View Roadshow

download View Roadshow

of 179

Transcript of View Roadshow

VMware View Road Show

Agenda Trace3 Intro Define Your X NetApp Global Dynamic Lab Whats New with vSphere 4.1? Why NetApp? Whats New with View 4.5? Wyse Thin Clients Best Practices for VMware View page 2 | 2010 Trace3. Proprietary and Confidential.

Who is Trace3?Trace3 is a Systems Integrator focused on meeting the needs of companies looking for proven solutions in the following areas:

Storage Networking Data Protection Virtualization Security Microsoft

page 3 | 2010 Trace3. Proprietary and Confidential.

Trace3 LocationsSeattle

Portland

Boise Cheyenne Omaha

San Francisco

Reno

Salt Lake Las Vegas

3:1 Tech to Sales ratioDenver

Trace3 Regions

Los Angeles Phoenix Orange County San DiegoAlbuquerque

LA OC SD

Rocky Mountain Desert Phoenix Pacific Northwest

page 4 |

2010 Trace3. Proprietary and Confidential.

Some of Trace3 Customers

page 5 |

2010 Trace3. Proprietary and Confidential.

Trace3 Services by Manufacturer

page 6 |

2010 Trace3. Proprietary and Confidential.

Define Your

page 7 |

2009 Trace3. Proprietary and Confidential.

Where do you start!1 . Define Your X 2. Discover Starting point 3 . DefineRoute and time - line

5 . Deploy & Document Get

moving , get to work

6 . Validate & SupportManifest of the journey

Limit Distractions , Stay on Track , Reach the Goal6 . Validate & Support

5 . Deploy & 4 . Design 4 . Design Document Products , tools , bestpractices

page 8 |

2010 Trace3. Proprietary and Confidential.

Whats your X ?

Whats your ? How do you plan to get there?

page 9 |

2010 Trace3. Proprietary and Confidential.

Defining your X Understand your Business Requirements Build a Business Case Dont focus on Cost or Technology Define Success

page 10 |

2010 Trace3. Proprietary and Confidential.

Business Reasons for Desktop Virtualization Rein in the costs of PC Management Secure devices and data regardless of location Remain compliant with regulations and mandates Support a changing workforce Planning for disaster or workforce disruption

page 11 |

2010 Trace3. Proprietary and Confidential.

Sample Business CaseCost Manageab ility Security Mobility Reduce CapEx cost compared to traditional PC Reduce deployment times for desktops Reduce OpEx cost associated with PC Centralize management Meet compliance requirements via Management storage Reduce recovery times for PC centralized Provide constant work environment in Extend desktop refresh cycle to 5 - 6 failures Deploy comprehensive security the office or on the road years framework Enable Bring Your Own PC ( BYOPC )

page 12 |

2010 Trace3. Proprietary and Confidential.

Your X DefinedSecure Anytime Anyplace Any device Automated Provisioning Private Cloud

VMware vSphere

VMware vSphere

page 13 |

2010 Trace3. Proprietary and Confidential.

Servers?! Intel Core 2 Duo Think Xeon 7500/5500

Large Rackmount Think Blade Chassis

8-16 GB RAM Think 32GB+ of RAM

L I A F

page 14 |

2010 Trace3. Proprietary and Confidential.

Network?! 100mb Hubs? Think 10GB Ethernet

Individual Interfaces Think VLAN Trunking

L I A F

page 15 |

2010 Trace3. Proprietary and Confidential.

Storage?! Direct Attached Disk Think NAS/SAN

FC vs iSCSI or NFS Think NFS or iSCSI

L I A F

Best Practices for running VMware vSphere on Network Attached Storage http://vmware.com/files/pdf/techpaper/VMware-NFS-BestPractices-WP-EN.pdfpage 16 | 2010 Trace3. Proprietary and Confidential.

Desktops High End Graphics Keep Standalone

CPU Intensive Keep Standalone

L I A F

page 17 |

2010 Trace3. Proprietary and Confidential.

Cost!? VDI is cheaper than Traditional Desktops Think Again

VDI leverages existing Virtualization Investment Think about Scale

page 18 |

2010 Trace3. Proprietary and Confidential.

NetApp Global Dynamic LabBuilding a 50,000 Seat VMware View 4.5 Deployment: A Collaboration by Cisco, VMware, NetApp, Fujitsu and WYSE

page 19 |

2010 Trace3. Proprietary and Confidential.

Agenda Project Overview Partner Collaboration The Pod Based Architecture Solution Components Benefits of shared storage in VDI Value to customer

page 20 |

2010 Trace3. Proprietary and Confidential.

50,000 Seat VDI Deployment Worlds largest documented VDI deployment Industry leaders collaborating together Cutting edge software: View 4.5, Windows 7 Validates performance and scalability of solution Proof-point for technology, integration, and partnerships

page 21 |

2010 Trace3. Proprietary and Confidential.

Goals of the Reference Architecture1.Create a POD" design that is

Scalable Cost Effective / Efficient High Performing Proven

2.Thorough solution component testing

Hypervisor, Server, Network, Storage, Thin Clients View 4.5, Windows 7 VMware RAWC tool

page 22 |

2010 Trace3. Proprietary and Confidential.

3.Provide a blueprint to customers

5000 Seat Pod ArchitectureWYSE Zero Client

VMware View 4.5 Windows 7 Vmware vSphere 4.1

Connection Broker

Hypervisor

Cisco UCS 5100 Blade Server

Cisco UCS 6100 Fabric Interconnect

Cisco Nexus 5020 Cisco Nexus 7018

NetApp FAS 3170 Cluster

page 23 |

2010 Trace3. Proprietary and Confidential.

Management ArchitectureVMware View 4.5 3 Connection Brokers (5000 Desktops) VMware View 4.5 VMware View 4.5

HA / DRS Cluster

HA / DRS Cluster

HA / DRS Cluster

HA / DRS Cluster

2500 VMs / vCenter (30 ESX Hosts)

2500 VMs / vCenter (30 ESX Hosts)

60 ESX Servers (Cisco UCS)

page 24 |

2010 Trace3. Proprietary and Confidential.

Benefits of Shared Storage for VDI Manageability Automatic Migrations DRS Hardware Assisted VM Cloning Centralized Management of Infrastructure & Images

Multi-Protocol Datastores & User Data Resiliency VMware HA Backup and recovery/data protection Disaster Recoverypage 25 | 2010 Trace3. Proprietary and Confidential.

W h a t N e tA p p T e ch n o l g y w a s u se d o M a n a g e m e n t & D e p l ym e n t o V S C 2 .0

P e rfo rm a n ce D e d u p l ca ti n i o Fl sh C a ch e a T ra n sp a re n t S to ra g e C a ch e S h a ri g n

C o st E ffe cti n e ss ve D e d u p l ca ti n & S to ra g e E ffi e n t C l n i g i o ci o n

page 26 |

2010 Trace3. Proprietary and Confidential.

A ch i ve si n i ca n t co st re d u cti n s e g fi o

Users @ 25GB Number of NetApp Gold Datastores Number of Datastores Traditional Traditional Storage Requirement NetApp Storage Needed NetApp Storage Savings NetApp Storage Savings

250 1 1 6 TB 74 GB 6 TB 99 %

5000 2 20 115 TB 148 GB 115 TB 99 %

50000 20 200 1 , 150 TB 2 , 960 GB 1 , 147 TB 99 %

Note: Data savings based on initial deployment of virtual machinespage 27 | 2010 Trace3. Proprietary and Confidential.

Pod-based architecture Easily expandable Predictable performance

Virtual Desktopspage 28 | 2010 Trace3. Proprietary and Confidential.

50 , 000

Summary Proof-point for integrated technologies Example of collaborative partnerships Validation of multi-vendor solution Reference architecture as starting point

page 29 |

2010 Trace3. Proprietary and Confidential.

NetApp Video

page 30 |

2010 Trace3. Proprietary and Confidential.

Whats new with vSphere 4.1?

page 31 |

2010 Trace3. Proprietary and Confidential.

VMware Business Infrastructure Solution AreasDatacenter SolutionsConsolidationDecrease capital expense Simplify infrastructure Delay facility expansion

Enabling a more dynamic, flexible service model, at lower costs

ManagementDecrease operating expense Manage SLAs , not components Automate the mundane , simplify the complex

Business ContinuityEnsure high availability at low cost Recover quickly and efficiently Guarantee service levels App Dev

Desktop SolutionsEnabling desktop as a serviceUser access across boundaries Desktop as a service , without the headache Increase security and control

Cloud ServicesEnabling the bridge to the external cloud

Optimizing application development to deploymentSimplify test set - up and execution Speed time to market and improve quality Leverage modern application framework

& Test

Single way to run , manage and secure applications both internal and via external clouds Broadest choice of leading cloud service providers

VMware vSphere

page 32 |

2010 Trace3. Proprietary and Confidential.

VMware vSphere 4.1: Whats New?vCenter Server ( 64 - bit )HA Diagnostic s And Healthcheck vMotion Speed and Scale Update Manager Enhancements Virtual Serial Port Concentrator More VMs ( per cluster , DC ) More Hosts ( per VC , DC )

s c i v r e S

n o t a c i l p A

AD Integratio n (host)

Availabi lity

Security

Scalabil ity

VMware vSphere 4.1s c i v r e S e c u t s a r f n IvCompute vStorageStorage I/O Control More Performanc e Metrics APIs for Array Integration

vNetworkNetwork I/O Control Load Based Teaming IPv6 NIST Performance +

Memory Compress ion Host Affinity

page 33 |

2010 Trace3. Proprietary and Confidential.

vSphere 4.1 Delivers Cloud Scale

3,000 VMs / cluster (2x) 500 hosts / vCenter (5x) 10,000 VMs / vCenter (3x)

99% of VMwares 170K Customers Can Run Their Entire Datacenter in a Single VMware Cluster*page 34 | 2010 Trace3. Proprietary and Confidential.

E n h a n ce d S ca l b i i D e fi e d a l ty nvSphere 4 vSphere 4 . 1 RatioVMs per host Hosts per cluster VMs per cluster Hosts per VC

320 32 1280 300

320 32 3000 1000 15000 10000 120 500 5000

1x 1x >2x >3x >3x >3x 4x 5x 2x

Registered VMs per VC 4500 Powered - On VMs per VC 3000 Concurrent VI Clients 30 Hosts per DC VMs per DC

100 2500

page 35 |

2010 Trace3. Proprietary and Confidential.

Migration to ESXi with vSphere 4.1 Recommended that all vSphere 4.1 deployments use the ESXi Hypervisor vSphere ESXi 4.1 Fully Supports Boot From SAN for FC, iSCSI and FCoE vSphere 4.1 is the last release with the ESX hypervisor (ESX with Service Console) Visit the ESXi Upgrade Center -

http://www.vmware.com/products/vsphere/esxi-upg /

page 36 | 2010 Trace3. Proprietary and Confidential.

ESXi to ESX Info Center

page 37 |

2010 Trace3. Proprietary and Confidential.

vCenter Server Migration to 64-bit vCenter Server MUST be hosted on 64-bit Windows OS 32-bit OS NOT supported as a host OS with vCenter vSphere 4.1

Why the change? Scalability is restricted by the x86 32 bit virtual address space and moving to 64 bit will eliminate this problem Reduces Dev and QA cycles and resources (faster time to market)

Two Options1. vCenter Server in a virtual machine running 64-bit Windows OSpage 38 | 2010 Trace3. Proprietary and Confidential.

Storage I/O ControlDescriptionSet storage quality of service priorities per virtual machine

BenefitsBasic - Make storage access rights equal between VMs Advanced - Prioritize use of storage (similar to how compute is prioritized with vSphere) per VM Business priorities now define low and high priority storage resource access Create the high speed or HOV lane for VMs

Beta Feedback

I really feel that the Storage I/O Control is a must have for our environment and we should move forward without delay.

Proof Point

1 . All VMs created equal Guarantee service levels for access to storage resourcespage 39 | 2010 Trace3. Proprietary and Confidential.

2 . Make Your Mission Critical VMs VIPs

Storage I/O Control (SIOC)CPU shares: Highonline store

CPU shares: HighMicrosoft Exchange

CPU shares: Lowdata mining

Memory shares: High

Memory shares: High

Memory shares: Low

I/O shares: High

I/O shares: High

I/O shares: Low

32GHz 16GB

Datastore A

page 40 |

2010 Trace3. Proprietary and Confidential.

Storage Performance ReportingDescriptionDeliver of key storage performance statistics in vCenter

BenefitsGranular storage reporting for improved tuning and troubleshooting performance Independent of storage architectures and protocols

Beta Feedback

In the monitoring area, the enhanced storage statistics are very useful

Proof Point

Real-Time and Historical Trending for Storage

page 41 |

2010 Trace3. Proprietary and Confidential.

Network I/O ControlDescriptionSet network quality of service priorities per flow type (iSCSI, NFS, etc.)

BenefitsBasic - Make network access rights equal between flow types Advanced - Prioritized use of network, especially in 10 Gbit environments Business priorities now define low and high priority network resource access as needed Create the high speed or HOV lane for VMs iSCSI FT NFS

Beta Feedback

The new Network I/O control feature is very interesting for consolidating network links with 10Gbit.

vMotion

Proof Point

TCP/IP

Guarantee service levels for access to network resourcespage 42 | 2010 Trace3. Proprietary and Confidential.

Distributed Switch

10 GigE

vMotion Performance and Scale EnhancementsDescriptionAdding Cloud Scale to online virtual machine migration (a VMware key differentiator) Beta Feedback This release product has some nice benefits in particular increased vMotion capabilities.

BenefitsPerformance and Scalability More Live Migrations in Parallel (up to 8 per host pair) Elapsed time reduced by >4.5x on 10GbE tests

Point

Proof

5x faster with the 4.1 platform release

page 43 |

2010 Trace3. Proprietary and Confidential.

Memory CompressionDescriptionA new hierarchy for VMwares memory overcommit technology (a VMware key differentiator)

BenefitsOptimized use of memory Safeguard for using memory overcommit feature with confidence Performance

Beta Feedback

Great for memory oversubscription.

Proof Point OS

1,000x faster than swap-in!Hypervisorpage 44 | 2010 Trace3. Proprietary and Confidential.

DRS Host AffinityDescriptionSet granular policies that define only certain virtual machine Movements

BenefitsTune environment according to availability, performance, and/or licensing requirements Cloud enablement

Beta Feedback

Awesome, we can separate VMs between data centers or blade enclosures with DRS host affinity rules

Proof Point

Mandatory Compliance Enforcement for Virtual MachinesVMs A Servers A Onlypage 45 | 2010 Trace3. Proprietary and Confidential.

VMs B Servers B Only

HA EnhancementsDescriptionHealthcheck status Operational window Optimized interaction with DRS Application-Aware API Beta Feedback Major improvements in DRS!

BenefitsEvent or alarms when configuration rules are broken No click status (cluster status available at all times) Move VMs to the Best Host Available Application awareness (with supported solution)

Point

Proof

Adding Another 9 to Availability

page 46 |

2010 Trace3. Proprietary and Confidential.

Fault Tolerance (FT) EnhancementsDRS

FT Primary VM

FT Seconda ry VM

FT fully integrated with DRSDRS load balances FT Primary andSecondary VMs. EVC required.

Versioning control lifts requirement on ESX build consistencyResource Pool

Primary VM can run on host with adifferent build # as Secondary VM.

Events for Primary VM vs . Secondary VM differentiatedEvents logged/stored differently.

page 47 |

2010 Trace3. Proprietary and Confidential.

vStorage APIs for Array Integration (VAAI)vStorage APIs for Array Integration

VMware vSphere

Storage vMotion

Provision VMs From Template

Improve Thin Provisioning Disk Performance VMFS Share Storage Pool Scalability

page 48 |

2010 Trace3. Proprietary and Confidential.

Storage vMotion with Array Full Copy Function Benefits Zero-downtime migration Eases array maintenance, tiering, load balancing, upgrades, space mgmt

Challenges Performance impact on host, array, network Long migration time (0.5 - 2.5 hrs for 100GB VM) Best practice: use infrequently

Improved solution Use arrays native copy/clone functionalitypage 49 | 2010 Trace3. Proprietary and Confidential.

VAAI Speeds Up Storage vMotion - Example

42:27 - 39:12 = 2 Min 21 sec w/out (141 seconds) 33:04 - 32:37 = 27 Sec with VAAI 141 sec vs. 27 sec

page 50 |

2010 Trace3. Proprietary and Confidential.

VM Provisioning from Template with Full Copy Benefits Reduce installation time Standardize to ensure efficient management, protection & control

Challenges Requires a full data copy 100 GB template (10 GB to copy): 5-20 minutes FT requires additional zeroing of blocks

Improved Solution Use arrays native copy/clone & zeroing functionspage 51 | 2010 Trace3. Proprietary and Confidential.

Up to 10-20x speedup in provisioning time

C o p yi g D a ta O p ti i d C l n i g w i n m ze o n th VAAIVMFS directs storage to move data directly Much less time!Up to 95% reduction

Dramatic reduction in load on:Servers Network Storage

page 52 |

2010 Trace3. Proprietary and Confidential.

Scalable Lock Management A number of VMFS operations cause the LUN to temporarily become locked for exclusive write use by one of the ESX nodes, including: Moving a VM with vMotion Creating a new VM or deploying a VM from a template Powering a VM on or off Creating a template Creating or deleting a file, including snapshots

A new VAAI feature, Hardware Assisted Locking (atomic test and set) allows the vSphere host to offload the management of the required locks to the storage and avoids locking the entire VMFS file system. 2010 Trace3. Proprietary and Confidential.

page 53 |

V M FS S ca l b i i w i H a rd w a re A ssi d a l ty th ste Lo cki g n M a ke s V M FS m o re sca l b l o ve ra l , b y a e l o ffl a d i g b l ck l cki g m e ch a n i o n o o n sm

Using Atomic Test and Set (ATS) capability provides an alternate option to use of SCSI reservations to protect the VMFS metadata from being written to by two separate ESX Servers at one time.

Normal VMware Locking (No ATS)

Enhanced VMware Locking (With ATS)

page 54 |

2010 Trace3. Proprietary and Confidential.

For more details on VAAI vSphere 4.1 Documentation also describes use of this features in the ESX Configuration Guide Chapter 9 (pages 124 - 125) Listed in TOC as Storage Hardware Acceleration Three setting under advanced settings: DataMover.HardwareAcceleratedMove DataMover.HardwareAcceleratedInit VMFS3.HarwareAcceleratedLocking Assisted Locking Full Copy Block Zeroing Hardware

page 55 |

Will only support block based storage in 4.1 NetApp Integration with VMware 2010 Trace3. Proprietary and Confidential.

Why NetApp?

page 56 |

2010 Trace3. Proprietary and Confidential.

Unified: much more than multi-protocolProtocolsFC FCoE iSCSI NFS CIFS

Low-to-High Scalability

Unified Management Same tools & processes: learn once, run everywhere Integrated data management Integrated data protection

Multi-Vendor Virtualisation

Cost/PerformanceFlash Cache SSD FlexCache

One Architecture, One O/Spage 57 | 2010 Trace3. Proprietary and Confidential.

NetApp Flash Cache

page 58 |

2010 Trace3. Proprietary and Confidential.

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

D S4243

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

Alleviates Storms Reduces Disk IO Deduplication Aware Extend and Optimize

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

D S4243

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

D S4243

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

D S4243

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

page 59 |

2010 Trace3. Proprietary and Confidential.

Benchmarked FAS3160 Configs224 FC drives 64TB

Reduc e45 0GB 4 5 0 GB 4 5 0 GB 45 0GB 4 5 0 GB 4 5 0 GB 45 0GB 4 5 0 GB 4 5 0 GB 45 0GB 4 5 0 GB 4 5 0 GB 45 0GB 4 5 0 GB 4 5 0 GB 45 0GB 4 5 0 GB 4 5 0 GB

75% Fewer More Spindles Capacity

50%

45 0GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

Cost Rack Space Power Cooling4 5 0 GB

96 SATA drives 56 FC drives 16TB 96TB

D S4243

4 5 0 GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

D S4243

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

45 0GB

4 5 0 GB

4 5 0 GB

4 5 0 GB

FC Baseline Configuration

FC + Flash Cache SATA + Flash Cache Configuration

Fewer Drives, Equal Performancepage 60 | 2010 Trace3. Proprietary and Confidential.

page 61 |

2010 Trace3. Proprietary and Confidential.

VM DISK

VM DISK

VM DISK

Remember NetApp Does the Same with Transparent Page Storage Sharing?

NetApp Deduplication

page 62 |

2010 Trace3. Proprietary and Confidential.

Transparent Storage Cache Sharing

AND

page 63 |

2010 Trace3. Proprietary and Confidential.

ESX Cluster VM Datastore VM VM VM

Cache Deduplication Data

Set Without Extended BuiltItinto Works And with Data with Forget Migration Flash It! ONTAP ANY Cache Dataset

VM

VM

VM

VM

TSCS Storage Cache

VM

VM

VM

VM

Disk Storage NetApp FAS Array Traditional Array

page 64 |

2010 Trace3. Proprietary and Confidential.

page 65 |

2010 Trace3. Proprietary and Confidential.

Virtual Servers AND Desktops

page 66 |

2010 Trace3. Proprietary and Confidential.

Exchange 2010

PsstExchange Single Instance Storage is going away!page 67 | 2010 Trace3. Proprietary and Confidential.

Deduplicate AND Data Works with Encapsulated AccelerateOST OST OST

User Data Disk (VMDK)

User Data Disk (VMDK)

User Data Disk (VMDK)

VMFS or NFS Datastore NetApp WAFL (dedupe layer)

Transparent to UsersPsst Its not file level dedupe and compressionpage 68 | 2010 Trace3. Proprietary and Confidential.

NetApp VSC 2.0

page 69 |

2010 Trace3. Proprietary and Confidential.

Automated setting of best practices

page 70 |

2010 Trace3. Proprietary and Confidential.

page 71 |

2010 Trace3. Proprietary and Confidential.

page 72 |

2010 Trace3. Proprietary and Confidential.

page 73 |

2010 Trace3. Proprietary and Confidential.

page 74 |

2010 Trace3. Proprietary and Confidential.

Datastore VM VM VM VM

Virtual Machine

Cloning

VM Template Datastore

NetApp Storage Array

page 75 |

2010 Trace3. Proprietary and Confidential.

Datastore VM VM VM VM

Virtual Machine

Redeploy

VM Template Datastore

NetApp Storage Array

page 76 |

2010 Trace3. Proprietary and Confidential.

Data Protection for Any Failure

VMware HA

VMware vCenter Site Recovery Manager

MetroClu ster

Thin Replication

Building 1

Building 2

DR Site

Issue User error : Data corruption: System or site failure: Regional disasters: Planned Downtime:page 77 | 2010 Trace3. Proprietary and Confidential.

NetApp Solution End-user recovery (Snapshots ) Instantaneous restores Transparent failover Recover in minutes Zero planned downtime

Application MobilityPrimary Site Secondary Site

AP P O

A A SP S P O O P P S S

AP P O

A P O P S

A P O P S

Host load balancing or maintenance Datastore capacity management

Use Case

VMware VMotion VMware Storage VMotion

Solution

page 78 |

2010 Trace3. Proprietary and Confidential.

78

Application MobilityPrimary Site Secondary Site

AP P O

A SP O P S

AP P O

A SP O P S

A P O P S

A P O P S

Host load balancing or maintenance Datastore capacity management Array balancing, maintenance or refreshpage 79 | 2010 Trace3. Proprietary and Confidential.

Use Case

VMware VMotion VMware Storage VMotion NetApp DataMotion

Solution

79

Application MobilityPrimary Site Secondary Site

Application Application data availability access not Impacted over long distances using NetApp can introduce FlexCache latency

AP P O

A SP O P S

AP P O

A SP O P S

A P O P S

A P O P S

A P O P S

Host load balancing or maintenance Datastore capacity management Array balancing, maintenance or refresh Data mobility without affecting availability page 80 | 2010 Trace3. Proprietary and Confidential.

Use Case

VMware VMotion VMware Storage VMotion NetApp Data Motion NetApp, Cisco, VMware Long Distance VMotion

Solution

Dev/QA Environment

Production Environment

Desktop Environment

VMware

VMware

VMware

Secure environments traditionally everything Virtualize require dedicated resources Inefficient and inflexible Costly to deploy Unified computing and manage Low utilization rates Difficult to change Unified fabric one wire How to gain efficiencies of virtualization while maintaining security?

Unified storageDev/QA Prod Desktop

Secure Multi-tenancy

page 81 |

2010 Trace3. Proprietary and Confidential.

Multi-TenancyCloud Administrator

NetApp MultiStorevFiler vFiler vFiler vFiler

Tenant A

Tenant B

Tenant C

Tenant D

Tenant B

page 82 |

2010 Trace3. Proprietary and Confidential.

Additional References VMware View Reference Architecture VMware View http://www.vmware.com/products/view/

http://www.vmware.com/resources/techresources/10

VMware VDI Best Practices on NetApp Storage http://media.netapp.com/documents/tr-3705.pdf

VMware / Cisco / NetApp2000 Seat VDI Reference Architecture http://media.netapp.com/documents/tr-3770.pdf

Deploying VDI with VMware View and NetApp

http://www.vmware.com/files/pdf/resources/VMware_page 83 | 2010 Trace3. Proprietary and Confidential.

Whats new with View 4.5?

page 84 |

2010 Trace3. Proprietary and Confidential.

V i a l za ti n & C l u d M a n a g e m e n t rtu i o oEnd User Computing

Provision & deploy desktops rapidly Manage workstation images simply Deliver virtualized applications to desktop

End - User Computing Management

Cloud Applications

Encapsulate applications into containers IT Business Managemen with vApps Govern cloud provisioning pr Assure application portability & performance cloud software license Track Establish service contracts with infrastructure Standardize cloud partitions

Application Management

Infrastructure & Operations ManagementPublic / Private / Hybrid Cloud Virtualized Infrastructure

Create a zero-touch, compliant infrastructure Build automation into platform Deliver self-service through policy-driven control

VMware Management Solutionspage 85 | 2010 Trace3. Proprietary and Confidential.

Deliver desktops as a managed servicePlatformVMware vSphere for desktops

Management

VMware View Manager Vmware View Composer VMware ThinApp

User ExperiencePCoIP Print Multi-monitor display Multimedia USB redirection

page 86 |

2010 Trace3. Proprietary and Confidential.

Components of Desktop as a Managed ServiceUsability Flexibility

User Experience

View Client PCoIP Protocol Local Mode

Reduce IT Costs

Simplicity Efficiency Security

Management

View Manager View Composer ThinApp

Availability Reliability Scalability

Platform

vSphere for Desktops

page 87 |

2010 Trace3. Proprietary and Confidential.

PCoIP Improvement and Changes Smart Card Support & Online Certificate Status Protocol (OCSP) Certificate Revocation

Location Based Printing & Awareness Custom display topology with zero clients FIPS140-2 compliance application Port Change to 4172 Improved WAN Performance Details on next slide

page 88 |

2010 Trace3. Proprietary and Confidential.

PCoIP WAN Improvements in View 4.5 Four changes added to View 4.5 compared to improve WAN performance: Improved image quality management Improved network bandwidth estimation Improved out of order packet resilience Imaging selective packet retransmit

Anticipated Impacts on WAN Experience Higher image quality without impacting bandwidth consumption Improved imaging performance in low bandwidth situations Improved performance when sharing network with multiple PCoIP sessions or other TCP trafficpage 89 | 2010 Trace3. Proprietary and Confidential.

No service degradation when tested with Juniper, F5, OpenVPN, and Cisco SSLVPN solutions

Why PCoIP protocol does well on WAN PCoIP protocol uses host-side rendering to avoid client redirection latency limitations PCoIP protocol uses UDP to transfer realtime audio and image data optimally (no resending of stale packets required) PCoIP protocol dynamically adjusts image quality and frame rate based on available bandwidth PCoIP protocol is able to use lossy compression on images and audio when network is constrained 2010 Trace3. Proprietary and Confidential.

page 90 |

Planning for PCoIP Plan for 200-250kbps average bandwidth for a typical basic office productivity desktop Plan for 500kbps - 1 Mbps minimum peak bandwidth to provide headroom for bursts of display changes Plan for 1Mbps per simultaneous user running 480p video Plan for less than 70-80% network utilization Assumptions are based on 8-10 hours continuously usage, Bandwidth estimation (250Kbps/0.80) * 5 = 1.5Mbps T1page 91 |

2010 Trace3. Proprietary and Confidential.

Win7 OS Support Guest and Client Supporting Windows 7 32-bit and 64-bit as a client and remote desktop Virtual desktop related improvements Jumplist integration GPO PowerShell 2.0 cmdlets Location-aware printing RDP7

True multi-monitor and Multimedia redirection support MMR is enabled by default and cannot be disabledpage 92 | 2010 Trace3. Proprietary and Confidential.

Aero support for RDP7 client

Mobility & Bring Your Own Computer View Client with Local Mode (Type 2 Hypervisor) Virtual desktop is checked-out to local endpoint and encrypted Access desktop, applications and data regardless of network availability Changes are checked in to the datacenter when online Extend IT security policies to local desktopView Manager

page 93 |

2010 Trace3. Proprietary and Confidential.

W h a t s ch a n g e d si ce e xp e ri e n ta l n m O ffl n e V D I i ?CapabilityRobust Transfer Infrastructure Centralized Data Control Improved Security

DetailsSeparate "Transfer Server" instances for scalable download/upload of VM data VM data is optimized, compressed & deduplicated (e.g. no more copying page-file bits) Optional use of 3rd party HTTP proxy caches for optimized provisioning to remote sites View Composer derived base images can be pre-loaded via alternate media

Admin can initiate "replication" of user changes back to server on demand Admin policy enforcement of whether or not users can initiate checkin or replication

Disaster Recovery Infrastructure Cost Savings Latest Runtime Platform

Checked out desktops all encrypted with AES (128-bit by default, 256-bit option) SmartCard Authentication Support Admin can remotely revoke end user access to a checked out desktop* Admin can set policy for how frequently a client must get in touch with the server for updates/enforcement (or be deactivated)* Policy controls to allow/disallow access to USB devices like thumb-drives* Delta-Disk replication can be scheduled to occur automatically If client device is subsequently lost/destroyed, desktop can be easily reconstituted from last replicated image

Pools can be configured as "local only" to save on server & storage CAPEX Supports VM provisioning with View Composer Checked out VMs can be based on Linked Clones for further storage cost reduction

Uses latest VMware virtualization platform for great end user experience... High quality multimedia & audio (play HD moves, YouTube videos, etc) 3D with DirectX9c and Windows 7 Aeroglass Effects support Hardware accelerated encryption/decryption with Intel AES-NI capable chipsets Support for Windows 7, XP and Vista host and guest Operating Systems

page 94 |

2010 Trace3. Proprietary and Confidential.

Local Mode Administration All local desktops: Require user authentication to run Are completely encrypted Must periodically heartbeat with View Connection Server for management

Policies affecting local desktops: Can the desktop be used locally? How long can the local desktop go without server contact? What part of the local desktop should be replicated? (Linked clone desktops only) How often should the desktop be replicated? Is the user allowed to initiate replication? Check in? Rollback?

Rollback Discard a local desktop and make server side desktop live

Initiate Replicationpage 95 | 2010 Trace3. Proprietary and Confidential.

Schedule a one-off replication on next client contact

Smart Card Authentication Support PCoIP and RDP Revoked certificates may be published through OCSP / CRL Cached and encrypted PIN entry for Local Mode smart card logon Storage of multiple credentials for public key infrastructure (PKI), one-time password (OTP), and static passwords on a single authentication device Support for leading smart card manufacturers, remote access solutions, thin clients, and productivity applications Capability to establish specific policies for certificates, PIN management and notification Support for smart card standards direct SSO

page 96 |

2010 Trace3. Proprietary and Confidential.

Components of Desktop as a Managed ServiceUsability Flexibility

User Experience

View Client PCoIP Protocol Local Mode

Reduce IT Costs

Simplicity Efficiency Security

Management

View Manager View Composer ThinApp

Availability Reliability Scalability

Platform

vSphere for Desktops

page 97 |

2010 Trace3. Proprietary and Confidential.

Scalability Broker Level Broker Pod and Teaming Federated Pool Management Floating & Dedicated Pools Non-Persistent Pool Refresh & Re-Compose

View Composer Tiered Storage Local Disk Storage Support Disposable Disks All Users directory is no longer copied during customization Thin-Provisioned Diskspage 98 | 2010 Trace3. Proprietary and Confidential.

Admin Enhancements You Asked For View Manager Admin UI ported to Adobe Flex Dashboard View Reporting DB Delegated Admin Security Server Setup Improvement

Desktop Administrator User location and Filters Individual VM view - Correlation with vCenterpage 99 | 2010 Trace3. Proprietary and Confidential.

Integrated Dashboard UI

page 100 |

2010 Trace3. Proprietary and Confidential.

System Auditing and Monitoring

page 101 |

2010 Trace3. Proprietary and Confidential.

Federated Pool Management Feature introduction Total number of VMs can be architected by View Manager(s) up to 10,000 (per vCenter) Number of brokers: 5 + 2 (redundancy) DMZ Security server: 1 + 1 (redundancy) External/internal users: 20/80 Concurrent online users: 100% Maximum sustained rate of logons: 5 per second across all brokers

Concepts Behind the Feature Management was the big cost when scaling. Federated Pool Management: Each VM managed by one broker only

Adding brokers does not increase management load.page 102 | 2010 Trace3. Proprietary and Confidential.

View Connection Servers (View Manager)

page 103 |

2010 Trace3. Proprietary and Confidential.

View Security Server Pairing Enable security servers to be automatically paired with their broker at installation time Enable configuration changes RDP made on the Broker to be propagated to the security serverCentralized Virtual Desktops

Microsoft Active Directory

vCenter View Connection Server

SSO

Teaming Security Server ( s )

View Client

page 104 |

2010 Trace3. Proprietary and Confidential.

Transfer Server and Transfer Server Repository The Transfer Server is a new View server role Required for checking out desktop if you plan to use Local Mode Installed in a VM with access to the datastores containing the desktop VMs Windows 2003 and 2008 32bit / 64bit Requires LSI parallel disk controller Stateless without UI using JMS Managed by View Manager Contains an Apache installation as client facing interface to read and write desktop data Multiple Transfer Servers can be used for scalability

Transfer Server Repository is a customer supplied UNC file share View Composer based pools requires Transfer Server for local modepage 105 | 2010 Trace3. Proprietary and Confidential.

Faster checkout

ThinApp Management Feature introduction Associate ThinApp assignment and delivery at desktop pool level Once entitled, it supports visibility into ThinApp status on desktops Event auditing

Benefits Integrates View and ThinApp functionality Providing ease of management and delivery capabilities Dashboard overview of current ThinApps in a client environmentpage 106 | 2010 Trace3. Proprietary and Confidential.

View Composer

page 107 |

2010 Trace3. Proprietary and Confidential.

View Composer Updated Features Support for SysPrep Refresh, Recompose and Rebalance for Non-Persistent Pools Tiered Storage Support Persistent Disk Management Detach/Reattach/Archive

page 108 |

2010 Trace3. Proprietary and Confidential.

Sysprep Support Feature introduction Support Sysprep and Quickprep for linked clone guest VMs

Why Sysprep Supported by Microsoft as the only customization method Generates each VM with unique SID Some software (NAC, AV etc) might requires unique SID for licensing control

Restrictions Once a pool is configured either Sysprep or Quickprep, cannot be changed Sysprep is only supported if the pool is using vSphere mode (homogeneous clusters of 4.0 or higher ESX servers)page 109 | 2010 Trace3. Proprietary and Confidential.

Recompose will generate a new SID for a VM created

Sysprep Support

page 110 |

2010 Trace3. Proprietary and Confidential.

Sysprep Support : Installation and Configuration Installation Install Sysprep on the vCenter server Sysprep functionality is built into the Vista or Win7 OS

View Manager Pool must be configured to use vSphere mode

Linked clone master image View agent with View Composer option must be installed The master image does not need to be joined to the domain For Win7, Volume Licensing must be configured (Microsoft Key Management System server or Multiple Activation Key)page 111 | 2010 Trace3. Proprietary and Confidential.

View Composer Storage Savings View Composer / View achieves storage cost reduction through: Allow storage over-commit Uses delta disks for OS disks and thin provisions user data disks Control the growth of storage via rebalance

page 112 |

2010 Trace3. Proprietary and Confidential.

Persistent Disk Management Persistent disks are now the first class objects by View Manager Why? When VMs in dedicated pools were deleted, user data could be lost if the persistent disks were deleted Administrators have options to save user data disks (persistent disks) and manage them

Restrictions Recreate desktop can only be done with vSphere pools Attach Persistent Disk can only be attached to VMs in vSphere pools By default disks are archived at the root level of the same datastore they are in. This can be changed if only a single disk is archived.page 113 | 2010 Trace3. Proprietary and Confidential.

Persistent Disk Management: Screen shots Attached Disks

page 114 |

2010 Trace3. Proprietary and Confidential.

Components of Desktop as a Managed ServiceUsability Flexibility

User Experience

View Client PCoIP Protocol Offline

Reduce IT Costs

Simplicity Efficiency Security

Management

View Manager View Composer ThinApp

Availability Reliability Scalability

Platform

vSphere for Desktops

page 115 |

2010 Trace3. Proprietary and Confidential.

O p ti i d C l u d I fra stru ctu re P l tfo rm m ze o n a Scalability: Built for the largest desktop environments 1000s of VMs/pod Faster and more efficient vMotion leading to decreased migration time for VMs Shrink and grow desktops based on demand and priority Dynamic Resource Allocation

High Performance Optimized for desktop workloads Performance acceleration due to lower memory swapping

Best Density Increased desktop VM density 16-20 VMs/core

High Availability and Business Continuitypage 116 | 2010 Trace3. Proprietary and Confidential.

Simplified AV with vShield Endpoint Improve performance and effectiveness of existing endpoint security solutions Offload AV activity to Security VM (SVM) Eliminate desktop agents and AV storms Enable comprehensive desktop VM protection Centrally manage AV service across VMs with detailed logging of AVSVMAV

VMPersona APP OSKernel BIOS

VMPersona APP OSKernel BIOS

VMPersona APP OSKernel BIOS

Hardened

OS

Introspectio n

VMware vSphere

page 117 |

2010 Trace3. Proprietary and Confidential.

Tiered Storage What is tiered storage? Place replicas on a single datastore separate from linked clones The replicas can be shared by all linked clones

Why SSD for Replicas? Use high-performance solid state disks (SSDs) to create replicas Dynamically improve performance of linked clones

Notes vSphere mode only (All ESX servers are 4.0 or higher) Only a single datastore can be selected for replicas The datastore for replicas must be connected to all ESX hosts in the cluster Use with caution as the replica datastore creates a single point of failurepage 118 | 2010 Trace3. Proprietary and Confidential.

Tiered Storage

page 119 |

2010 Trace3. Proprietary and Confidential.

Tiered Storage: Administration The datastore used for replicas can be changed - it will only affect Newly created VM Recomposed VM Rebalanced VM

If a separate datastore for replicas is de-selected and cannot be found The new VMs, recomposed, or rebalanced VMs will use the OS datastores for replicasReplicas Linked Clone DT OS/Delta 1 Replicas Base Images

View 4.5: Delta Training Revision 1.0

page 120 |

2010 Trace3. Proprietary and Confidential.

View Composer Feature: Disposable Disk What is disposable disk? Windows and Windows applications writes temporary/paging files to disk These updates are usually deleted after use and space be reused by guest OS

Why? Before, the volume couldnt be reclaimed by VMFS When refreshed on linked clone, it caused persistent data in C:\ drive lost

Benefits: Provides a zero impact to user and lightweight method to reclaim disk space of OS paging file and temporary files.

page 121 |

2010 Trace3. Proprietary and Confidential.

View Composer: Disposable Disk Disposable Disk Redirect paging and system temp files to a temporary disk removed upon VM powered off Floating View Composer Desktop Dedicated View Composer Desktop

page 122 |

2010 Trace3. Proprietary and Confidential.

Extensibility with Location Based Printing Leverage ThinPrint AutoConnect dll communicates over a virtual port with a ThinPrint .print Client .print client query locally connected printers and network printers Filter out certain network printers based on the location of the Client Host Integrated via GPO editor in .ADM directory

page 123 |

2010 Trace3. Proprietary and Confidential.

Extensibility with PowerShell Provides a series of PowerShell cmdlets to administer View from the command-line (PowerCLI) ## Linked Clone operations accept individual machine ids. ## The below commands can be used to cover all the VMs Allows management of: in a pool. VI server entries View Licenses Get-DesktopVM -pool_id | SendLinkedCloneRecompose -schedule (Get-Date) Global Config -parentVMPath Remote and Local Desktop Sessions Desktops/Pools VMs and Physical Machines (running the Agent) EntitlementsGet-DesktopVM -pool_id | SendLinkedCloneRebalance -schedule (Get-Date) Get-DesktopVM -pool_id | Send-LinkedCloneRefresh -schedule (Get-Date)

Why? Allows for automation and scripting Provides extensibility to Administration tasks Seamless integration from View to vCenterpage 124 | 2010 Trace3. Proprietary and Confidential.

Extensibility in Core Broker View Framework SDK A backend consolidation that extends vdmadmin PowerShell cmdlets defined on the .NET bridge SCOM support

page 125 |

2010 Trace3. Proprietary and Confidential.

Extensibility with Kiosk Mode Locked down View Access Client device ID based provisioning and auto-logon Automatic generation of ClientID based user account in AD

Kiosk-ready View Client Suppression of GUI features Error reporting for script integration

Automated USB redirection Client info support for in-guest printer mapping ThinPrint GPO enabled for location based printing Use cases: airport check-in, library, amusement park event kiosk, registration desk, ticketing

page 126 |

2010 Trace3. Proprietary and Confidential.

Extensibility with GPO Templates Control View components behaviors domain-wide Configure location-based printing Creating an OU for View desktops vdm_agent.adm (allow protocol access, SSO, run commands etc) vdm_client.adm (pass endpoint client information to agent etc) vdm_server.adm (performance and log configuration etc) vdm_common.adm (common configuration) pcoip.adm (limit peak bandwidth)page 127 | 2010 Trace3. Proprietary and Confidential.

page 128 |

2010 Trace3. Proprietary and Confidential.

Thin Client Overview

WYSE

page 129 |

2010 Trace3. Proprietary and Confidential.

Flexible thin clients

Desktop Thin Clients Lowest power (