39
Offre DataCenter & Virtualisation Laurent Bonnet, Architecte Systèmes Alain Le Hegarat, Responsable Marketing 24 Novembre 2009

Offre DataCenter & Virtualisation

  • Upload
    mikkel

  • View
    52

  • Download
    2

Embed Size (px)

DESCRIPTION

Offre DataCenter & Virtualisation . Laurent Bonnet, Architecte Systèmes Alain Le Hegarat, Responsable Marketing. 24 Novembre 2009. Optimisation des infrastructures. Dynamique. Basique. Rationalisée. Standardisée. Non coordonnée , Gestion manuelle. - PowerPoint PPT Presentation

Citation preview

Diapositive 1

Offre DataCenter & Virtualisation Laurent Bonnet, Architecte SystmesAlain Le Hegarat, Responsable Marketing24 Novembre 2009Optimisation des infrastructuresBasique

Non coordonne, Gestion manuelleRationalise

gestion de linfrastructure consolide et fortement automatiseDynamique

Automatisation maximale, Allocation dynamique des ressources, SLAsStandardiseAutomatisation partielle de la gestion de linfrastructure

Centre de cotAccelerateur des Fonctions de letpPartenaire stratgiqueCentre de cot EfficaceDynamic ITMicrosoft currently engages with organizations in a way that helps them think through how best to make investments in their environment, get to a better level of maturity, and get to a lower-cost, more flexible, and more agile state. To support this effort, Microsoft has developed Infrastructure Optimization models. Today, were focused on the Core IO model. Core IO is a proven framework for evolving your IT infrastructure to become more agile, secure, and better managed, while reducing overall IT costs and making better use of resources. The bottom line is this: IT becomes a stronger strategic asset to the business. Core IO addresses capabilities across many critical aspects of IT.

Levels of Maturity

Infrastructure Optimization identifies a maturity level for each of your IT capabilities based on your current technologies and processes. It can also help identify and prioritize improvement efforts. No matter which of the IT capabilities you focus on, you can advance your business toward a state of Dynamic IT for that capability. The levels of maturity are Basic, Standardized, Rationalized, and Dynamic.

Basic

A Basic level of Infrastructure Optimization is characterized by manual, localized process with minimal central control:IT governance is negligible, as policies for security and compliance are non-existent or inconsistently enforced. The overall health of applications and services is unknown due to a lack of tools and resources. Theres no vehicle for sharing accumulated knowledge across IT.The environment is hard for IT to control and has high desktop and server management costs. IT is often reactive to security threats.Software deployments, security updates, and services are provided in a high-touch and high-cost manner.

Standardized

At a Standardized level of Infrastructure Optimization, controls are introduced through standards and policies to manage desktops, mobile devices, and servers:A unified directory service is used to manage resources, security policies, and network access.Organizations recognize the value of basic standards and policies, but these are not yet implemented across the infrastructure. Generally, all software deployments, software updates, and desktop services are provided in a medium-touch manner. Inventories of hardware and software assets are maintained through a reasonable process, and license use is managed to an extent. Security is improved with a locked-down perimeter, though internal security may still require improvements.

Rationalized

At a Rationalized level of Infrastructure Optimization, the costs associated with managing desktops and servers are at their lowest, and processes and policies have been optimized:Security is proactive, and response to threats is rapid and controlled.The use of zero-touch deployment helps minimize cost, reduce the time to deployment, and decrease technical challenges. The process for managing desktops is very low touch, and the number of images is minimal. Theres an accurate inventory of hardware and software, and companies purchase only those licenses and computers that they need. Security measures involve strict policies and control, from desktops to servers to the firewall to the extranet.

Dynamic

When an organization achieves a Dynamic level of Infrastructure Optimization, the IT infrastructure becomes a strategic enabler to help the organization stay ahead of competition:Costs are fully controlled. Theres integration among users and information, desktops, and servers. Mobile users have nearly on-site levels of service and capabilities. Processes are fully automated and often incorporated into the technology itself, so that IT is aligned and managed based on business needs. Additional investments in technology yield specific, rapid, and measurable business benefits. Companies use self-provisioning software and quarantine-like systems to automate software-update management and compliance with established security policies.2La virtualisation est un bon dbut !BasiqueRationaliseDynamiqueStandardiseMachines Physiques & virtuellesAdministration centraliseDploiement, Patching, backup & monitoringAutomatisation des dploiements et de ladministrationThe capabilities within the Core IO model are:

Identity and Access ManagementIdentity and Access Management involves the administration of people and asset identities; access to resources from mobile employees, customers, and partners outside of the firewall; and solutions that should be implemented to manage and protect identity data like synchronization, password management, and user provisioning.

Desktop, Device, and Server ManagementDesktop, Device, and Server Management covers the management of desktops, mobile devices, and serversincluding planning and deployment for patches, operating systems, and applications across the network. It also provides guidance on how you can leverage virtualization and branch office technologies to improve your IT infrastructure.

Security and NetworkingSecurity and Networking involves protection for information and communications, including safeguards against unauthorized access. At the same time, Security and Networking focuses on solutions to protect the IT infrastructure from denial attacks and viruses while preserving access to corporate resources.

Data Protection and RecoveryData Protection and Recovery covers the processes and tools that IT can use to back up, store, and restore information and applications. As information stores proliferate, organizations are under increasing pressure to protect that information and provide cost-effective and time-efficient recovery when required.

IT and Security ProcessIT and Security Process provides guidance, based on industry best practices, on how to cost-effectively design, develop, operate, and support solutions while achieving high reliability, availability, and security. Though robust technology is necessary to meet an organizations demands for reliable, available, and highly secure IT services, technology alone is not sufficient. Excellent processes and trained staff with clear roles and responsibilities are also required.3

Efficacit des services

Efficacit individuelle

Technologies facilitatrices

Poste de Travail

Datacenters Optimiss

Scurit de bout en bout

Linfrastructure devient un gage defficacitRationalisation des infrastructures

Microsoft has three core infrastructure solutions that are made up of products, tools, and technologies designed to optimize your desktop and datacenter environments and enable business-ready security throughout your infrastructure.The primary role of each of these solutions is to help customers increase the efficiency of their core infrastructure and enable them to better align that infrastructure to the needs of the business. That is, to maximize the value of IT for the business as efficiently as possible.Each solution focus area, Desktop, Datacenter, and BRS, is designed to address capabilities across many critical aspects of IT, and to deliver increased business efficiency by reducing costs and driving automation.Today well be focusing on Business Ready Security.4DataCenter Optimis

Protg, partout

Physique et VirtuelAccs, nimporte o

Gestion de bout en boutEfficacit des oprations

Puissance & stabilit

DataCenter OptimisTo advance the maturity of your datacenter and achieve a more efficient and agile core infrastructure, your datacenter will needa scalable and reliable platform; an ability to manage across the service, both virtual and physical environments; and an abilityto protect and provide secure access so that you can extend your datacenter services to where the business needs them most.Examples of efficiency and agility benefitsSources:1: Data derived from Microsoft Spotlight on Cost Server Study, 2009Impact on labor costs for core server workloads on moving from basic to standardized through best practice implementationhttp://arsenalcontent/ContentDetail.aspx?ContentID=154342&view=folder&portal=officesystem2: Data derived from Gartner The effective use of virtualization can reduce server energy consumption by up to 82% and floor space by 85%. Energy Savings via Virtualization: Green IT on a Budget, November 10, 2008

Gartner clients have reported that single virtualized servers often support ratios from as little as five to 12 VMs on a single server to as many as 70. The 10 Key Server Virtualization Unknowns, and What to Do About Them, Gartner, January 16, 20093. Microsoft Case Study Banque de Luxembourg: Quote is from HP BelgiumIn the past, provisioning a new business application required one or two days, but now it requires less than an hour, Franck Lartigue, System Engineer, HP Belgium & Luxembourghttp://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=40000026084: Microsoft Case Study Bank BGZhttp://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=4000000475. AV-Test.orgAV lab response times were tested for 365 In the Wild viruses and variants that appeared from January March 2009.They tested the next generation of the Forefront Server Security engine set vs. three single-engine vendors.Forefront Server Security engines had an average detection time of 6 hours for this three month period. The competitive solutions had average detection times of 26 hours, 83 hours and 206 hours, respectively.

Aspects of an optimized datacenter include the following:

End-to-End Management

One of the best ways to move an IT operation to a more mature level of optimization is to increase the degree of centralizedcontrol across the infrastructure. Unifying the management of the datacenter requires the incorporation of systems formanaging:Both physical and virtual systems in the datacenter An extensible and interoperable platform that provides cross-platform monitoring An end-to-end solution for management from the desktop to the datacenterSystems at headquarters and branch locations from a central locationIdentity, access, and security solutions from within a centralized console

As part of management, increased IT automation helps reduce strain on IT resources and increase efficiency. To help automateIT operations, Microsoft is building infrastructure solutions that are knowledge driven. They capture and aggregate knowledgeabout an organizations infrastructure, policies, processes, and best practices so its IT staff can build more manageable systemsand automate operations. By building integrated solutions in this way, Microsoft enables organizations to make more efficientuse of IT resources and drive down operational costs.

There are many opportunities for automation in the datacenter, including, but not limited to:Automated provisioning and updating As the number of both physical and virtual servers in the datacenter expands, datacenter managers can automate the complete server deployment processfrom creating and provisioning the server baseline to updating the operating systems and applications deployed in the datacenter.Automated configuration management IT professionals can automatically ensure that configurations match their best practices and policies, reducing the risk of configuration drift, which can introduce security vulnerabilities or cause downtime.

Pervasive Security (Protect Everywhere)

Microsoft Forefront security solutions deliver end-to-end security and access to information through an integrated line of protection, access, and identity management products. Microsoft is working to achieve the goal of business-ready security based on the following fundamental tenets:Integrate and extend across the enterprise Forefront solutions integrate with the identity infrastructure and across the stack.Support for heterogeneous environments Forefront includes on-premises and hosted solutions for seamless connectivity. Forefront solutions also adhere to open standards and protocols.Help protect everywhere, access anywhere Forefront provides defense in depth across multiple layers to help protect across endpoints, servers, and the network. Secure, identity-based access products help connect the mobile workforce virtually anywhere. Identity-aware protection helps organizations secure information and enable policy-based access.Simplify the experience, manage compliance Forefront solutions enable centralized management of the environment and allow you to gain critical visibility into the state of the infrastructure. They help improve security and compliance through identity tracking and enforcement throughout the enterprise. And finally, they provide policy management features and reporting to enable auditing and compliance.

Access Anywhere

To be most productive, users in an organization need to be able to access data and services, no matter where they arein theoffice, at a customer site, at home, in an airport, etc. Microsoft solutions are designed to maximize access while maintainingsecurity.

Sources:1: Data derived from Microsoft Spotlight on Cost Server Study, 2009Impact on labor costs for core server workloads on moving from basic to standardized through best practice implementationhttp://arsenalcontent/ContentDetail.aspx?ContentID=154342&view=folder&portal=officesystem2: Data derived from IDC based on 4:1 virtual to physical consolidation ratio 4 virtual servers use the hardware and facilities costs (power, space) of 1 physical server.3. Microsoft Case Study Banque de Luxembourg: Quote is from HP BelgiumIn the past, provisioning a new business application required one or two days, but now it requires less than an hour, Franck Lartigue, System Engineer, HP Belgium & Luxembourghttp://www.microsoft.com/casestudies/casestudy.aspx?casestudyid=40000026084: Microsoft Case Study Bank BGZhttp://www.microsoft.com/casestudies/Case_Study_Detail.aspx?CaseStudyID=400000047

Additional Access Stat:Improve branch data access by 30 percent without expanding bandwidth (Microsoft case study: Sporton International http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?casestudyid=4000004044)5

AdministrationWebVirtualisationIIS 7.0 & Extensions .NET et Server CoreConfiguration TracingService-Oriented ArchitectureHyper-V 2.0Live Migration RemoteApp & Desktop ServicesDes fondations solides pour les besoins les plus exigeantsAD Administrative CenterPowerShell 2.0Best Practices AnalyzerSynergies avec Windows 7Monte en charge et disponibilitDirect AccessBranch CacheExtension des stratgies des groupeBitLocker pour les disques externesDNSSEC

Configurations matrielles >64 curs64 bits uniquementArchitecture modulaire - composantsEfficacit nergtique accrueDveloppement et lancement conjoint des versions client et Server

Direct Access: permet daccder aux applications distantes tout en librant lutilisateur des contraintes du VPNBranch Cache : optimisation des liaisons WAN, permettant damliorer les temps de rponse su les sites distants.Windows Server 2008 R2 Hyper-VLes axes damliorationLive-migration: dplacement des VMs entre serveurs sans interruption de service

Clustered Shared Volumes: modification de NTFS pour supporter plusieurs VMs par LUN

Ajout/retrait chaud des VHD et disques pass-through aux VMs en oprations

Support 64 processeurs logiques sur lhte

Amlioration des fonctions rseau

Support RedHat & Suse

Cluster Shared VolumesCSV offre un espace de noms uniqueLes fichiers ont le mme nom et le mme chemin quelque soit le noeud dont ils sont rfrencsLes volumes CSV sont exposs comme des repertoires et sous repertoiresC:\ClusterStorage\Volume1\C:\ClusterStorage\Volume2\C:\ClusterStorage\Volume3\

Live MigrationVM pr-cre sur la machine cible

Hte 1

Hte 2

Bleu = StockageViolet = RseauStockage partagPhase de transfert finalMachine virtuelle en pauseTransfert de laccs aux fichiers de la VM vers lhte de destinationSuppression de la dfinition de lancienne VM aprs validation que la migration sest droule avec succsContenu de la mmoire copi vers le nouveau serveur via le rseau

11/24/2009 8:33 AMMICROSOFT CONFIDENTIAL 2006 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.9RDS & VDI une solution intgreRemote Desktop Gateway ServerRemote Desktop Connection BrokerRemote App Servers

RemoteApp & Desktop Web Access Server

Client

AuthenticationHyper-V-basedRemote Desktops

Hyper-V support for VDI - Providing a better virtualization platform for scalable and highly available VDI deploymentsLive Migration of Virtual Machines With Live Migration, there will be no perceived downtime in the desktop workloads running in the VM, and network connections from and to the VM being migrated will stay connected. This capability will be possible between hosts within a High Availability cluster.Support for Enhanced Virtualization Capabilities in the Hardware Support for Nested Page Tables (NPT) and Extended Page tables (EPT) in Intel and AMD hardware. These capabilities improve the performance of translation of memory addresses.

The new Remote Desktop Connection Broker, which extends the Session Broker capabilities already found in Windows Server 2008, creates a unified admin experience for traditional session-based remote desktops and (new) virtual machine-based remote desktops. The two key deployment scenarios supported by the Remote Desktop Connection Broker, besides traditional TS, are persistent (permanent) VMs and pooled VMs. In either case, the in-box solution supports storage of the image(s) on the Hyper-V host.

SCVMM 2008 support provides intelligent placement of VMs during placement, fast and reliable P2V and V2V (VMware to Hyper-V) conversions as well monitoring of all virtual and physical assets from one single pane of glass.

10

Gestion du cycle de vie des serveurs Cration des instances virtuellesGestion des dploiements, (OS /logiciels, correctifs et tats)Surveillance performances et tatsReprise aprs incidentMise en service des quipementsSauvegardeDu serveur physique aux applicationsEn mode traditionnel ou virtualisGre les systmes Windows, Unix et LinuxGre Microsoft Hyper-V et VMWare ESXRemonte les informations HP OpenView et IBM Tivoli

11

DataCenter Traditionnel

Maitris, stable, scurisFaiblement utilis Tasks -> Scripts mapping stored in XML

Microsoft Confidential - Do Not Distribute40