This document summarizes how to set up a Ceph cluster for private cloud storage using SUSE Cloud. It describes configuring over 10 storage nodes and 3 monitor nodes for the Ceph cluster. It explains integrating the external Ceph cluster with SUSE Cloud to provide block storage, image storage, and object storage services. It also covers setting up Ceph directly with SUSE Cloud using Crowbar to deploy all nodes.
Dell and SUSE have collaborated to bring to our customers an enterprise ready open source private cloud solution with many advanced capabilities. This is the slide set from a recent Webinar where Dell and Suse presented an overview of this cloud solution. The main features of this solution include:
Automated install process using Crowbar
Rapid setup and configuration of cloud environment
Easy expansion of cloud environment
Multi-hypervisor support (KVM, Xen, Hyper-V and VMware)
Application and hardware certifications
Integrated into existing SUSE product lifecycle processes
24x7, worldwide technical support
Architected for unlimited growth
Open APIs for integration with third-party software
3.6.2015 järjestimme Konesali -ja tietoturvatapahtuma Best of Brainsharen asiakkaille ja kumppaneillemme.
Konesalin SUSE esityksistä vastasi SUSE Suomen asiantuntijat. Esittelyssä SUSE OpenStack Cloud 5 - Privaatti, hybridi ja julkinen pilvi ja ratkaisun uudet ominaisuudet.
Uyuni is a configuration and infrastructure management tool that saves you time and headaches when you have to manage and update tens, hundreds or even thousands of machines.
Through the story of a fictional character "Jack", representing a systems administrator, this presentation shows how the rich feature set of Uyuni helps sysadmins in their day to day operations.
Watch the video on YouTube: https://youtu.be/wZxnmruV_Uo
Dell and SUSE have collaborated to bring to our customers an enterprise ready open source private cloud solution with many advanced capabilities. This is the slide set from a recent Webinar where Dell and Suse presented an overview of this cloud solution. The main features of this solution include:
Automated install process using Crowbar
Rapid setup and configuration of cloud environment
Easy expansion of cloud environment
Multi-hypervisor support (KVM, Xen, Hyper-V and VMware)
Application and hardware certifications
Integrated into existing SUSE product lifecycle processes
24x7, worldwide technical support
Architected for unlimited growth
Open APIs for integration with third-party software
3.6.2015 järjestimme Konesali -ja tietoturvatapahtuma Best of Brainsharen asiakkaille ja kumppaneillemme.
Konesalin SUSE esityksistä vastasi SUSE Suomen asiantuntijat. Esittelyssä SUSE OpenStack Cloud 5 - Privaatti, hybridi ja julkinen pilvi ja ratkaisun uudet ominaisuudet.
Uyuni is a configuration and infrastructure management tool that saves you time and headaches when you have to manage and update tens, hundreds or even thousands of machines.
Through the story of a fictional character "Jack", representing a systems administrator, this presentation shows how the rich feature set of Uyuni helps sysadmins in their day to day operations.
Watch the video on YouTube: https://youtu.be/wZxnmruV_Uo
Uyuni is a software-defined infrastructure and configuration management solution. It bootstraps physical servers, creates VMs for virtualization and cloud, deploys and updates packages -even with content lifecycle management features-, builds container images, and tracks what runs on your Kubernetes clusters. All using Salt under the hood.
3.6.2015 järjestimme Konesali -ja tietoturvatapahtuma Best of Brainsharen asiakkaille ja kumppaneillemme.
Konesalin SUSE esityksistä vastasi SUSE Suomen asiantuntijat. Esittelyssä uutuus SUSE Enterprise Storage.
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 WSO2
To view recording of this webinar please use the below URL:
http://wso2.com/library/webinars/2015/04/build-platform-as-a-service-paas-with-suse-studio-wso2-middleware-and-ec2
Raise your Cloud program up a notch by delivering Platform as a Service (PaaS) to application teams. SUSE Studio, WSO2, and EC2 helps you assemble, build, and deploy portable application services instead of platform silos. In this session, Chris will demonstrate how you can rapidly build standardized application stack environments and offer a policy compliant Platform as a Service to your application project teams.
Openstack in action2 canonical - openstack cloud on ubuntu it is happening ...eNovance
OpenStack in action 2! Production ready 31/05/12
"OpenStack Cloud on Ubuntu: it is happening now!" by Nick Barcet, Ubuntu Cloud Product manager, Canonical
The Cloud Operating System powered by OPenStack is increasingly helping businesses to innovate, stay ahead of the competition, and differentiate based on unique expertise. This presentation provides an overview of the business challenges faced by IT departments and service providers and why and how they are looking at OpenStack and open source options to solve these issues. The presentation also covers how Dell is involved in OpenStack community and how it is helping customers succeed with OpenStack with its comprehensive end-to-end solutions powered by OpenStack at its core.
There is a growing trend today of enterprises leveraging both Amazon Web Services (AWS) and on-premise OpenStack-based private clouds. However, the default networking option in OpenStack remains broken and the plethora of confusing plug-ins makes networking in OpenStack mysterious and difficult to manage.
Enter MidoNet, the open source network virtualization solution from Midokura favored by DevOps cultures in web scale enterprises and service providers around the world. This session will present case studies from several end user deployments, showing how they use MidoNet to build, run and manage large-scale virtual networks in OpenStack clouds. The session will also discuss how transitioning from a public to private cloud enables organizations to accomplish much more with the same resources, without over-simplifying the inherent complexity of running an OpenStack cloud.
ION Tokyo slides for "The Business Case for Implementing DNSSEC" by Dan York (Internet Society).
DNSSEC helps prevent attackers from subverting and modifying DNS messages and sending users to wrong (and potentially malicious) sites. So what needs to be done for DNSSEC to be deployed on a large scale? We’ll discuss the business reasons for, and financial implications of, deploying DNSSEC, from staying ahead of the technological curve, to staying ahead of your competition, to keeping your customers satisfied and secure on the Internet. We’ll also examine some of the challenges operators have faced and the opportunities to address those challenges and move deployment forward.
Uyuni is a software-defined infrastructure and configuration management solution. It bootstraps physical servers, creates VMs for virtualization and cloud, deploys and updates packages -even with content lifecycle management features-, builds container images, and tracks what runs on your Kubernetes clusters. All using Salt under the hood.
3.6.2015 järjestimme Konesali -ja tietoturvatapahtuma Best of Brainsharen asiakkaille ja kumppaneillemme.
Konesalin SUSE esityksistä vastasi SUSE Suomen asiantuntijat. Esittelyssä uutuus SUSE Enterprise Storage.
Build Platform as a Service (PaaS) with SUSE Studio, WSO2 Middleware, and EC2 WSO2
To view recording of this webinar please use the below URL:
http://wso2.com/library/webinars/2015/04/build-platform-as-a-service-paas-with-suse-studio-wso2-middleware-and-ec2
Raise your Cloud program up a notch by delivering Platform as a Service (PaaS) to application teams. SUSE Studio, WSO2, and EC2 helps you assemble, build, and deploy portable application services instead of platform silos. In this session, Chris will demonstrate how you can rapidly build standardized application stack environments and offer a policy compliant Platform as a Service to your application project teams.
Openstack in action2 canonical - openstack cloud on ubuntu it is happening ...eNovance
OpenStack in action 2! Production ready 31/05/12
"OpenStack Cloud on Ubuntu: it is happening now!" by Nick Barcet, Ubuntu Cloud Product manager, Canonical
The Cloud Operating System powered by OPenStack is increasingly helping businesses to innovate, stay ahead of the competition, and differentiate based on unique expertise. This presentation provides an overview of the business challenges faced by IT departments and service providers and why and how they are looking at OpenStack and open source options to solve these issues. The presentation also covers how Dell is involved in OpenStack community and how it is helping customers succeed with OpenStack with its comprehensive end-to-end solutions powered by OpenStack at its core.
There is a growing trend today of enterprises leveraging both Amazon Web Services (AWS) and on-premise OpenStack-based private clouds. However, the default networking option in OpenStack remains broken and the plethora of confusing plug-ins makes networking in OpenStack mysterious and difficult to manage.
Enter MidoNet, the open source network virtualization solution from Midokura favored by DevOps cultures in web scale enterprises and service providers around the world. This session will present case studies from several end user deployments, showing how they use MidoNet to build, run and manage large-scale virtual networks in OpenStack clouds. The session will also discuss how transitioning from a public to private cloud enables organizations to accomplish much more with the same resources, without over-simplifying the inherent complexity of running an OpenStack cloud.
ION Tokyo slides for "The Business Case for Implementing DNSSEC" by Dan York (Internet Society).
DNSSEC helps prevent attackers from subverting and modifying DNS messages and sending users to wrong (and potentially malicious) sites. So what needs to be done for DNSSEC to be deployed on a large scale? We’ll discuss the business reasons for, and financial implications of, deploying DNSSEC, from staying ahead of the technological curve, to staying ahead of your competition, to keeping your customers satisfied and secure on the Internet. We’ll also examine some of the challenges operators have faced and the opportunities to address those challenges and move deployment forward.
JMP206 : Calling Home: Enabling the IBM Sametime Softphone in ST9Keith Brooks
The session Jeremy Sanders and I presented today the IBM Connect 2014 event in Orlando.
Need my help? Contact Keith Brooks via one of the following ways:
Blog http://blog.vanessabrooks.com
Twitter http://twitter.com/lotusevangelist
http://about.me/keithbrooks
For more information on ThinkRite, http://www.thinkrite.com
Logs are one of the most important pieces of analytical data in a cloud-based service infrastructure. At any point in time, service owners and operators need to understand the sta- tus of each infrastructure component for fault monitoring, to assess feature usage, and to monitor business processes. Application developers, as well as security personnel, need access to historic information for debugging and forensic in- vestigations.
This paper discusses a logging framework and guidelines that provide a proactive approach to logging to ensure that the data needed for forensic investigations has been gener- ated and collected. The standardized framework eliminates the need for logging stakeholders to reinvent their own stan- dards. These guidelines make sure that critical information associated with cloud infrastructure and software as a ser- vice (SaaS) use-cases are collected as part of a defense in depth strategy. In addition, they ensure that log consumers can effectively and easily analyze, process, and correlate the emitted log records. The theoretical foundations are em- phasized in the second part of the paper that covers the im- plementation of the framework in an example SaaS offering running on a public cloud service.
While the framework is targeted towards and requires the buy-in from application developers, the data collected is crit- ical to enable comprehensive forensic investigations. In ad- dition, it helps IT architects and technical evaluators of log- ging architectures build a business oriented logging frame- work.
The slides from our first webinar on getting started with Ceph. You can watch the full webinar on demand from http://www.inktank.com/news-events/webinars/. Enjoy!
Trying and evaluating the new features of GlusterFS 3.5Keisuke Takahashi
My presentation in LinuxCon/CloudOpen Japan 2014.
It has passed few days since GlusterFS 3.5 released so feel free to correct me if you find my mistakes or misunderstandings. Thanks.
The TLS/SSLv3 renegotiation vulnerability explainedThierry Zoller
The whitepaper explains the SSLv3/TLS renegotiation vulnerability (CVE-2009-3555) to a broader audience and goes into details about the different attack vectors possible. The whitepaper includes original research such as downgrading the client down to clear-text protocol transparently.
The paper is referenced by the US-CERT, FINCERT, RUS-CERT, Qualys, Nessus as the main reference for this vulnerability.
This presentation digests and analyzes the OAuth versions 1.0 and 2.0.
Doing a deep dive into OAuth I found myself forced into a puzzle with many pieces. This was worthwhile as OAuth is quite cool. For those interested in a quick-start check this slide-deck - I hope it saves others from puzzling.
DANE: The Future of Transport Layer Security (TLS)
Dan York (Internet Society)
If you connect to a “secure” server using TLS/SSL (such as a web server, email server or xmpp server), how do you know you are using the correct certificate? With DNSSEC now being deployed, a new protocol has emerged called “DANE” (“DNS-Based Authentication of Named Entities“), which allows you to securely specify exactly which TLS/SSL certificate an application should use to connect to your site. DANE has great potential to make the Internet much more secure by marrying the strong integrity protection of DNSSEC with the confidentiality of SSL/TLS certificates. In this session, we will explain how DANE works and how you can use it to secure your websites, email, XMPP, VoIP, and other web services.
Bridging IaaS With PaaS To Deliver The Service-Oriented Data CenterChris Haddad
As enterprises deploy private IaaS clouds into production they are reevaluating their future application delivery models. SUSE and WSO2 believe that private PaaS will leverage the automation and scalability of Private IaaS solutions, such as OpenStack-based SUSE Cloud, to deliver the secure, standardized development environments that will make migrating to an agile, service oriented delivery model possible. Come learn how the combination of IaaS and PaaS enables enterprises to more efficiently and flexibly tackle the challenges of the modern connected enterprise.
SUSE, Hadoop and Big Data Update. Stephen Mogg, SUSE UKhuguk
This session will give you an update on what SUSE is up to in the Big Data arena. We will take a brief look at SUSE Linux Enterprise Server and why it makes the perfect foundation for your Hadoop Deployment.
Sviluppare velocemente applicazioni sicure con SUSE CaaS Platform e SUSE ManagerSUSE Italy
BS Company e SUSE mostrano casi concreti in cui l’impiego di SUSE Container as a Service Platform e SUSE Manager, insieme ad altri strumenti Open Source di CI/CD hanno permesso di ridurre il “time to market” nello sviluppo applicativo, mantenendo gli standard di sicurezza richiesti in ambito Enterprise. (Massimo Montecchi, BS Company e SUSE)
This is a high-level presentation I will be presenting to employees at Medavie. I thought it might be useful for other people as well. Its vendor agnostic.
IBM’s Steve Barbieri and Chad Holliday show how enterprise customers are using blueprints to develop their infrastructure and application layers across different cloud environments - helping them "make the move to cloud" in 2017.
Amazon Web Services and PaaS - Enterprise Java for the Cloud Era? - Mark Pric...jaxconf
The extraordinary growth of Java during the last decade owed everything to the set of infrastructure services that application servers provided as part of the platform. However, TCO eventually drove the move to the cloud and PaaS (Platform as a Service) is set to deliver a standard run-time for the next generation of applications, replacing the proprietary infrastructure provided by the application server vendors. Now the question is: where do developers of real-world business applications look for a common set of standard infrastructure services? Is there a common framework that can provide essential application services, such as message queueing, push notifications, email integration, in-memory caching and processing? Amazon Web Services (AWS) with their highly-scaleable IaaS (Infrastructure as a Service) model are an obvious answer, but how best to combine Java's rich ecosystem of tools, frameworks and knowledge with the scale and cost-effectiveness of cloud-based web services? This session will help you to understand how you can deliver applications that make effective use of those services by using a Java PaaS, without being forced to support the underlying infrastructure. In this code-rich session, aimed at architects and developers, Mark Prichard of CloudBees will show how you can: Pass Amazon security credentials and configuration parameters to PaaS applications at run-time to provide customized environments; use JDBC and Amazon RDS (Relational Data Service) to provide resilient and performant relational data servicesReplace JMS queues and topics with Amazon SQS (Simple Queue Service) and SNS (Simple Notification Service) to develop cloud-based messaging applications; use Amazon's SES (Simple Email Service) from Java applications. We'll also look at other cloud e-mail services that offer easy integration with the PaaS modelRun distributed caching solutions in the cloud using Amazon ElastiCache's in-memory distributed caching with Java PaaS deployments.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
4. Virtualization and Cloud are Converging
Scale Out Architecture
Traditional Apps
Scale Up Architecture
5. Issues with Traditional Architecture
• Service requests take too long
– More and more clients devices are coming online
– Much harder to maintain service to customers
• Systems can't scale to cope with the demand
• Our Data is too large
– Producing vast amounts of data
– Way past the ability of traditional systems and applications
6. A different kind of architecture
Cloud Workloads
• Applications scale out: add more VMs
• Stateless VMs, application distributed
• Small VMs: vCPU, vRAM, storage separate
• Application SLA <> of any one VM
• SLA requires to create and destroy VMs where needed
• Lifecycle measured in hours to months
• Applications designed to tolerate failure of VMs
Traditional Workloads
• VMs scale up: add vCPU, vRAM etc
• Stateful VMs, application = VM
• Big VMs: vCPU, vRAM, local storage inside VM
• Application SLA = SLA of VM itself
• SLA relies on underlying HA technology
• Lifecycle measured in years
• Applications not designed to tolerate failure of
VMs
7. 7
“Pets” vs “Cattle”
What is a perfect cloud workload?
many sheep
- numbered
- standard images
- replaceable nodes
- highly automated
some dogs
- named
- special instances
8. 8
Storage in the Cloud
• New workloads store data separately
• How to handle the large amount of data?
9. Characteristics of the cloud
• Scalability
– Shrink & Grow
• Instant On / Off
• Cost
– Bring Billing back to zero
11. What is OpenStack?
● Open source project for building IaaS clouds
● Delivers cloud management platform software
● Strong community with rapid development
● Massive industry involvement
●
Quickly maturing technology – 8th
release
12. 12
How is SUSE Participating?
Platinum Member Alan Clark
first Chairman of the Board
Technical
Contributions
Promotion in
openSUSE Community
OpenStack
Distribution
14. SUSE Cloud
SUSE Cloud is an open source software solution based on the OpenStack
and Crowbar projects that provides the fundamental capabilities for
enterprises to deploy Infrastructure-as-a-Service Private Clouds
15. What is SUSE Cloud?
ComputeCompute
StorageStorage
NetworkingNetworking
Abstracts hardware (server, storage, and network
infrastructure) into a pool of computing, storage, and
connectivity capabilities that are delivered as a service
wrapped in the enterprise ecosystem of SUSE.
19. 19
SUSE Cloud 3 Highlights
• Based on OpenStack Havana
‒ Orchestration module (Heat) project for VM orchestration
‒ Telemetry module (Ceilometer) improves cloud measurement
• New Features
‒ Full VMware support - in addition to KVM, Xen, Hyper-V
‒ Improved networking and block storage adapter support
‒ Cisco Nexus, EMC, VMware NVP and others
‒ Updated Ceph packages
‒ SUSE Cloud 2 to SUSE Cloud 3 upgrade
‒ Manual addition of existing servers as cloud nodes
• Platform for High Availability
‒ Delivered as update in March
]
22. 22
Set up a Ceph cluster for private cloud
• Ceph storage:
‒ Ceph OSD – servers with lots of disks to store data
‒ Ceph Mon – monitoring server
• Private cloud:
‒ Use Ceph storage for Block Storage, Object Storage and
Image Service
‒ KVM as hypervisor with Ceph RBD
23. 23
Set up (continued)
• How to set up the cluster with 10+ storage nodes
and at least 3 monitors?
‒ All storage nodes same setup
‒ All monitors same setup
‒ And integration into SUSE Cloud
• Crowbar can handle this easily
30. 30
Workshop: Wege in ein
Hybric-Cloud
Betriebsmodell
Details: https://www.suse.com/de-de/events/ws-hybrid-cloud/
SAP Partner Port, Walldorf
19. March, 10. April and 20. Mai
“OpenStack als Private Cloud SAP Platform
– SUSE Cloud”
34. Unpublished Work of SUSE. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary and trade secret information of SUSE.
Access to this work is restricted to SUSE employees who have a need to know to perform tasks within the scope of
their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated,
abridged, condensed, expanded, collected, or adapted without the prior written consent of SUSE.
Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a
product. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making
purchasing decisions. SUSE makes no representations or warranties with respect to the contents of this document,
and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. The
development, release, and timing of features or functionality described for SUSE products remains at the sole
discretion of SUSE. Further, SUSE reserves the right to revise this document and to make changes to its content, at
any time, without obligation to notify any person or entity of such revisions or changes. All SUSE marks referenced in
this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All
third-party trademarks are the property of their respective owners.