SlideShare une entreprise Scribd logo
1  sur  28
VCS 5.0 for VMware ESX
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 2
Virtualization Goals
Biggest drivers of Virtualization
- Consolidation
- Cost Reduction
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 3
Virtualization Consideration Points
Need to address
- Vulnerability &
- Manageability
for the virtual environment
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 4
 Physical servers
 Virtual servers
 Applications
 Network components
 Storage components
 Virtual links
Vulnerability Issues
“it’s like having too many eggs
in one basket”
Virtualization can increase the risk of downtime
Server consolidation
10~20 servers in one box
Adding more layers creates
complexity.
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 5
Manageability Issues
– Another “platform” has been added
– Many existing data center tools built on
physical server model and don’t adapt well to
virtual server architectures
– Servers, Apps now mobile, need to be tracked
– Virtual interface/links need to be maintained
Hardware
Hypervisor
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
Virtual
Server
“I want the visibility and manageability of a physical environment”
Solution?
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 7
Traditional Clustering
Hardware (x86)
Virtualization
Hypervisor
Hardware (x86)
Server A
Virtualization
Hypervisor
Server A’
 Traditional clustering running within the guest OS
 Is this as good as it gets?
Clustering SW
virtual virtual
Traditional “Guest OS” Clustering
Clustering SW
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 8
Limitations to the Existing Solution
 Passive Virtual Machines are standing by, using resources
 Additional VM’s cost more $ in application licensing
 Individual cluster software overhead  performance issue
 Management complexity (hypervisor, servers, OS, apps, scripts)
Hardware (x86)
Virtualization
Hypervisor
Hardware (x86)
Server
A
Server
B
Virtualization
Hypervisor
Server
A’
Server
B’
Clustering SW Clustering SWClustering SW Clustering SW
virtual virtual virtual virtualApp 1 App 2App 1App 2
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 9
VMware HA - Great protection against physical server failure. But…
VMware HA
Hardware (x86)
VMware ESX
Hardware (x86)
Server
A
Server
B
VMware ESX
VMware HA
Enabled
VMware HA
Enabled
virtual virtual
Server
A
Server
B
VMware HA
Enabled
VMware HA
Enabled
virtual virtual
– Does not protect against VM / App / Resource failures
– Does not protect from wide area disasters
– Does not provide automated response / notification
App 1
NIC
VMware HA
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 10
Hardware (x86)
VMware ESX
Hardware (x86)
Server
A
VMware ESX
virtual
Server
B
virtual
VMotion, DRS - Great for planned maintenance & load balancing. But…
– Requires virtual machines to be in a running state
– Does not protect from unplanned downtime and sudden outages
“Vmotion”
Server
B
virtual
VMotion, DRS: for “known” activities only
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 11
Veritas Cluster Server
(VCS)
 #1 Market Share in cross-platform server clustering
– Source: IDC 2006 IDC Clustering and Availability Software Survey
 Provides High Availability and
Disaster Recovery all in one package
 Supported Platforms:
• Windows NT, 2000, 2003
• Linux (RedHat, SUSE)
• Solaris, HP/UX, AIX
• VMware ESX Server
Veritas Cluster Server
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 12
 Virtual machine and application monitoring
– Provides higher level of availability by monitoring application and resources as well
as the server
 Multi-cluster management and reporting
– Manages multiple local and remote clusters in physical and virtual environments
from a single console, regardless of OS
 Leverage VMware ESX Server advanced features
– Recognizes and works seamlessly with VMotion and DRS
 Automated Disaster Recovery
– Configure / Test / Provide Disaster Recovery using VCS
VCS for VMware ESX Server Highlights
13
Hardware
Local
Cluster
Heartbeat
Global
Cluster
Heartbeat
VMware ESX Server Console OS
Veritas Cluster Server
Veritas Cluster Server 5 for VMware ESX Server
App Agent
App1
Virtual
Machine1
App3
Virtual
Machine3
App Agent
App2
Virtual
Machine2
Hardware
VMware ESX
Server Console OS
VCS
No Target
Virtual
Machines
Required
Shared
Storage
Hardware-Based
Data Replication
Primary Site
ESX Server Node A
Secondary Site
ESX Server Node C
Hardware
VMware ESX Server
Console OS
VCS
No Target
Virtual
Machines
Required
Primary Site
ESX Server Node B
DR Agent
DR Agent
14
Hardware
VMware ESX Server Console OS
Veritas Cluster Server
VCS in Action
App Agent
App1
Virtual
Machine1
App3
Virtual
Machine3
App Agent
App2
Virtual
Machine2
Hardware
VMware ESX
Server Console OS
VCS
Local
Cluster
Heartbeat
Shared
Storage
Global
Cluster
Heartbeat
Primary Site
ESX Server Node A
Secondary Site
ESX Server Node C
Hardware
VMware ESX Server
Console OS
VCS
No Target
Virtual
Machines
Required
Primary Site
ESX Server Node B
DR Agent
App3
Virtual
Machine3
DR Agent
Hardware-Based
Data Replication
15
Hardware
VMware ESX Console OS
Veritas Cluster Server
App Agent
App1
Virtual
Machine1
App3
Virtual
Machine3
App Agent
App2
Virtual
Machine2
Hardware
VMware ESX
Console OS
VCS
No Target
Virtual
Machines
Required
Local
Cluster
Heartbeat
Shared
Storage
Global
Cluster
Heartbeat
Primary Site
ESX Node A
Secondary Site
ESX Node C
Hardware
VMware ESX
Console OS
VCS
No Target
Virtual
Machines
Required
Primary Site
ESX Node B
App Agent
App1
Virtual
Machine1
App Agent
App2
Virtual
Machine2
DR Agent DR Agent
Hardware-ased
Data Replication
VCS in Action
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 16
 Comprehensive availability for the production applications
With VMware
provides failover for…
With VCS
Provide added protection for…
Physical server failures
Physical server failures
. Individual virtual server failures
. Application failures within the guest OS
. Automated disaster recovery
Benefits of using VCS 5 for VMware ESX
Added Protection
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 17
– Granular management, just like a physical environment
– Simple to manage (mouse clicks) both Windows and Linux
– Automated response and notification to various situations
– Maintain resource dependencies
Virtual
Virtual
Benefits of using VCS 5 for VMware ESX
Granular Management
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 18
– Enforce virtual machine dependencies
– Support services that span multiple virtual servers
Hardware
Hypervisor
Virtual
Web Server
Hardware
Hypervisor
Virtual
Web Server
Virtual
Web Server
Virtual
App Server
Virtual
DB Server
Benefits of using VCS 5 for VMware ESX
Virtual Dependencies
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 19
Benefits of using VCS 5 for VMware ESX
Across Data Centers
– Maintain availability during a site-wide disaster
– Simplified automated disaster recovery process
– Have one view of all VCS clusters across the globe
– Use one framework to manage multiple data centers
One Management Console
VMware cluster
VMware cluster
VMware cluster
Solaris cluster
Windows cluster
HPUX cluster
Linux cluster
AIX cluster
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 20
 VCS allows for N+M clusters
– No need to have 2x the hardware
– Cluster according to performance, cost requirements
 VMotion, DRS compatible
– Utilize VMware features without complications
 No need to install duplicate stand-by failover instances
– Only one application to license
– Install VCS only once
 Fire Drill tool verifies the virtual disaster recovery plan
– No impact to the production environment
– DR plans should be tested whether it is physical or virtual
Benefits of using VCS 5 for VMware ESX
Virtual Environment Specific
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 21
What is VCS Fire Drill?
 Fire Drill is a cloned VCS Service
Group modified to use snapshot
storage
 Fire Drill:
– Creates snapshot
– Configures snapshot
– Imports snapshot
– Mounts snapshot
– Starts SG on the mount
– Requires SF 5.0
 Any errors are logged by VCS
 Fire Drill SGs are isolated from
production SGs
VCS
Snapshot
Primary Site Secondary Site
Prod SG FD SG
replicate
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 22
 Standardization – Use the same tools for physical and virtual
environments
– Pain: Different tools for different platforms is expensive and complex
– Value: Reduce training costs, more flexible IT staff
VCS for VMware ESX use cases
• ZonesZones
• CContainersontainers
• LPARsLPARs
• Micro-Micro-
PartitionsPartitions
• vParsvPars
• nParsnPars
• VirtualVirtual
MachinesMachines
• SecureSecure
ResourceResource
PartitionsPartitions VERITAS Cluster Server 5 forVERITAS Cluster Server 5 for
VMware ESXVMware ESX
VERITASVERITAS
ClusterCluster
Server 5Server 5
forfor UnixUnix
VERITASVERITAS
ClusterCluster
Server 5Server 5
forfor UnixUnix
VCSVCS 5 for5 for
UnixUnix
VCS 5 forVCS 5 for
WindowsWindows
VCS 5 forVCS 5 for
LinuxLinux
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 23
 Overall protection of the production environment
– Pain: Users don’t know the health of the applications and VMs
– Value: IT can monitor everything regarding the VM and can have a proven
Enterprise Class HA solution for their production applications
VCS for VMware ESX Use
Cases
Hardware
VMware ESX
Console OS
VCS
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
Hardware
VMware ESX
Console OS
VCS
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
Hardware
VMware ESX
Console OS
VCS
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
Hardware
VMware ESX
Console OS
VCS
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
VCS for VMware ESX use cases
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 24
 M+N clusters, P-to-V*, V-to-P*, and V-to-V configurations
– Pain: Duplicate hardware for HA/DR is expensive
– Value: Arrange servers into cluster configurations that fit your needs
VCS for VMware ESX Use
Cases
Hardw are
VMw are ESX
Console OS
VCS
App
Virtual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virtual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virtual
Machine
App
Virtual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virtual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virt ual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virtual
Machine
App
Virtual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virt ual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virt ual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virt ual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virt ual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virt ual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virt ual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virt ual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virtual
Machine
Hardw are
VMw are ESX
Console OS
VCS
App
Virt ual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
App
Virt ual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
App
Virtual
Machine
* Requires VCS for Windows/Linux/Unix
VCS for VMware ESX use cases
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 25
 Availability over any distance
– Pain: Need disaster recovery solution for VMware environments
– Value: Companies can failover virtual machines to remote data centers regardless
of distance
VCS for VMware ESX Use
CasesVCS for VMware ESX use cases
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 26
Value to the Data Center
With VCS for VMware ESX,
Have a virtual environment…
 Protected top-to-bottom to run mission critical applications
 Using simple-to-use virtual-aware cluster management tools
 Integrated Availability Management All-In-One Package
site-wide disaster
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 27
Q&A
For further information:
Jiwon Youm, Sr. Product Manager, Virtualization
jiwon_youm @ symantec.com
Kyle Gleed, Group Technical Product Manager
kyle_gleed @ symantec.com
© 2006 Symantec CorporationData Center Management Group – Symantec Confidential 28
Mastering Complexity: How to Get Started

Contenu connexe

Tendances

VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...Edureka!
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery ManagerJürgen Ambrosi
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16David Pasek
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short PresentationBarcamp Cork
 
Virtualization - Kernel Virtual Machine (KVM)
Virtualization - Kernel Virtual Machine (KVM)Virtualization - Kernel Virtual Machine (KVM)
Virtualization - Kernel Virtual Machine (KVM)Wan Leung Wong
 
vSAN Beyond The Basics
vSAN Beyond The BasicsvSAN Beyond The Basics
vSAN Beyond The BasicsSumit Lahiri
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1Sanjeev Kumar
 
Introduction - vSphere 5 High Availability (HA)
Introduction - vSphere 5 High Availability (HA)Introduction - vSphere 5 High Availability (HA)
Introduction - vSphere 5 High Availability (HA)Eric Sloof
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Novell
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2Vepsun Technologies
 
Managing ESXi - Tools and Techniques
Managing ESXi - Tools and TechniquesManaging ESXi - Tools and Techniques
Managing ESXi - Tools and TechniquesChristopher Janoch
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server VirtualisationAlan McSweeney
 
E tech vmware presentation
E tech vmware presentationE tech vmware presentation
E tech vmware presentationjpenney
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3Vepsun Technologies
 
VMware HA deep Dive
VMware HA deep DiveVMware HA deep Dive
VMware HA deep DiveEric Sloof
 
Vmware training presentation
Vmware training presentationVmware training presentation
Vmware training presentationAmit Kapadia
 

Tendances (20)

VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
 
What is Virtualization
What is VirtualizationWhat is Virtualization
What is Virtualization
 
Vmware overview
Vmware overviewVmware overview
Vmware overview
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
 
VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16VMware HCI solutions - 2020-01-16
VMware HCI solutions - 2020-01-16
 
VMware Esx Short Presentation
VMware Esx Short PresentationVMware Esx Short Presentation
VMware Esx Short Presentation
 
Virtualization - Kernel Virtual Machine (KVM)
Virtualization - Kernel Virtual Machine (KVM)Virtualization - Kernel Virtual Machine (KVM)
Virtualization - Kernel Virtual Machine (KVM)
 
vSAN Beyond The Basics
vSAN Beyond The BasicsvSAN Beyond The Basics
vSAN Beyond The Basics
 
VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1VMware vSphere 6.0 - Troubleshooting Training - Day 1
VMware vSphere 6.0 - Troubleshooting Training - Day 1
 
Introduction - vSphere 5 High Availability (HA)
Introduction - vSphere 5 High Availability (HA)Introduction - vSphere 5 High Availability (HA)
Introduction - vSphere 5 High Availability (HA)
 
Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)Virtualization with KVM (Kernel-based Virtual Machine)
Virtualization with KVM (Kernel-based Virtual Machine)
 
VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2VMware Advance Troubleshooting Workshop - Day 2
VMware Advance Troubleshooting Workshop - Day 2
 
Managing ESXi - Tools and Techniques
Managing ESXi - Tools and TechniquesManaging ESXi - Tools and Techniques
Managing ESXi - Tools and Techniques
 
An Introduction To Server Virtualisation
An Introduction To Server VirtualisationAn Introduction To Server Virtualisation
An Introduction To Server Virtualisation
 
Virtualization
VirtualizationVirtualization
Virtualization
 
E tech vmware presentation
E tech vmware presentationE tech vmware presentation
E tech vmware presentation
 
VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3VMware Advance Troubleshooting Workshop - Day 3
VMware Advance Troubleshooting Workshop - Day 3
 
VMware
VMware VMware
VMware
 
VMware HA deep Dive
VMware HA deep DiveVMware HA deep Dive
VMware HA deep Dive
 
Vmware training presentation
Vmware training presentationVmware training presentation
Vmware training presentation
 

Similaire à VMWARE ESX

Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811Morty Eisen
 
System Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureSystem Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureBryan Dady
 
Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_VCAP5_wordpress
 
Presentation v mworld 2011
Presentation   v mworld 2011Presentation   v mworld 2011
Presentation v mworld 2011solarisyourep
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-VMark Wilson
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center VirtualizationCarahsoft
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centersHarshitTaneja13
 
Getting Started With Virtualization
Getting Started With VirtualizationGetting Started With Virtualization
Getting Started With VirtualizationBill Kalarness
 
Presentation v mware v-cloud director technical overview
Presentation   v mware v-cloud director technical overviewPresentation   v mware v-cloud director technical overview
Presentation v mware v-cloud director technical overviewsolarisyourep
 
Efficiently protect virtual machines with our cloud backup service powered by...
Efficiently protect virtual machines with our cloud backup service powered by...Efficiently protect virtual machines with our cloud backup service powered by...
Efficiently protect virtual machines with our cloud backup service powered by...iSSAL
 
VMready Virtual Machine-aware Networking for HP
VMready Virtual Machine-aware Networking for HPVMready Virtual Machine-aware Networking for HP
VMready Virtual Machine-aware Networking for HPIBM System Networking
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2karanamsaibabu
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5BusinesstoVirtual
 
VMware ventaja competitiva
VMware ventaja competitivaVMware ventaja competitiva
VMware ventaja competitivaGrupo Texium
 
VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and ResiliencyPaulo Freitas
 

Similaire à VMWARE ESX (20)

Virtualization meisen 042811
Virtualization meisen 042811Virtualization meisen 042811
Virtualization meisen 042811
 
Virtulaisation
VirtulaisationVirtulaisation
Virtulaisation
 
System Center 2012 for VMware Infrastructure
System Center 2012 for VMware InfrastructureSystem Center 2012 for VMware Infrastructure
System Center 2012 for VMware Infrastructure
 
VMware vSphere 6 & Horizon View 6.1 – What's New ?
VMware vSphere 6 & Horizon View 6.1 – What's New ?VMware vSphere 6 & Horizon View 6.1 – What's New ?
VMware vSphere 6 & Horizon View 6.1 – What's New ?
 
VMware
VMwareVMware
VMware
 
01 v mware overview
01  v mware overview01  v mware overview
01 v mware overview
 
Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_Vsicm51 m02 virtualization_intro_
Vsicm51 m02 virtualization_intro_
 
Presentation v mworld 2011
Presentation   v mworld 2011Presentation   v mworld 2011
Presentation v mworld 2011
 
VMware 2009
VMware 2009VMware 2009
VMware 2009
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Data Center Virtualization
Data Center VirtualizationData Center Virtualization
Data Center Virtualization
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centers
 
Getting Started With Virtualization
Getting Started With VirtualizationGetting Started With Virtualization
Getting Started With Virtualization
 
Presentation v mware v-cloud director technical overview
Presentation   v mware v-cloud director technical overviewPresentation   v mware v-cloud director technical overview
Presentation v mware v-cloud director technical overview
 
Efficiently protect virtual machines with our cloud backup service powered by...
Efficiently protect virtual machines with our cloud backup service powered by...Efficiently protect virtual machines with our cloud backup service powered by...
Efficiently protect virtual machines with our cloud backup service powered by...
 
VMready Virtual Machine-aware Networking for HP
VMready Virtual Machine-aware Networking for HPVMready Virtual Machine-aware Networking for HP
VMready Virtual Machine-aware Networking for HP
 
V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2V mwarev sphere5.1notes-v2
V mwarev sphere5.1notes-v2
 
Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5Zerto Virtual Replication 4.5
Zerto Virtual Replication 4.5
 
VMware ventaja competitiva
VMware ventaja competitivaVMware ventaja competitiva
VMware ventaja competitiva
 
VMWARE Professionals - Availability and Resiliency
VMWARE Professionals -  Availability and ResiliencyVMWARE Professionals -  Availability and Resiliency
VMWARE Professionals - Availability and Resiliency
 

Plus de Yogeshwaran R

Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...Yogeshwaran R
 
Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdfYogeshwaran R
 
Docker interview Questions-1.pdf
Docker interview Questions-1.pdfDocker interview Questions-1.pdf
Docker interview Questions-1.pdfYogeshwaran R
 
Docker interview Questions-2.pdf
Docker interview Questions-2.pdfDocker interview Questions-2.pdf
Docker interview Questions-2.pdfYogeshwaran R
 
Powershell Notes.pdf
Powershell Notes.pdfPowershell Notes.pdf
Powershell Notes.pdfYogeshwaran R
 
Mastering Windows Hyper-V-2016.pdf
Mastering Windows Hyper-V-2016.pdfMastering Windows Hyper-V-2016.pdf
Mastering Windows Hyper-V-2016.pdfYogeshwaran R
 
AD-Design Deploying.pdf
AD-Design Deploying.pdfAD-Design Deploying.pdf
AD-Design Deploying.pdfYogeshwaran R
 
Kerberos Process.pdf
Kerberos Process.pdfKerberos Process.pdf
Kerberos Process.pdfYogeshwaran R
 

Plus de Yogeshwaran R (10)

Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
Mastering Active Directory_ Design, deploy, and protect Active Directory Doma...
 
Docker interview Questions-3.pdf
Docker interview Questions-3.pdfDocker interview Questions-3.pdf
Docker interview Questions-3.pdf
 
Docker interview Questions-1.pdf
Docker interview Questions-1.pdfDocker interview Questions-1.pdf
Docker interview Questions-1.pdf
 
Docker interview Questions-2.pdf
Docker interview Questions-2.pdfDocker interview Questions-2.pdf
Docker interview Questions-2.pdf
 
Powershell Notes.pdf
Powershell Notes.pdfPowershell Notes.pdf
Powershell Notes.pdf
 
Mastering Windows Hyper-V-2016.pdf
Mastering Windows Hyper-V-2016.pdfMastering Windows Hyper-V-2016.pdf
Mastering Windows Hyper-V-2016.pdf
 
Exam Ref 70-741.pdf
Exam Ref 70-741.pdfExam Ref 70-741.pdf
Exam Ref 70-741.pdf
 
AD-Design Deploying.pdf
AD-Design Deploying.pdfAD-Design Deploying.pdf
AD-Design Deploying.pdf
 
CISCO Handbook.pdf
CISCO Handbook.pdfCISCO Handbook.pdf
CISCO Handbook.pdf
 
Kerberos Process.pdf
Kerberos Process.pdfKerberos Process.pdf
Kerberos Process.pdf
 

Dernier

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

VMWARE ESX

  • 1. VCS 5.0 for VMware ESX
  • 2. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 2 Virtualization Goals Biggest drivers of Virtualization - Consolidation - Cost Reduction
  • 3. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 3 Virtualization Consideration Points Need to address - Vulnerability & - Manageability for the virtual environment
  • 4. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 4  Physical servers  Virtual servers  Applications  Network components  Storage components  Virtual links Vulnerability Issues “it’s like having too many eggs in one basket” Virtualization can increase the risk of downtime Server consolidation 10~20 servers in one box Adding more layers creates complexity.
  • 5. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 5 Manageability Issues – Another “platform” has been added – Many existing data center tools built on physical server model and don’t adapt well to virtual server architectures – Servers, Apps now mobile, need to be tracked – Virtual interface/links need to be maintained Hardware Hypervisor Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server Virtual Server “I want the visibility and manageability of a physical environment”
  • 7. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 7 Traditional Clustering Hardware (x86) Virtualization Hypervisor Hardware (x86) Server A Virtualization Hypervisor Server A’  Traditional clustering running within the guest OS  Is this as good as it gets? Clustering SW virtual virtual Traditional “Guest OS” Clustering Clustering SW
  • 8. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 8 Limitations to the Existing Solution  Passive Virtual Machines are standing by, using resources  Additional VM’s cost more $ in application licensing  Individual cluster software overhead  performance issue  Management complexity (hypervisor, servers, OS, apps, scripts) Hardware (x86) Virtualization Hypervisor Hardware (x86) Server A Server B Virtualization Hypervisor Server A’ Server B’ Clustering SW Clustering SWClustering SW Clustering SW virtual virtual virtual virtualApp 1 App 2App 1App 2
  • 9. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 9 VMware HA - Great protection against physical server failure. But… VMware HA Hardware (x86) VMware ESX Hardware (x86) Server A Server B VMware ESX VMware HA Enabled VMware HA Enabled virtual virtual Server A Server B VMware HA Enabled VMware HA Enabled virtual virtual – Does not protect against VM / App / Resource failures – Does not protect from wide area disasters – Does not provide automated response / notification App 1 NIC VMware HA
  • 10. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 10 Hardware (x86) VMware ESX Hardware (x86) Server A VMware ESX virtual Server B virtual VMotion, DRS - Great for planned maintenance & load balancing. But… – Requires virtual machines to be in a running state – Does not protect from unplanned downtime and sudden outages “Vmotion” Server B virtual VMotion, DRS: for “known” activities only
  • 11. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 11 Veritas Cluster Server (VCS)  #1 Market Share in cross-platform server clustering – Source: IDC 2006 IDC Clustering and Availability Software Survey  Provides High Availability and Disaster Recovery all in one package  Supported Platforms: • Windows NT, 2000, 2003 • Linux (RedHat, SUSE) • Solaris, HP/UX, AIX • VMware ESX Server Veritas Cluster Server
  • 12. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 12  Virtual machine and application monitoring – Provides higher level of availability by monitoring application and resources as well as the server  Multi-cluster management and reporting – Manages multiple local and remote clusters in physical and virtual environments from a single console, regardless of OS  Leverage VMware ESX Server advanced features – Recognizes and works seamlessly with VMotion and DRS  Automated Disaster Recovery – Configure / Test / Provide Disaster Recovery using VCS VCS for VMware ESX Server Highlights
  • 13. 13 Hardware Local Cluster Heartbeat Global Cluster Heartbeat VMware ESX Server Console OS Veritas Cluster Server Veritas Cluster Server 5 for VMware ESX Server App Agent App1 Virtual Machine1 App3 Virtual Machine3 App Agent App2 Virtual Machine2 Hardware VMware ESX Server Console OS VCS No Target Virtual Machines Required Shared Storage Hardware-Based Data Replication Primary Site ESX Server Node A Secondary Site ESX Server Node C Hardware VMware ESX Server Console OS VCS No Target Virtual Machines Required Primary Site ESX Server Node B DR Agent DR Agent
  • 14. 14 Hardware VMware ESX Server Console OS Veritas Cluster Server VCS in Action App Agent App1 Virtual Machine1 App3 Virtual Machine3 App Agent App2 Virtual Machine2 Hardware VMware ESX Server Console OS VCS Local Cluster Heartbeat Shared Storage Global Cluster Heartbeat Primary Site ESX Server Node A Secondary Site ESX Server Node C Hardware VMware ESX Server Console OS VCS No Target Virtual Machines Required Primary Site ESX Server Node B DR Agent App3 Virtual Machine3 DR Agent Hardware-Based Data Replication
  • 15. 15 Hardware VMware ESX Console OS Veritas Cluster Server App Agent App1 Virtual Machine1 App3 Virtual Machine3 App Agent App2 Virtual Machine2 Hardware VMware ESX Console OS VCS No Target Virtual Machines Required Local Cluster Heartbeat Shared Storage Global Cluster Heartbeat Primary Site ESX Node A Secondary Site ESX Node C Hardware VMware ESX Console OS VCS No Target Virtual Machines Required Primary Site ESX Node B App Agent App1 Virtual Machine1 App Agent App2 Virtual Machine2 DR Agent DR Agent Hardware-ased Data Replication VCS in Action
  • 16. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 16  Comprehensive availability for the production applications With VMware provides failover for… With VCS Provide added protection for… Physical server failures Physical server failures . Individual virtual server failures . Application failures within the guest OS . Automated disaster recovery Benefits of using VCS 5 for VMware ESX Added Protection
  • 17. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 17 – Granular management, just like a physical environment – Simple to manage (mouse clicks) both Windows and Linux – Automated response and notification to various situations – Maintain resource dependencies Virtual Virtual Benefits of using VCS 5 for VMware ESX Granular Management
  • 18. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 18 – Enforce virtual machine dependencies – Support services that span multiple virtual servers Hardware Hypervisor Virtual Web Server Hardware Hypervisor Virtual Web Server Virtual Web Server Virtual App Server Virtual DB Server Benefits of using VCS 5 for VMware ESX Virtual Dependencies
  • 19. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 19 Benefits of using VCS 5 for VMware ESX Across Data Centers – Maintain availability during a site-wide disaster – Simplified automated disaster recovery process – Have one view of all VCS clusters across the globe – Use one framework to manage multiple data centers One Management Console VMware cluster VMware cluster VMware cluster Solaris cluster Windows cluster HPUX cluster Linux cluster AIX cluster
  • 20. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 20  VCS allows for N+M clusters – No need to have 2x the hardware – Cluster according to performance, cost requirements  VMotion, DRS compatible – Utilize VMware features without complications  No need to install duplicate stand-by failover instances – Only one application to license – Install VCS only once  Fire Drill tool verifies the virtual disaster recovery plan – No impact to the production environment – DR plans should be tested whether it is physical or virtual Benefits of using VCS 5 for VMware ESX Virtual Environment Specific
  • 21. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 21 What is VCS Fire Drill?  Fire Drill is a cloned VCS Service Group modified to use snapshot storage  Fire Drill: – Creates snapshot – Configures snapshot – Imports snapshot – Mounts snapshot – Starts SG on the mount – Requires SF 5.0  Any errors are logged by VCS  Fire Drill SGs are isolated from production SGs VCS Snapshot Primary Site Secondary Site Prod SG FD SG replicate
  • 22. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 22  Standardization – Use the same tools for physical and virtual environments – Pain: Different tools for different platforms is expensive and complex – Value: Reduce training costs, more flexible IT staff VCS for VMware ESX use cases • ZonesZones • CContainersontainers • LPARsLPARs • Micro-Micro- PartitionsPartitions • vParsvPars • nParsnPars • VirtualVirtual MachinesMachines • SecureSecure ResourceResource PartitionsPartitions VERITAS Cluster Server 5 forVERITAS Cluster Server 5 for VMware ESXVMware ESX VERITASVERITAS ClusterCluster Server 5Server 5 forfor UnixUnix VERITASVERITAS ClusterCluster Server 5Server 5 forfor UnixUnix VCSVCS 5 for5 for UnixUnix VCS 5 forVCS 5 for WindowsWindows VCS 5 forVCS 5 for LinuxLinux
  • 23. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 23  Overall protection of the production environment – Pain: Users don’t know the health of the applications and VMs – Value: IT can monitor everything regarding the VM and can have a proven Enterprise Class HA solution for their production applications VCS for VMware ESX Use Cases Hardware VMware ESX Console OS VCS App Virtual Machine App Virtual Machine App Virtual Machine App Virtual Machine Hardware VMware ESX Console OS VCS App Virtual Machine App Virtual Machine App Virtual Machine App Virtual Machine Hardware VMware ESX Console OS VCS App Virtual Machine App Virtual Machine App Virtual Machine App Virtual Machine Hardware VMware ESX Console OS VCS App Virtual Machine App Virtual Machine App Virtual Machine App Virtual Machine VCS for VMware ESX use cases
  • 24. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 24  M+N clusters, P-to-V*, V-to-P*, and V-to-V configurations – Pain: Duplicate hardware for HA/DR is expensive – Value: Arrange servers into cluster configurations that fit your needs VCS for VMware ESX Use Cases Hardw are VMw are ESX Console OS VCS App Virtual Machine App Virt ual Machine App Virtual Machine App Virtual Machine Hardw are VMw are ESX Console OS VCS App Virtual Machine App Virtual Machine App Virt ual Machine App Virt ual Machine App Virtual Machine App Virtual Machine App Virtual Machine App Virtual Machine Hardw are VMw are ESX Console OS VCS App Virtual Machine App Virt ual Machine App Virtual Machine App Virt ual Machine Hardw are VMw are ESX Console OS VCS App Virtual Machine App Virtual Machine App Virt ual Machine App Virt ual Machine App Virtual Machine App Virtual Machine App Virt ual Machine App Virt ual Machine Hardw are VMw are ESX Console OS VCS App Virt ual Machine App Virt ual Machine App Virtual Machine App Virt ual Machine Hardw are VMw are ESX Console OS VCS App Virt ual Machine App Virt ual Machine App Virt ual Machine App Virt ual Machine App Virtual Machine App Virtual Machine App Virt ual Machine App Virt ual Machine Hardw are VMw are ESX Console OS VCS App Virt ual Machine App Virtual Machine App Virtual Machine App Virt ual Machine Hardw are VMw are ESX Console OS VCS App Virt ual Machine App Virt ual Machine App Virtual Machine App Virtual Machine App Virtual Machine App Virtual Machine App Virt ual Machine App Virt ual Machine Hardw are VMw are ESX Console OS VCS App Virt ual Machine App Virt ual Machine App Virtual Machine App Virtual Machine Hardw are VMw are ESX Console OS VCS App Virt ual Machine App Virt ual Machine App Virt ual Machine App Virt ual Machine App Virtual Machine App Virtual Machine App Virtual Machine App Virtual Machine * Requires VCS for Windows/Linux/Unix VCS for VMware ESX use cases
  • 25. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 25  Availability over any distance – Pain: Need disaster recovery solution for VMware environments – Value: Companies can failover virtual machines to remote data centers regardless of distance VCS for VMware ESX Use CasesVCS for VMware ESX use cases
  • 26. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 26 Value to the Data Center With VCS for VMware ESX, Have a virtual environment…  Protected top-to-bottom to run mission critical applications  Using simple-to-use virtual-aware cluster management tools  Integrated Availability Management All-In-One Package site-wide disaster
  • 27. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 27 Q&A For further information: Jiwon Youm, Sr. Product Manager, Virtualization jiwon_youm @ symantec.com Kyle Gleed, Group Technical Product Manager kyle_gleed @ symantec.com
  • 28. © 2006 Symantec CorporationData Center Management Group – Symantec Confidential 28 Mastering Complexity: How to Get Started

Notes de l'éditeur

  1. First, vulnerability. How can we resolve this concern?
  2. Fire Drill splits BCV snaps at remote site, mounts the BCV, then starts the SG on the mount Requires SF 5.0: BCV of a VM diskgroup will create 2 identical diskgroups; SF 5.0 renames the DG on the BCV’s so VM can import them Fire Drill SGs are isolated from production SGs, ensuring no production impact Prevents concurrency violation Walkthrough Setup: VCS HA/DR running as normal Click 1: Initiate Fire Drill. The Fire Drill Agent takes a snapshot of the replicated data (Business Continuity Volume). Click 2: Mount Snapshot. Fire Drill modifies the snapshot volume metadata (via Storage Foundation 5.0) so that the snapshot can be re-imported back on the original host. Fire Drill imports the BCV and mounts the necessary filesystems. Click 3: Test App. Fire Drill starts up the target Service Group and all its required resources. The test SG is a clone of the production SG and does not impact production. The Service Group starts successfully and we know that we are fully protected at this point in time. Click 4: Reset. Fire Drill shuts down the target SG, unmounts the snapshot and returns the snapshot storage to the array.