As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers the matrix of functions and features within each supported hypervisor in CloudStack 4.3. This deck forms an excellent reference document for those seeking to provide multi-hypervisor support within their Apache CloudStack based cloud, and for those seeking to determine which feature elements are supported by a given hypervisor.
CloudStack is one of many cloud orchestration platforms which can deliver IaaS clouds. One of the key capabilities of CloudStack is its ability to support multiple hypervisors in a CloudStack cloud. So whether your virtualization preference is VMware vSphere, KVM, Citrix XenServer or Linux Containers (LXC), you can build highly scalable clouds. While basic functionality is common across all hypervisors, many features are implemented differently on each. This paper presents the capabilities of CloudStack which can be enabled based on your hypervisor selection
Session on CloudStack, intended for new users to CloudStack, provides an overview to varied audience levels information on usages, use cases, deployment and its architecture.
This presentation is the introduction to the monthly CloudStack.org demonstration. The presentation details the latest features in the CloudStack open source project as well as project news. To attend a future presentation, with live demo and Q&A visit:
http://www.slideshare.net/cloudstack/introduction-to-cloudstack-12590733
CloudStack is one of many cloud orchestration platforms which can deliver IaaS clouds. One of the key capabilities of CloudStack is its ability to support multiple hypervisors in a CloudStack cloud. So whether your virtualization preference is VMware vSphere, KVM, Citrix XenServer or Linux Containers (LXC), you can build highly scalable clouds. While basic functionality is common across all hypervisors, many features are implemented differently on each. This paper presents the capabilities of CloudStack which can be enabled based on your hypervisor selection
Session on CloudStack, intended for new users to CloudStack, provides an overview to varied audience levels information on usages, use cases, deployment and its architecture.
This presentation is the introduction to the monthly CloudStack.org demonstration. The presentation details the latest features in the CloudStack open source project as well as project news. To attend a future presentation, with live demo and Q&A visit:
http://www.slideshare.net/cloudstack/introduction-to-cloudstack-12590733
CloudStack, the world's leading open-source cloud infrastructure platform, was recently donated to the Apache Foundation, and is now an incubated Apache project. Ewan Mellor, Director of Engineering in the Citrix Cloud Platforms Group will describe the CloudStack project and explain why Xen is the pre-eminent hypervisor in public clouds today. He will describe the changes coming in CloudStack in the next 12 months, and how they are going to change the way that Xen is consumed in public and private clouds next year.
Selecting the correct hypervisor for CloudStack 4.5Tim Mackey
Apache CloudStack supports multiple hypervisors out of the box, and the obvious question is which hypervisor is best for CloudStack. In this session we cover core CloudStack components such as networking, storage and virtualization functions to present which hypervisor is able to meet a given requirement. The core take-away is that with an understanding of the services to be delivered the correct hypervisor, or hypervisors, can be selected with relative ease. This deck is as delivered at CloudStack Days 2015 in Seattle.
Hypervisor Capabilities in Apache CloudStack 4.3Tim Mackey
Apache CloudStack 4.3 adds support for clouds built using Microsoft Hyper-V, in addition to supporting VMware vSphere, Citrix XenServer, KVM, Oracle VM, Linux Containers and bare metal options. This deck covers the decision points impacting the design of CloudStack 4.3 clouds, and their relationship with hypervisor choices.
Presented at Build a Cloud Day co-located with SCaLE 12x in February 2014.
Deploying Apache CloudStack from API to UIJoe Brockmeier
For most organizations with a large computing footprint, it's not a matter of if you'll need a private cloud - it's when, and what kind. One of the most mature and widely deployed options is Apache CloudStack, a robust, turnkey cloud that includes everything you need to set up a private, public, or hybrid cloud. We'll cover Apache CloudStack from API to UI, and a little of everything in between.
Build clouds the way some of the world’s biggest public and private clouds are built—using CloudStack. This 60-minute webinar with the Cloudstack team will help you gain a better understanding of the CloudStack architecture and feature set.
Hypervisor Selection in Apache CloudStack 4.4Tim Mackey
Building an infrastructure as a service cloud involves a number of technology decisions, many of which could have unforeseen impact. Hypervisors form the core of an IaaS cloud, and whether you are a fan of Microsoft Hyper-V, VMware vSphere, KVM in any Linux variant or XenServer from Citrix, each of these hypervisors provide unique capabilities within an Apache CloudStack 4.4 based cloud.
Tcloud Computing Hadoop Family and Ecosystem Service 2013.Q2tcloudcomputing-tw
The presentation is designed for those interested in Hadoop technology, and can enhance your knowledge in Hadoop, such as community history, current development status, features of services, distributed computing framework and scenario of big data development in Enterprise.
CloudStack, the world's leading open-source cloud infrastructure platform, was recently donated to the Apache Foundation, and is now an incubated Apache project. Ewan Mellor, Director of Engineering in the Citrix Cloud Platforms Group will describe the CloudStack project and explain why Xen is the pre-eminent hypervisor in public clouds today. He will describe the changes coming in CloudStack in the next 12 months, and how they are going to change the way that Xen is consumed in public and private clouds next year.
Selecting the correct hypervisor for CloudStack 4.5Tim Mackey
Apache CloudStack supports multiple hypervisors out of the box, and the obvious question is which hypervisor is best for CloudStack. In this session we cover core CloudStack components such as networking, storage and virtualization functions to present which hypervisor is able to meet a given requirement. The core take-away is that with an understanding of the services to be delivered the correct hypervisor, or hypervisors, can be selected with relative ease. This deck is as delivered at CloudStack Days 2015 in Seattle.
Hypervisor Capabilities in Apache CloudStack 4.3Tim Mackey
Apache CloudStack 4.3 adds support for clouds built using Microsoft Hyper-V, in addition to supporting VMware vSphere, Citrix XenServer, KVM, Oracle VM, Linux Containers and bare metal options. This deck covers the decision points impacting the design of CloudStack 4.3 clouds, and their relationship with hypervisor choices.
Presented at Build a Cloud Day co-located with SCaLE 12x in February 2014.
Deploying Apache CloudStack from API to UIJoe Brockmeier
For most organizations with a large computing footprint, it's not a matter of if you'll need a private cloud - it's when, and what kind. One of the most mature and widely deployed options is Apache CloudStack, a robust, turnkey cloud that includes everything you need to set up a private, public, or hybrid cloud. We'll cover Apache CloudStack from API to UI, and a little of everything in between.
Build clouds the way some of the world’s biggest public and private clouds are built—using CloudStack. This 60-minute webinar with the Cloudstack team will help you gain a better understanding of the CloudStack architecture and feature set.
Hypervisor Selection in Apache CloudStack 4.4Tim Mackey
Building an infrastructure as a service cloud involves a number of technology decisions, many of which could have unforeseen impact. Hypervisors form the core of an IaaS cloud, and whether you are a fan of Microsoft Hyper-V, VMware vSphere, KVM in any Linux variant or XenServer from Citrix, each of these hypervisors provide unique capabilities within an Apache CloudStack 4.4 based cloud.
Tcloud Computing Hadoop Family and Ecosystem Service 2013.Q2tcloudcomputing-tw
The presentation is designed for those interested in Hadoop technology, and can enhance your knowledge in Hadoop, such as community history, current development status, features of services, distributed computing framework and scenario of big data development in Enterprise.
NIC - Hybrid Cloud with NVGRE - Level 400Kristian Nese
Join a true VMM Ninja and learn about network virtualization in a practical way.
This session will walk-through the configuration parts required and also explain what happens, and more important – why and how it happens.
Windows Server and System Center are using Network Virtualization with GRE in order to fulfill the story around the Cloud OS, and must be considered as mandatory to have hybrid cloud solutions, no matter if it’s in the enterprise or as part of a hosting plan with Windows Azure Pack.
VMM is responsible for deploying, maintaining and configure the NVGRE policies across your cloud infrastructure, so everything will be performed from this single console. (Yes, you will learn a lot about networking in VMM in general during this session too).
Hypervisor Selection in CloudStack and OpenStackTim Mackey
Deploying a successful cloud is a function of the capabilities of both the virtualization layer and the cloud orchestration platform. In this deck, presented at the annual Deep Dive Day hosted by the Boston Virtualization User Group (virtg.com), I covered CloudStack 4.3 and OpenStack Havana. The deck doesn't seek to define a "best" option, but to provide the information data center architects and system administrators require regardless of preference for KVM, XenServer, vSphere or Hyper-V.
OSCON2014: Understanding Hypervisor Selection in Apache CloudStackTim Mackey
A presented at OSCON 2014, this deck covers the matrix of capabilities each supported hypervisor brings to the Apache CloudStack table when building a cloud.
XenServer Virtualization In Cloud EnvironmentsTim Mackey
= As presented at the CloudStack Silicon Valley Meetup in September 2015. =
XenServer is a virtualization platform which has been deployed in a variety of industries and to support a multitude of workloads. In this session we discuss some of the components which make it valuable not just for traditional server and desktop virtualization, but also within "the cloud". This includes discussion of VM density, network scalability, containers (such as Docker) and GPU virtualization. We end with coverage of how XenServer templates are represented within Apache CloudStack.
The XenServer virtualization platform is used by well over 100,000 organizations to fulfill their IT objectives. Common scenarios include traditional server virtualization such as that found with VMware vSphere, delivery of large scale cloud services via Apache CloudStack or OpenStack, and as a platform for high performance desktop virtualization through XenDesktop. These use cases all have requirements of scale and manageability which imply solid deployments.
The content in this deck was presented in workshop form at FOSSETCON in 2015. Much of the information contained will work for any XenServer version, but XenServer 6.5 was covered. The audience was assumed to have some familiarity with virtualization concepts, but no assumptions about XenServer was made. Core concepts covered included; storage design, network design and operations, scalability and failure domains, as well as core features such as virtualized graphics.
Windows Server 2016 on pilve-valmis operatsioonisüsteem, mis toetab ettevõtte praegusi töövooge, samal ajal tutvustades uusi tehnoloogiaid, mis teevad pilve ülemineku sujuvaks, kui aeg õige. Millised on põhilised uuendused ja kuidas need ettevõtteid aitavad - nendele küsimustele leiate vastused esitlusest.
What is coming for VMware vSphere?
Delivered at VMUG DK/UK/BE in November 2014. Session is all about vSphere futures, what can be expected in the near future.
A question of trust - understanding Open Source risksTim Mackey
As presented at the Bay Area Cyber Security Meetup on January 25th, 2018.
Open source development paradigms have become the norm for most software development. This is regardless of whether you're making the next great IoT device, a new container microservice, or desktop application. While open source components are often viewed as free, and definately help solve problems in a scalable way, using them in a secure manner requires an understanding of how open source development really works.
In this sesssion, I covered how secure development practices with data center regulations can benefit from an understanding of open source development. Specifically, we looked at fork management, community engagement and patch management. We ended with an open source maturity model.
As presented via webinar.
The Open Source 360 survey is in its 11th year and surveyed over 800 IT professionals about their use of open source components and technologies. In prior years, this survey was known as the Future Of Open Source.
Key takeaways include:
- Open Source usage is growing within global organizations
- Organizations recognize risks of consumption exist
- Tooling to keep pace with risks is limited
- Contributions to project communities are key to success
Security in the age of open source - Myths and misperceptionsTim Mackey
As delivered at Interop ITX 2017.
The security of open source software is a function of the security of its components. For most applications, open source technologies are at their core, but security related issues may not be disclosed directly against the application because its use of the open-source component is hidden. In this talk, I explored how information flow benefits attackers, but how awareness can help defenders. I presented key attributes any vulnerability solution should have - including deep understanding of how open source development works and being DevOps aware.
Secure Application Development in the Age of Continuous DeliveryTim Mackey
As delivered at LinuxCon and ContainerCon in Berlin 2016.
Traditionally, when datacenter operators talk about application security, they've tended to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques.
The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment of micro-services, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily.
In this session we’ll present:
• How known vulnerabilities can make their way into production deployments
• How deployment of vulnerable code can be minimized
• How to determine the vulnerability status of a container
• How to determine the risk associated with a specific package
The How and Why of Container Vulnerability ManagementTim Mackey
As presented at OpenShift Commons Sept 8, 2016.
Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and associated network defenses. Since those defenses are reactive to application issues attackers choose to exploit, it’s critical to have visibility into both what is in your container library, but also what the current state of vulnerability activity might be. Current vulnerability information for container images can readily be obtained by using the scan action on Atomic hosts in your OpenShift Container Platform.
In this session we’ll cover how an issue becomes a disclosed vulnerability, how to determine the risk associated with your container usage, and potential mitigation patterns you might choose to utilize to limit any potential scope of compromise.
Using hypervisor and container technology to increase datacenter security pos...Tim Mackey
As presented at LinuxCon/ContainerCon 2016:
Cyber threats consistently rank as a high priority for data center operators and their reliability teams. As increasingly sophisticated attacks mount, the risk associated with a zero-day attack is significant. Traditional responses include perimeter monitoring and anti-malware agents. Unfortunately, those techniques introduce performance and management challenges when used at large VM densities, and may not work well with containerized applications.
Fortunately, the Xen Project community has collaborated to create a solution which reduces the potential of success associated with rootkit attack vectors. When combined with recent advancements in processor capabilities, and secure development models for container deployment, it’s possible to both protect against and be proactively alerted to potential zero-day attacks. In this session, we’ll cover models to limit the scope of compromise should an attack be mounted against your infrastructure. Two attack vectors will be illustrated, and we’ll see how it’s possible to be proactively alerted to potential zero-day actions without requiring significant reconfiguration of your datacenter environment.
Technology elements explored include those from Black Duck, Bitdefender, Citrix, Intel and Guardicore.
Secure application deployment in the age of continuous deliveryTim Mackey
As presented at Open Source Open Standards (GovNet) (http://opensourceconference.co.uk/), this deck covers some of the material which operators of open source data centers and users of container and cloud technologies should be aware of when seeking to be security conscious.
Traditionally, when datacentre operators talk about application security, there has been a tendency to focus on issues related to key management, firewalls and data access. By contrast, application developers have a security focus which is more aligned with code analysis and fuzzing techniques. The reality is, secure application deployment principles extend from the infrastructure layer through the application and include how the application is deployed. With the prevalence of continuous deployment, it’s imperative to focus efforts on what attackers’ view as vulnerable; particularly in an environment where new exploits are being disclosed almost daily.
In this session we’ll present:
- How known vulnerabilities can make their way into production deployments
- How vulnerability impact is maximized
- A methodology for ensuring deployment of vulnerable code can be minimized
- A methodology to minimize the potential for vulnerable code to be redistributed
Secure application deployment in Apache CloudStackTim Mackey
At the Apache CloudStack Collaboration Conference in Montreal, I presented a potential pathway to secure template management in CloudStack. Under this model, cloud providers can assess the templates their users have and potentially advise if deployed instances have application security issues which have either public disclosures, or better still remediation.
User Transparent Service Migration to the CloudTim Mackey
While creating a cloud such as OpenStack is fairly easy, template management is more challenging. In this session we discuss how systems engineering and tooling can be combined to allow legacy infrastructure and virtual machines to be converted to templates without downtime. These templates can then be deployed within the cloud and users migrated with minimal interruption. This deck is as delivered at CloudOpen 2015 in Seattle.
CloudOpen Japan - Controlling the cost of your first cloudTim Mackey
As presented at CloudOpen Japan in Tokyo in 2015.
Today everyone is talking about clouds, and some are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts must IT make when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm. Key topics covered will include; transitioning the operational paradigm, the impact of VM density on operations and network management, and preventing storage cost from outpacing requirements.
Taming the cost of your first cloud - CCCEU 2014Tim Mackey
Today everyone is talking about clouds, and a few are building them, but far fewer are operating successful clouds. In this session we'll examine a variety of paradigm shifts IT makes when moving from a traditional virtualization and management mindset to operating a successful cloud. For most organizations, without careful planning the hype of a cloud solution can quickly overcome its capabilities and pre-existing best practices can combine to create the worst possible cloud scenario -- a cloud which isn't economical to operate, and which is more cumbersome to manage than a traditional virtualization farm.
Key topics covered include:
- Successful transition of operational and management paradigm
- How the VM density of clouds change Ops
- What it means to monitor the network in a cloud environment, at hyper-dense virtualization levels
- Preventing storage costs from outpacing delivery costs
Using Packer to Migrate XenServer Infrastructure to CloudStackTim Mackey
When adopting IaaS cloud solutions, one of the biggest challenges will be template management. Creating that first template can easily be more challenging that deploying the cloud software itself. In this presentation two options are presented for template creation, using a kickstart file or cloning a running VM with Packer from packer.io as the core framework.
This presentation was delivered at CloudStack Days 2015 in Austin Texas. Two demos were given. The first demo used an existing XenServer environment to create a golden master from ISO and kickstart file, then automatically upload it to a CloudStack management server for deployment. The second demo cloned a running VM and created a template which was then uploaded to CloudStack. In the case of the running VM, migration occurred without any user interruption. The VM in question was a CentOS 7 image, and the hypervisor for both source infrastructure and CloudStack compute was XenServer based
Make your first CloudStack Cloud successfulTim Mackey
As presented at the 2014 CloudStack Collaboration Conference in Denver (CCCNA14), this deck covers some of the decision points impacting a successful deployment of CloudStack within your organization. Critical elements such as storage and networking are discussed to create a blueprint which seeks to remove some of the learning curve associated with the transition from data center management to cloud management.
Planning a successful private cloud - CloudStack Collaboration Europe 2013Tim Mackey
So your boss just asked you to build a private cloud. Now what? Successful private clouds require a bit of planning, and your existing best practices may need to be adjusted. This deck covers some of the issues you'll face, or be aware of, as you migrate from an existing data center operation to one which is more "cloud-like". Some things may seem obvious, but there are aspects to network and storage design which impact success. This deck draws from my experience in building my first CloudStack cloud in early 2012 and has applicability to anyone seeking to deliver cloud services.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
2. whoami
• Name: Tim Mackey
• Current roles: XenServer Community Manager and Evangelist; occasional coder
• Cool things I’ve done
– Designed laser communication systems
– Early designer of retail self-checkout machines
– Embedded special relativity algorithms into industrial control system
• Find me
– Twitter: @XenServerArmy
– SlideShare: slideshare.net/TimMackey
4. Service Offerings
• Clearly define what you want to offer
– What types of applications
– Who has access, and who owns them
– What type of access
• Define how templates need to be managed
– Operating system support
– Patching requirements
• Define expectations around compliance and availability
– Who owns backup and monitoring
5. Define Tenancy Requirements
• Department data local to department
– Where is the application data stored
• Data and service isolation
– VM migration and host HA
– Network services
• Encryption of PII/PCI
– Where do keys live when data location unknown
– Need encryption designed for the cloud
• Showback to stakeholders
– More than just usage, compliance and audits
6. Virtualization Infrastructure
• Hypervisor defined by service offerings
– Don’t select hypervisor based on “standards”
– Understand true costs of virtualization
– Multiple hypervisors are “OK”
– Bare metal can be a hypervisor
• To “Pool” resources or not
– Is there a real requirement for pooled resources
– Can the cloud management solution do better?
• Primary storage defined by hypervisor
• Template storage defined by solution
– Typically low cost options like NFS
8. Flat Network – Basic Layer 3 Network
Option XenServer vSphere KVM LXC Hyper-V
Security Groups Yes- bridge No Yes Yes Yes
IPv6 No No Yes Yes No
Multiple IPs per NIC Yes Yes Yes Yes Yes
Nicira NVP Yes No Yes No No
BigSwitch VNS Yes No Yes No No
65.11.1.2
65.11.1.3
65.11.1.4
65.11.1.5
Public Network
65.11.0.0/16
Guest VM 1
Guest VM 2
Guest VM 3
Guest VM 4
DHCP,
DNS
CloudStack
Virtual Router
Security Group 1
Security Group 2
9. VLANs for Private Cloud
Option XenServe
r
vSphere KVM LXC Hyper-V
Max VLANs 800 254 1024 1024 4094
IPv6 No No Yes Yes No
Multiple IPs
per NIC
Yes Yes Yes Yes Yes
Nicira NVP Yes No Yes No No
BigSwitch VNS Yes No Yes No No
MidoKura No No Yes No No
VPC Yes Yes Yes No Yes
NetScaler Yes Yes Yes No Yes
F5 BigIP Yes Yes Yes No Yes
Juniper SRX No Yes Yes No Yes
Cisco VNMC No Yes No No No
10.1.1.
1
10.1.1.
3
10.1.1.
4
10.1.1.
5
Public
Network/Internet
Guest Virtual Network 10.0.0.0/8
VLAN 100
DHCP, DNS
NAT
Load
Balancing
VPN
Public IP
65.37.14.1
Gateway
10.1.1.1
Guest VM
1
Guest VM
2
Guest VM
3
Guest VM
4
CloudStack
Virtual
Router
10. Beyond the VLAN – Network Virtualization
Option XenServer vSphere KVM LXC Hyper-V
OVS GRE tunnels Yes No No No No
Nicira STT tunnel Yes Yes Yes No No
MidoNet No No Yes No No
VXLAN No Yes Yes No No
NVGRE No No No No No
Nexus 1000v No Yes No No No
Juniper Contrail Yes No No No No
Palo Alto Yes Yes Yes No No
11. Virtual Private Cloud and nTier Applications
Feature XenServer vSphere KVM LXC Hyper-
V
PVLAN Yes - ovs Yes ovs No No Web
App
DB
Router
DC1
DC2
DC3
DC4
DC5
DC6
VLAN 1
VLAN 2
VLAN 3
S2S VPN
Private
GW
12. Delivering specific network services
• KVM
– IPv6
– Security groups
– Large quantity of VLANs
• vSphere
– VXLAN required vSphere Enterprise Plus
– Cisco Nexus 1000v and ASA 1000v require vSphere Enterprise Plus
• XenServer
– Security groups
– Large quantity of VLANs
– Juniper Contrail
14. Primary Storage Options
Feature XenServer vSphere KVM LXC Hyper-V
Local storage Yes Yes Yes Yes Yes
NFS Yes Yes Yes Yes No
SMB No No No No SMB3
Single path iSCSI Yes Yes Yes No No
Multipath iSCSI PreSetup No No No No
Direct array No VAAI No No No
Shared Mount No No Yes Yes No
Template format VHD OVA QCOW2 TAR VHD
SolidFire Plugin Yes Yes Yes No No
NetApp Plugin Yes Yes Yes No No
Zone wide No Yes Yes No No
Ceph RBD No No Yes No No
Clustered LVM No No Yes No No
Cluster
Host
Host
Primary Storage
15. Secondary Storage Options
Option XenServer vSphere KVM LXC Hyper-V
NFS Yes Yes Yes Yes No
Swift(1) Yes Yes Yes Yes No
S3 compatible (2) Yes Yes Yes Yes No
SMB No No No No Yes
(1) Requires NFS staging area
(2) Can be region wide, but must not have NFS secondary storage in zone
Zone
Secondary Storage
Pod
Cluster
Host
Host
Primary Storage
17. CloudStack Features
Feature XenServer vSphere KVM LXC Hyper-V
Disk IO Statistics Yes No Yes No Yes
Memory Overcommit Yes (4x) Yes No No No
Dedicated resources Yes Not with HA/DRS Yes No Yes
Disk IO throttling No No Yes Yes No
Disk snapshot (running) Yes Yes No No No
Disk snapshot (pluggable) Partial Partial No No No
Disk snapshot (Stopped) Yes Yes Yes No Yes
Memory snapshot Yes Yes Yes No No
Zone wide primary storage No Yes Yes Yes No
Resize disk Offline Online Grow Online No No
High availability CloudStack Native CloudStack No CloudStack
CPU sockets 6.2 and higher Yes Yes Host count Yes
Affinity groups Yes Yes Yes No Yes
18. XenServer 6.2
Feature
Source code model Open Source (GPLv2)
Maximum VM Density 650 (Linux)
CloudStack VM Density 500
CloudStack integration Direct XAPI calls
Maximum native cluster size 16
Maximum pRAM 1 TB
Largest VM 16vCPU/128GB
Windows Operating System All Windows supported by Microsoft
Linux Operating Systems RHEL, CentOS, Debian, Ubuntu, SLES, OEL
Advanced features supported ovs, Storage XenMotion, DMC
19. vSphere 5.5
Feature
Source code model Proprietary
Maximum VM Density 512
CloudStack VM Density 128
CloudStack integration vCenter
Maximum native cluster size 32
Maximum pRAM 4 TB
Largest VM 64 vCPU/1TB
Windows Operating Systems DOS, All Windows Server/Client
Linux Operating Systems Most
Advanced features supported HA, DRS, vDS, Storage vMotion
20. KVM (RHEL/CentOS 6.5 and Ubuntu 12.04)
Feature
Source code model Open Source (GPLv2)
Maximum VM Density 10 times the number of pCores
CloudStack VM Density 50
CloudStack integration CloudStack Agent (libvirt)
Maximum native cluster size No native cluster support
Maximum pRAM 2 TB
Largest VM 160 vCPU/2TB
Windows Operating Systems Windows XP and higher
Linux Operating Systems Varies
Advanced features supported None
21. Linux Containers
Feature
Source code model Open Source (GPLv2)
Maximum container Density 6000 (theoretical)
CloudStack container Density 50
CloudStack integration CloudStack Agent (libvirt), requires KVM for SVMs
Maximum native cluster size N/A
Maximum pRAM 2 TB
Largest container 2TB
Windows Operating Systems N/A
Linux Operating Systems Kernel compatible distros
22. Microsoft Hyper-V
Feature
Source code model Proprietary
Maximum VM Density 1024
CloudStack VM Density 1024
CloudStack integration CloudStack Agent (C# calling WMI)
Maximum native cluster Size 64
Maximum pRAM 4 TB
Largest VM 64 vCPU/1TB
Windows Operating Systems All Windows supported by Microsoft
Linux Operating Systems RHEL, CentOS, Debian, Ubuntu, SLES, OEL
Advanced features supported None
24. KVM
• Primary value proposition:
– Low cost with available vendor support
– Familiar administration model
– Broad CloudStack feature set with active development
• Cloud use cases:
– Linux centric workloads
– Dev/test clouds
– Web hosting
– Tenant density which dictates SDN options
• Weaknesses:
– Requires use of an installed CloudStack libvirt agent
– Limited native storage options
– No use of advanced native features
25. Linux Containers
• Primary value proposition:
– Low cost with available vendor support
– Familiar administration model
• Cloud use cases:
– Dev/test clouds
– Web application hosting
• Weaknesses:
– Requires use of an installed CloudStack libvirt agent
– Requires KVM for system VMs
– No use of advanced native features
– First introduced in CloudStack 4.2
26. Microsoft Hyper-V
• Primary value proposition:
– Unlimited Windows Server VM licenses
– Familiar Windows management paradigm
• Cloud use cases:
– Windows and Linux workloads
– Dev/test clouds
– .Net application web hosting
– Desktop as a Service clouds
• Weaknesses:
– Minimal use of advanced native features
– First introduced with CloudStack 4.3
27. vSphere
• Primary value proposition:
– Broad application and operating system support
– Readily available pool of vSphere administration talent
– Large eco-system of vendor partners
– Many CloudStack features are native implementations
– Direct feature integration via vCenter
• Cloud use cases:
– Private enterprise clouds
– Dev/test clouds
• Weaknesses:
– vSphere up-front license and ongoing support costs
– vCenter integration requires redundant designs
– Single data center per zone model
28. XenServer
• Primary value proposition:
– Low cost with available vendor support
– Broad CloudStack feature set with active development
– Large CloudStack install base
– Direct integration via XAPI toolstack
• Cloud use cases:
– Linux centric workloads
– Dev/test clouds
– Web hosting
– Desktop as a Service clouds
– Large VM density and secure tenant isolation
• Weaknesses:
– Minimal use of advanced native features
29. What About Multiple Hypervisor Support?
• Networking
– Ensure network labels match
– Topology is intersect of chosen hypervisors
• Storage
– For system VMs to specific hypervisor type
– Zone with primary storage limited
• Operations
– vSphere Datacenter can not span zones
– Hyper-V may not be mixed with other hypervisors
– HA won’t migrate between hypervisors
– Capacity planning at the cluster/pod level more difficult
30. Tying it all Together
1. Define success criteria
2. Select a topology which works
3. Decide on storage options
4. Define supported configurations
5. Select preferred hypervisor(s)
6. Validate matrix
7. Build your Cloud