1 / 22

Ed Duguid Technical Consultant West Chester Consultants

Ed Duguid Technical Consultant West Chester Consultants. Certified Partners in Vmware , Oracle, Microsoft, CISSP, COMPTIA Security+. Contact Information. Ed Duguid www.iduguid.com Email with subject: MACE Cloud ed@iduguid.com. Cloudy Management. What is the Cloud?.

miron
Download Presentation

Ed Duguid Technical Consultant West Chester Consultants

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ed DuguidTechnical ConsultantWest Chester Consultants Certified Partners in Vmware, Oracle, Microsoft, CISSP, COMPTIA Security+

  2. Contact Information Ed Duguid www.iduguid.com Email with subject: MACE Cloud ed@iduguid.com

  3. Cloudy Management

  4. What is the Cloud? What is the cloud?

  5. Cloud Providers Personal • iCloud • DropBox Business • Rackspace • Amazon • Google

  6. Why use Cloud Providers? Cost – Equipment cost, setup install, Scalability –quickly scale up or down Pay for what you need Allocate IT resources by department Shift responsibility

  7. Private Cloud vs Public Cloud Amazon: “poor man’s public cloud” HP/Microsoft: Enterprise Public Cloud GoDaddy: What type of public cloud is this? How do we define these terms? Integrated Cloud and research issues

  8. Cloud Requirements Review your company needs Email hosting Application services – Sharepoint, Financial Apps Storage capacity What are you trying to accomplish? Or needs to be met?

  9. When to use a Private Cloud ? Company wants to maintain environment within the company network and maintains responsibility Cost to move to the public cloud Current infrastructure already in place

  10. Cloud Key Terms • VM – virtual machine • Three 9’s or four 9’s – high availability • Clustering –shared resources • Fault Tolerant-redundancy fail-over • Shared services • MTTR – Mean Time to Recover

  11. Traditional vs. Virtual Virtual Architecture Traditional Architecture

  12. vCenter Cloud Management

  13. Cloud Services

  14. Cloud Functionality • Select a pre-configured, templated image to get up and running immediately. Or create an Amazon Machine Image (AMI) containing your applications, libraries, data, and associated configuration settings. • Configure security and network access on your Amazon EC2 instance. • Choose which instance type(s) and operating system you want, then start, terminate, and monitor as many instances of your AMI as needed, using the web service APIs or the variety of management tools provided. • Determine whether you want to run in multiple locations, utilize static IP endpoints, or attach persistent block storage to your instances. • Pay only for the resources that you actually consume, like instance-hours or data transfer.

  15. Cloud Software Management • VMware - vCenter, vOperation Management ChargeBack • Microsoft Hypervisor • Citrix – thin desktops • Monitor – Solarwinds

  16. Barriers to cloud hosting • Hardware cannot support, legacy. • Security concerns • Management approval • Responsibility

  17. Limits to virtual machines • Monster VM – new memory, processor, and hardware limits • 1TB RAM on VM (4.1 255GB) • 32 vCPU (4.1 8 vCPU) • 16 NIC (4.1 10 NIC) • (See what’s New in VmwareVsphere 5 link) • Better Network I/O Control – More granular • enforcement (Noisy Neighbor limits)

  18. Ability to expand • Elastic – Amazon EC2 enables you to increase or decrease capacity within minutes, not hours or days. • You can commission one, hundreds or even thousands of server instances simultaneously. • controlled with web service APIs, application can automatically scale itself up and down depending on its needs.

  19. Best Practices – Cloud Security Security in depth - Firewalls –active checking packets, - Network security – isolation, intrusion detection, - virtual private network – VLAN - Application security - Security review – annual

  20. Security • Amazon EC2 includes web service interfaces to configure firewall settings that control network access to and between groups of instances. • When launching Amazon EC2 resources within Amazon Virtual Private Cloud (Amazon VPC), you can isolate your compute instances by specifying the IP range you wish to use, and connect to your existing IT infrastructure using industry-standard encrypted IPsec VPN. • You can also choose to launch Dedicated Instances into your VPC. Dedicated Instances are Amazon EC2 Instances that run on hardware dedicated to a single customer for additional isolation.

  21. Phased approach to Cloud Company COOP or backup New and Critical applications Consolidation of hardware or remote sites Hardware/software replacement

  22. Partly Cloud? Are you in the cloud yet? Questions? Ed Duguid www.iduguid.com Email with subject: MACE Cloud ed@iduguid.com

More Related