role based authorization and user access control – Tenants in 
cloud 
4. Openstack policy.json 
5. AWS Security Center 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
Firewalls and security groups 
1. Cisco ASA 
2. Iptables/Sec groups of Openstack 
3. Windows Firewall 
4. SELinux 
5. Openstack Security groups and rules 
6. FWaaS 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
Antivirus and protection against malware 
1. Symantec Antivirus 
2. Spybot search and destroy 
3. McAfee antivirus 
4. Vmware vShield Endpoint 
5. Ciphercloud 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
Physical security of devices 
1. Secure devices with access to datacenter provided only to 
selected people 
2. Monitor the temperature and employ automated temperature 
control system 
3. Ensure emergency aid such as fire extinguishers and are easily 
available 
4. Implement a reliable alarm system 
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
Thank you.

Contenu connexe

Tendances

Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerCisco Canada
 
Nuage Networks for Dynamic Network Orchestration
Nuage Networks for Dynamic Network OrchestrationNuage Networks for Dynamic Network Orchestration
Nuage Networks for Dynamic Network OrchestrationJonas Vermeulen
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3Irsandi Hasan
 
I psec cisco
I psec ciscoI psec cisco
I psec ciscoDeepak296
 
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep diveCisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep divesolarisyougood
 
Cisco CSR1000V, VMware, and RESTful APIs
Cisco CSR1000V, VMware, and RESTful APIsCisco CSR1000V, VMware, and RESTful APIs
Cisco CSR1000V, VMware, and RESTful APIsPrivate
 
IRJET- Blockchain based Secure Data Storage
IRJET-  	  Blockchain based Secure Data StorageIRJET-  	  Blockchain based Secure Data Storage
IRJET- Blockchain based Secure Data StorageIRJET Journal
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Canada
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 solarisyougood
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewshah_ril1512
 
CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5Irsandi Hasan
 
Chapter 8
Chapter 8 Chapter 8
Chapter 8 ali raza
 
CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8Irsandi Hasan
 
Cisco ucs s3260 the new storage building blocks
Cisco ucs s3260 the new storage building blocksCisco ucs s3260 the new storage building blocks
Cisco ucs s3260 the new storage building blocksIT Tech
 
CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6Irsandi Hasan
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure spherePushkar Saraf
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld
 

Tendances (20)

Expanding your impact with programmability in the data center
Expanding your impact with programmability in the data centerExpanding your impact with programmability in the data center
Expanding your impact with programmability in the data center
 
Chapter 1
Chapter 1Chapter 1
Chapter 1
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
Nuage Networks for Dynamic Network Orchestration
Nuage Networks for Dynamic Network OrchestrationNuage Networks for Dynamic Network Orchestration
Nuage Networks for Dynamic Network Orchestration
 
CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3CCNA Discovery 4 - Chapter 3
CCNA Discovery 4 - Chapter 3
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
Cisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep diveCisco prime-nms-overview-hi-techdays deep dive
Cisco prime-nms-overview-hi-techdays deep dive
 
Cisco CSR1000V, VMware, and RESTful APIs
Cisco CSR1000V, VMware, and RESTful APIsCisco CSR1000V, VMware, and RESTful APIs
Cisco CSR1000V, VMware, and RESTful APIs
 
Nagios-yating
Nagios-yatingNagios-yating
Nagios-yating
 
IRJET- Blockchain based Secure Data Storage
IRJET-  	  Blockchain based Secure Data StorageIRJET-  	  Blockchain based Secure Data Storage
IRJET- Blockchain based Secure Data Storage
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
 
Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0 Cisco Prime infrastructure 3.0
Cisco Prime infrastructure 3.0
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5CCNA Discovery 4 - Chapter 5
CCNA Discovery 4 - Chapter 5
 
Chapter 8
Chapter 8 Chapter 8
Chapter 8
 
CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8CCNA Discovery 4 - Chapter 8
CCNA Discovery 4 - Chapter 8
 
Cisco ucs s3260 the new storage building blocks
Cisco ucs s3260 the new storage building blocksCisco ucs s3260 the new storage building blocks
Cisco ucs s3260 the new storage building blocks
 
CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6CCNA Discovery 4 - Chapter 6
CCNA Discovery 4 - Chapter 6
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure sphere
 
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
VMworld 2013: VMware NSX Extensibility: Network and Security Services from 3r...
 

En vedette

Obn211111 i manager n2000 bms introduction r011 issue 1.0
Obn211111 i manager n2000 bms introduction r011 issue 1.0Obn211111 i manager n2000 bms introduction r011 issue 1.0
Obn211111 i manager n2000 bms introduction r011 issue 1.0Vìctor Isaac Herrera Pérez
 
OpenSource for Entreprise
OpenSource for EntrepriseOpenSource for Entreprise
OpenSource for EntrepriseEric Fesler
 
DPoE Linked In
DPoE Linked InDPoE Linked In
DPoE Linked InTim Hurley
 
Connected Building Reference Architecture Nysspe
Connected Building Reference Architecture   NysspeConnected Building Reference Architecture   Nysspe
Connected Building Reference Architecture NysspeTim Hurley
 
Borang pbs
Borang pbsBorang pbs
Borang pbslaletha
 
Industrial Automation Infrastructure
Industrial Automation InfrastructureIndustrial Automation Infrastructure
Industrial Automation InfrastructurePanduit
 
Enterprise Business
Enterprise BusinessEnterprise Business
Enterprise BusinessPanduit
 
10 floor-office-building-network-design
10 floor-office-building-network-design10 floor-office-building-network-design
10 floor-office-building-network-designMd. Asekur Rahman
 
Structured Ground BICSI Approved
Structured Ground   BICSI ApprovedStructured Ground   BICSI Approved
Structured Ground BICSI ApprovedTim Hurley
 
Network Design for HS3.pptx
Network Design for HS3.pptxNetwork Design for HS3.pptx
Network Design for HS3.pptxMahesh Tripathy
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentationardhita banu adji
 
Enterprise Networks for Connected Buildings
Enterprise Networks for Connected BuildingsEnterprise Networks for Connected Buildings
Enterprise Networks for Connected BuildingsPanduit
 
Fault Management System (OSS)
Fault Management System (OSS)Fault Management System (OSS)
Fault Management System (OSS)Riswan
 
Realise the Value in modern Data Center Infrastructure
Realise the Value in modern Data Center InfrastructureRealise the Value in modern Data Center Infrastructure
Realise the Value in modern Data Center InfrastructurePanduit
 
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...Panduit
 
Role of OpManager in event and fault management
Role of OpManager in event and fault managementRole of OpManager in event and fault management
Role of OpManager in event and fault managementManageEngine
 
提到 DevOps 到底在談些什麼玩意兒?
提到 DevOps 到底在談些什麼玩意兒?提到 DevOps 到底在談些什麼玩意兒?
提到 DevOps 到底在談些什麼玩意兒?Chen Cheng-Wei
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9Ian Sommerville
 

En vedette (20)

Obn211111 i manager n2000 bms introduction r011 issue 1.0
Obn211111 i manager n2000 bms introduction r011 issue 1.0Obn211111 i manager n2000 bms introduction r011 issue 1.0
Obn211111 i manager n2000 bms introduction r011 issue 1.0
 
OpenSource for Entreprise
OpenSource for EntrepriseOpenSource for Entreprise
OpenSource for Entreprise
 
DPoE Linked In
DPoE Linked InDPoE Linked In
DPoE Linked In
 
Connected Building Reference Architecture Nysspe
Connected Building Reference Architecture   NysspeConnected Building Reference Architecture   Nysspe
Connected Building Reference Architecture Nysspe
 
Borang pbs
Borang pbsBorang pbs
Borang pbs
 
Industrial Automation Infrastructure
Industrial Automation InfrastructureIndustrial Automation Infrastructure
Industrial Automation Infrastructure
 
Enterprise Business
Enterprise BusinessEnterprise Business
Enterprise Business
 
10 floor-office-building-network-design
10 floor-office-building-network-design10 floor-office-building-network-design
10 floor-office-building-network-design
 
Structured Ground BICSI Approved
Structured Ground   BICSI ApprovedStructured Ground   BICSI Approved
Structured Ground BICSI Approved
 
Network Design for HS3.pptx
Network Design for HS3.pptxNetwork Design for HS3.pptx
Network Design for HS3.pptx
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentation
 
Enterprise Networks for Connected Buildings
Enterprise Networks for Connected BuildingsEnterprise Networks for Connected Buildings
Enterprise Networks for Connected Buildings
 
Fault Management System (OSS)
Fault Management System (OSS)Fault Management System (OSS)
Fault Management System (OSS)
 
Realise the Value in modern Data Center Infrastructure
Realise the Value in modern Data Center InfrastructureRealise the Value in modern Data Center Infrastructure
Realise the Value in modern Data Center Infrastructure
 
Network Proposal
Network ProposalNetwork Proposal
Network Proposal
 
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
 
Role of OpManager in event and fault management
Role of OpManager in event and fault managementRole of OpManager in event and fault management
Role of OpManager in event and fault management
 
B/oss BOSS Bss oss b.oss telecom ppt by ijaz haider malik
B/oss BOSS Bss oss b.oss telecom ppt by ijaz haider malikB/oss BOSS Bss oss b.oss telecom ppt by ijaz haider malik
B/oss BOSS Bss oss b.oss telecom ppt by ijaz haider malik
 
提到 DevOps 到底在談些什麼玩意兒?
提到 DevOps 到底在談些什麼玩意兒?提到 DevOps 到底在談些什麼玩意兒?
提到 DevOps 到底在談些什麼玩意兒?
 
Ch7-Software Engineering 9
Ch7-Software Engineering 9Ch7-Software Engineering 9
Ch7-Software Engineering 9
 

Similaire à Opensource tools for OpenStack IAAS

OpenStack: Everything You Need to Know To Get Started
OpenStack: Everything You Need to Know To Get StartedOpenStack: Everything You Need to Know To Get Started
OpenStack: Everything You Need to Know To Get StartedAll Things Open
 
OpenStack: Everything You Need To Know to Get Started (ATO2014)
OpenStack: Everything You Need To Know to Get Started (ATO2014)OpenStack: Everything You Need To Know to Get Started (ATO2014)
OpenStack: Everything You Need To Know to Get Started (ATO2014)Mark Voelker
 
Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administrationAshish Sharma
 
OpenStack - An Overview
OpenStack - An OverviewOpenStack - An Overview
OpenStack - An Overviewgraziol
 
what is OpenStack ? a breif documantation
what is OpenStack ? a breif documantationwhat is OpenStack ? a breif documantation
what is OpenStack ? a breif documantationmoeincanada007
 
Open stack
Open stackOpen stack
Open stacksvm
 
OpenStack Enabling DevOps
OpenStack Enabling DevOpsOpenStack Enabling DevOps
OpenStack Enabling DevOpsCisco DevNet
 
BRKVIR-2601 Architecting an OpenStack Based Cloud with Cisco Infrastructure.pdf
BRKVIR-2601 Architecting an OpenStack Based Cloud with Cisco Infrastructure.pdfBRKVIR-2601 Architecting an OpenStack Based Cloud with Cisco Infrastructure.pdf
BRKVIR-2601 Architecting an OpenStack Based Cloud with Cisco Infrastructure.pdfssuserc6aaff
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreCisco Canada
 
Introducing Cloud Development with Project Shipped and Mantl: a deep dive
Introducing Cloud Development with Project Shipped and Mantl: a deep diveIntroducing Cloud Development with Project Shipped and Mantl: a deep dive
Introducing Cloud Development with Project Shipped and Mantl: a deep diveCisco DevNet
 
Introducing Cloud Development with Mantl
Introducing Cloud Development with MantlIntroducing Cloud Development with Mantl
Introducing Cloud Development with MantlCisco DevNet
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7Waqas Ahmed Nawaz
 
Workshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationWorkshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationJayaprakash R
 
Openstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamOpenstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamBeny Raja
 
OpenStack Workshop - WECode Harvard Conference
OpenStack Workshop - WECode Harvard ConferenceOpenStack Workshop - WECode Harvard Conference
OpenStack Workshop - WECode Harvard ConferenceIccha Sethi
 
Introduction Openstack
Introduction OpenstackIntroduction Openstack
Introduction OpenstackRanjith Kumar
 

Similaire à Opensource tools for OpenStack IAAS (20)

5 cisco open_stack
5 cisco open_stack5 cisco open_stack
5 cisco open_stack
 
OpenStack: Everything You Need to Know To Get Started
OpenStack: Everything You Need to Know To Get StartedOpenStack: Everything You Need to Know To Get Started
OpenStack: Everything You Need to Know To Get Started
 
OpenStack: Everything You Need To Know to Get Started (ATO2014)
OpenStack: Everything You Need To Know to Get Started (ATO2014)OpenStack: Everything You Need To Know to Get Started (ATO2014)
OpenStack: Everything You Need To Know to Get Started (ATO2014)
 
Openstack_administration
Openstack_administrationOpenstack_administration
Openstack_administration
 
OpenStack - An Overview
OpenStack - An OverviewOpenStack - An Overview
OpenStack - An Overview
 
what is OpenStack ? a breif documantation
what is OpenStack ? a breif documantationwhat is OpenStack ? a breif documantation
what is OpenStack ? a breif documantation
 
Open stack
Open stackOpen stack
Open stack
 
OpenStack Enabling DevOps
OpenStack Enabling DevOpsOpenStack Enabling DevOps
OpenStack Enabling DevOps
 
BRKVIR-2601 Architecting an OpenStack Based Cloud with Cisco Infrastructure.pdf
BRKVIR-2601 Architecting an OpenStack Based Cloud with Cisco Infrastructure.pdfBRKVIR-2601 Architecting an OpenStack Based Cloud with Cisco Infrastructure.pdf
BRKVIR-2601 Architecting an OpenStack Based Cloud with Cisco Infrastructure.pdf
 
Application Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centreApplication Centric Infrastructure (ACI), the policy driven data centre
Application Centric Infrastructure (ACI), the policy driven data centre
 
Introducing Cloud Development with Project Shipped and Mantl: a deep dive
Introducing Cloud Development with Project Shipped and Mantl: a deep diveIntroducing Cloud Development with Project Shipped and Mantl: a deep dive
Introducing Cloud Development with Project Shipped and Mantl: a deep dive
 
Introducing Cloud Development with Mantl
Introducing Cloud Development with MantlIntroducing Cloud Development with Mantl
Introducing Cloud Development with Mantl
 
OpenStack with OpenDaylight
OpenStack with OpenDaylightOpenStack with OpenDaylight
OpenStack with OpenDaylight
 
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
CCNA (R & S) Module 02 - Connecting Networks - Chapter 7
 
Openstack 101
Openstack 101Openstack 101
Openstack 101
 
Workshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, VirtualizationWorkshop - Openstack, Cloud Computing, Virtualization
Workshop - Openstack, Cloud Computing, Virtualization
 
Openstack workshop @ Kalasalingam
Openstack workshop @ KalasalingamOpenstack workshop @ Kalasalingam
Openstack workshop @ Kalasalingam
 
OpenStack Workshop - WECode Harvard Conference
OpenStack Workshop - WECode Harvard ConferenceOpenStack Workshop - WECode Harvard Conference
OpenStack Workshop - WECode Harvard Conference
 
Introduction Openstack
Introduction OpenstackIntroduction Openstack
Introduction Openstack
 
OpenStack & MySQL
OpenStack & MySQLOpenStack & MySQL
OpenStack & MySQL
 

Dernier

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Dernier (20)

KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

Opensource tools for OpenStack IAAS

  • 1. Open Source Tools for IT Infrastructure Management Meenakshi Lakshmanan – Senior Manager and Leader Cloud Systems Development CoE Satya Routray – Senior Engineer, Cloud Systems Development CoE © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. • IT Infrastructure Model • FCAPS and Applying FCAPS to the Virtual World / IaaS • Introduction to some OpenSource Tools and Demo © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. • New IT Infrastructure Model Virtualized Compute, Storage, Network Model. Mix of Bare Metal and VMs Mix of physical and virtual Devices Mix of Hypervisors and OS’s Traditional Apps and Mobile Apps into the traditional IT In premise Apps and Mix of SaaS and PaaS © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Cloud Client SP Net / Internet Cloud Services Layer PaaS IaaS SaaS Abstraction KVM Hyper V ESX Virtualization Hypervisor Layer Compute/VM Storage Network Fault Management Capacity Management Accounting Management Performance Management Security Management © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Finance App OS Virtual Machine App OS Virtual Machine Mktg App OS Virtual Machine Engineering App OS Virtual Machine HR App OS Virtual Machine App OS Virtual Machine Corp App OS Virtual Machine F Cloud Infrastructure Cloud Service Infrastructure Service C A P S Physical Server Storage Physical Server Physical Server Storage Physical Server DB Service Queue © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. • FCAPS was introduced within the first Working Drafts (N1719) of ISO 10040, the Open Systems Interconnection (OSI) Systems Management Overview (SMO) standard. • FCAPS is an acronym for fault, configuration, accounting, performance, security, the management categories into which the ISO model defines the tasks • Can we apply FCAPS to the new IT infrastructure model and review the opensource tools around. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. • Fault management is a set of functions that detects, isolates and corrects the malfunction. • Mainly of 2 types Active Active fault management actively monitor devices via tools such as ping to determine if the device is active and responding. If the device stops responding, active monitoring will throw an alarm showing the device as unavailable and allows for the proactive correction of the problem Passive Passive fault management is done by collecting alarms from devices when something happens in the devices © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. • Nagios • Telemetry • OpenNMS • NMIS • Vendor Specific CiscoWorks © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. • Pros: Open Source Polls actual services for response. (HTTP, SMTP, etc.) Flexible Add-ons for specialized testing Good Trending data and Uptime Statistics • Cons: Configuration is done via text files. Linux only © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. • Monitoring OpenStack can be placed widely into two buckets. Monitor OpenStack infrastructure performed using Nagios. Monitoring aspects such as CPU, RAM, Disk Space, Network, installed OpenStack processes (e.g. nova-conductor, nova-scheduler, swift-proxy etc. ) Monitor OpenStack services grouped by tenants/projects performed using Telemetry API. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. • Efficiently collects the metering data about the CPU and network usages. • Collects data by monitoring notifications sent from services or by polling the infrastructure. • Configures the type of collected data to meet various operating requirements. Accessing and inserting the metering data through the REST API. • Expands the framework to collect custom usage data by additional plug-ins. • Produces signed metering messages that cannot be repudiated. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. • Establish and maintain consistency of deployments across systems by controlling changes • Keys: Gather Collect configuration on scheduled basis Store Storing the configurations Track Monitor and report the changes Automate Make changes across systems with limited user inputs © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. • Puppet • Juju • Ironic, etc. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. • Puppet Labs and OpenStack community members Cisco, Red Hat, Rackspace, and others have together designed and developed Puppet modules for OpenStack. There are several benefits of this collaboration: Encapsulation of Best Practices. The community members all have significant IT experience, and the Puppet OpenStack configuration modules represent OpenStack deployment ‘best practices’ developed since the beginning of the project. Cross-Platform Support. The Puppet configuration modules for OpenStack enable deployment of OpenStack public or private clouds across a wide range of operating systems, databases, and hypervisors. You are not limited to a single vendor’s platform or technology. Active Community. All community members have a vested interest in the Puppet OpenStack configuration modules and are actively contributing to the technology’s evolution and support. You are not reliant on any individual member’s ability to support or provide technical direction. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. • Cisco Webex uses Puppet+openstack • Cisco Webex uses puppet to deploy openstack nodes and configuration changes across the nodes • OpenStack technologies Cisco WebEx uses: Openstack Compute (Nova) Openstack Block Storage (Cinder) Openstack Network(Neutron) Openstack Dashboard (Horizon) Openstack Identity Service (Keystone) Openstack Image Service (Glance) For More Details :http://www.openstack.org/user-stories/cisco-webex/ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. • When eNovance decided to build their own Public Cloud to provide Hybrid solutions to their clients, it turned to OpenStack. • Deployment tool used puppet • OpenStack technologies eNovance uses: Openstack Compute (Nova) Openstack Block Storage (Cinder) Openstack Network(Neutron) Openstack Dashboard (Horizon) Openstack Identity Service (Keystone) Openstack Image Service (Glance) For more details: http://www.openstack.org/user-stories/enovance/ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. The goal of account management is to gather usage statistics for users. Accounting management is concerned with tracking network utilization information, such that individual users, departments, or business units can be appropriately billed or charged for accounting purposes. For non-billed networks, "administration" replaces "accounting". The goals of administration are to administer the set of authorized users by establishing users, passwords, and permissions, and to administer the operations of the equipment such as by performing software backup and synchronization. Accounting is often referred to as billing management. Using the statistics, the users can be billed and usage quotas can be enforced. These can be disk usage, link utilization, CPU time, etc. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. LDAP , OpenLDAP : The Lightweight Directory Access Protocol (LDAP; /ˈɛldæp/) is an open, vendor-neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network.[1] Directory services play an important role in developing intranet and Internet applications by allowing the sharing of information about users, systems, networks, services, and applications throughout the network Keystone : Typically used in an Openstack Environment, but can be used as a standalone auth as a service. Generates tokens with reference to each service providing access related info to the service. It can use a key/value pair, LDAP, Kerberos, etc as a backend Kerberos : Kerberos is a computer network authentication protocol which works on the basis of 'tickets' to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner. Telemetry (Cielometer ) : Metering project in Openstack that lets you know the utilisation of different resources in measurable units. Billing can be based upon the same. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. Performance management is focused on ensuring that the systems’ performance remains at acceptable levels. It enables the manager to prepare the system for the future, as well as to determine the efficiency of the current network In Openstack – Perfomance management is embedded in different components. You can collect and track perfomance of various parameters related to Openstack Cloud Via Telemetry/Cielometer. Telemetry (Cielometer ) : Metering project in Openstack that lets you know the utilisation of different resources in measurable units. Billing can be based upon the same. Many 3rd party tools for VmWare and Hyper-V © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. The goal is to control the access to assets in the network What is to be secured? 1. Data 2. Software 3. Physical devices etc., © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. Components to be monitored 1. Authentication, security policies and roles 2. Firewalls and security groups 3. Antivirus and protection against malware 4. Physical security of devices © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. Authentication and Security policies 1. Token based authentication – Keystone 2. Authentication as a Service – SafeNet 3. Role based authorization and user access control – Tenants in cloud 4. Openstack policy.json 5. AWS Security Center © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. Firewalls and security groups 1. Cisco ASA 2. Iptables/Sec groups of Openstack 3. Windows Firewall 4. SELinux 5. Openstack Security groups and rules 6. FWaaS © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. Antivirus and protection against malware 1. Symantec Antivirus 2. Spybot search and destroy 3. McAfee antivirus 4. Vmware vShield Endpoint 5. Ciphercloud © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. Physical security of devices 1. Secure devices with access to datacenter provided only to selected people 2. Monitor the temperature and employ automated temperature control system 3. Ensure emergency aid such as fire extinguishers and are easily available 4. Implement a reliable alarm system © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29

Notes de l'éditeur

  1. Assuming the compute resources are realized as Xen VM The Realization layer Resource Management system allocates resources (if available) for 5 Gold VM and launches the VM by calling Xen VM management interfaces (xm create, in this case) passing it configuration parameters. Once provisioned, the allocated IP addresses and other information are returned to the client (not shown here). Depending on capabilities supported in the Cloud services interfaces, the provisioning process can be more involved (for example, if it is a whole OVF package). But as mentioned before, functions (such as provisioning) of the infrastructure layer is not subject of this presentation., only the Cloud Services Layer and north-bound interfaces from it.
  2. In the cloud computing model things are different. In this case, the services organization provides a cloud infrastructure service, on top of which applications are deployed fully configured with their own operating system and configuration. We have de-coupled the complexity of applications from the underlying infrastructure. The application layer and the infrastructure layer are managed independently.