1 / 30

CONFIDENTIAL

CONFIDENTIAL. Value Proposition of F5 in VMware Virtualized Environments April 2008. What does F5 Virtualize?. Desktop Virtualization. Web Server Virtualization. Application Virtualization. Storage Virtualization. File Virtualization. Network Virtualization. Data Center Virtualization.

orleans
Download Presentation

CONFIDENTIAL

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CONFIDENTIAL Value Proposition of F5 in VMware Virtualized Environments April 2008

  2. What does F5 Virtualize? Desktop Virtualization Web Server Virtualization Application Virtualization Storage Virtualization File Virtualization Network Virtualization Data Center Virtualization …and more…

  3. Virtualization means a lot of things Desktop Virtualization Web Server Virtualization BIG-IP LTM Application Virtualization BIG-IP LTM Storage Virtualization ARX File Virtualization ARX Network Virtualization BIG-IP LTM Data Center Virtualization BIG-IP GTM & LC

  4. F5 Virtualization Features

  5. F5 has been delivering virtualization for a long time Clients Clients Clients 1997 Web Server Traffic Virtualization Web Server Web Server Web Server

  6. F5 has been delivering virtualization for a long time Clients Clients Clients 2004 Data Center Virtualization 1997 Web Server Traffic Virtualization Web Server Web Server Web Server Data Center #2 Data Center #3 2004 Application Server Traffic Virtualization App. Server App. Server App. Server

  7. F5 has been delivering virtualization for a long time Clients Clients Clients 2004 Data Center & Link Virtualization 1997 Web Server Traffic Virtualization Web Server Web Server Web Server Data Center #2 Data Center #3 2004 Application Server Traffic Virtualization App. Server App. Server App. Server 2007 File Virtualization NAS Server NAS Server NAS Server

  8. F5 Data Center Virtualization Today Data Center & Link Virtualization Web Server Virtualization Application Server Virtualization File Storage Virtualization GTM & LC ARX LTM LTM Cell PC - Home Web Server Web Server Web Server Web Server Web Server Web Server Remote - WAN App. Server App. Server App. Server App. Server PC - LAN Windows file storage Windows file storage WLAN EMC NetApp

  9. Intranet / Internet Intranet / Internet Problem Your traffic is more difficult to allocate, thus not optimal Application Virtualization Server Virtualization Server Virtualization F5 Application Virtualization with LTM VMware makes 1 physical server look like many BIG-IP makes many virtual servers look like 1 F5 abstracts the VMs and making them appear like a single massive server resource

  10. Firewalls Firewalls Firewalls Web Servers Application Servers Blade Servers Data Base Branch Office F5 ADN Making applications Secure, Fast & Available DMZ Primary Data Center FirePass WANJet Router Router WANJet Router Router Enterprise Manager DMZ Remote Users ISP Global Traffic Manager Link Controller ISP1 ISP Internet ISP2 FirePass ISP WebAccelerator BIG-IP Local Traffic Manager Router Router DMZ Users TrafficShield WANJet Global Traffic Manager FirePass File Virtualization BIG-IP Local Traffic Manager Disaster Recovery Site

  11. Internet F5 Data Center Virtualization with GTM Japan Client US Client BIG-IP GTM x Japan Data Center US Data Center

  12. F5 File/Storage Virtualization with ARX BEFORE AFTER • User / application access tightly coupled to physical file storage • Inflexible: change is disruptive • Complex: multiple mappings to heterogeneous storage devices • Inefficient: low aggregate utilization • File access decoupled from physical storage location • Flexible: change is non-disruptive • Simple: single mapping to unified storage pool • Efficient: maximize utilization

  13. F5 Partnership with VMware

  14. F5 & VMware • F5 is a “Select” VMware partner • F5/VMware deployment guide • BIG-IP • WebAccelerator • Global Traffic Manager • WANJet • Solution Guide: VMware & Acopia ARX • F5 DevCentral VMware forum

  15. Why do I need BIG-IP if I have VMware? • VMware does not solve the need to load balance traffic optimally across data centers, web servers, virtual machines or physical machines. • VMware is unable to offload non-core functions from the CPU to enhance performance (e.g. SSL connection termination, Caching, Compression, TCP Optimization) • VMware does not provide any way to re-route application traffic in the event of a link or data center failure. • Just because VC started another VM instance to respond to higher demand, it does not necessarily mean that this new VM will begin receiving any traffic. • Even with VMotion and VC, if a VM dies it may take 5+ minutes to restart it elsewhere. LTM can overcome this through instantaneous redirection of traffic. • LTM can detect application level errors and redirect traffic around those VM’s that are producing errors (e.g due to data corruption, exhausted resources, OS or server software bug, etc). It can also instruct VC to restart that VM. Whether physical or virtual, it makes no difference. Applications are faster, more available and more secure with F5

  16. BIG-IP Load Balances VM Guest Apps • Benefits • BIG-IP load balances traffic to VM guest apps on one or more ESX hosts • BIG-IP monitors the performance of each VM • BIG-IP can detect failure of network or application in a timely manner and redirect traffic the appropriate amount of traffic to each VM, based on its actual performance • BIG-IP can use an advanced health check to ensure the VM is ready to receive traffic before directing to it. • Even with VMotion and Virtual Center, failed VM’s can take several minutes to restart elsewhere. BIG-IP can mitigate the impact through instantaneous redirection of traffic. Clients BIG-IP LTM VM1 VM2 VM3 VM4 VM5 VM6 VM7 VM8 VM9 ESX1 ESX2 ESX3

  17. BIG-IP Interoperability with DRS Clients Benefits In the event that DRS moves a guest via VMotion, BIG-IP redirects traffic instantly and maintains appropriate amount of traffic volume to each VM. BIG-IP LTM/WA Virtual Center VM1 VM2 VM3 VM3 VM4 ESX1 ESX2 VMotion

  18. BIG-IP Interoperability with HA Clients Benefits In the event that HA restarts a VM guest on a different host, BIG-IP redirects traffic to the new host instantly and maintains appropriate amount of traffic volume to each VM. BIG-IP LTM/WA VM1 VM2 VM1 VM3 VM4 VM2 VM5 VM6 ESX1 ESX2 ESX3

  19. BIG-IP Offloads CPU and Memory-intensive functions from VMs Clients • Benefits • BIG-IP can offload the following: • SSL connection termination • Caching • Compression • TCP Optimization Example: Dell PowerEdge 1955 Blade Server. BIG-IP offloading enables 25-50% more VM capacity per blade Clients BIG-IP LTM/WA VM01 VM02 VM03 VM04 VM05 VM06 VM07 VM08 VM09 vs. VM01 VM02 VM03 VM04 VM05 VM06 VM07 VM08 VM09 VM10 VM11 VM12 VM13 VM14 VM15 ESX1 ESX1

  20. Clients LTM/GTM/WA LTM/GTM/WA ESX1 ESX2 ESX3 ESX1 ESX2 ESX3 BIG-IP GTM Enhances Global Availability Benefits In case of site failure, GTM load balances traffic between data centers when the second site is ready to receive the traffic (e.g. replication of VMware images is complete and application is now accepting traffic) This is more than “IP detection”. The application can be tested for availability prior to traffic redirection.

  21. F5 WANJet Accelerates VMDK transmission over the WAN by 5-10X Benefits WANJet can accelerate transmission of time copies of VMDK’s over the WAN by 5-10X faster. Improves DRS & HA recovery time. Reduce the bandwidth required for any given tranmission by up to 90%. VMDK1 VMDK1 VMDK2 VMDK2 VMDK3 WANJet WANJet VMDK3 VMDK4 VMDK4 VMDK5 VMDK5 VMDK6 VMDK6 VMDK7 VMDK7 VMDK8 VMDK8

  22. F5 BIG-IP enables connection to VC via NAT/SNAT • Clients cannot currently connect to VC through NAT/SNAT or if behind a VIP. LTM can re-write the IP addresses and resolve this to enable access. x VMware Virtual Center NAT/SNAT Admin NAT/SNAT IP Addresses Re-Written VMware Virtual Center Admin

  23. How Can iControl Enhance Automation of VMs? • Site www.TV-OnSale.com traffic triples • VMware detect the traffic surge and startsbringing online new VM • VMware make an iControl call to LTM and register the new VMs • LTM starts sending traffic to thenew VM • Data center capacity increases and is capable of handling the traffic surge • Business continues interrupted • Traffic returns to normal • The process is reversed Web Client Web Client Web Server Virtualization BIG-IP LTM iContol Web Server Web Server Web Server Application Server Virtualization BIG-IP LTM iContol App. Server App. Server App. Server Storage Virtualization Storage Storage Storage

  24. What is available today? • iControl is F5’s open API for BIG-IP • VMware Virtual Center can monitor VM performance • Virtual Center can be used to trigger events depending on VM performance • E.g. Upon VM CPU exceeding 90%, create a new instance of the VM • However creating a new VM does not necessarily mean traffic will be routed to it that VM • iControl can be used for VM to instruct LTM to add the new VM as a pool member, than to enable the node. • All of the above can be reversed in the event that a floor-threshold is triggered • E.g. VM CPU is below 10%, remove this instance of the VM • iControl Authors: • Kyeong-Yun Yang, F5 – Perl version for VC • Nicolas Menant, F5 – C version for VC • Nicolas Menant, F5 - Stand-alone application that does not rely on Virtual Center • View DevCentral or contact Charlie Cano (F5) for questions

  25. What iControl for Virtual Center looks like… Select VM and choose Alarms TAB menu Managing Virtual Machines

  26. Configuring Triggers within VC You can configure trigger elements here like CPU usage, Memory usage, Network usage, VM status, hearbeat etc.

  27. Actions when triggering You can choose actions like email or SNMP trap notification, VM enable/disable/restart or “Run a script. In this case we choose “Run a script” This script enables new VMs and sends an iControl message to BIGIP

  28. F5 Tech Center in Seattle, WAVMware Usage • Tech Center usage of VMware • Application Library • Collection of application images (146+) • Shared and hosted for global Development, QA, Solutions Engineering and Services use • Customer Proof of Concepts • Minimize risks associated with actual network and application deployments and develop familiarity with F5 solutions • Demo Center • Robust real-world deployment of F5 solutions and partner applications • Remotely accessible to F5 Sales and Channel Partners (1100+) • VMware technology used • ESX – Optimizes hardware resources, fast and flexible deployments • Virtual Center – Simplifies provisioning, monitors utilization • Resource Pools – Logical grouping of “like” hardware, simplifies deployments • VMotion – Image migration based on resource consumption • SnapShot – Rapid deployment of parallel apps to support different test teams • Virtual Switch – Isolates individual application traffic to simplify network architecture

  29. F5 Tech Center – Virtual Architecture

More Related