Cloud_and_Virtualization_Concepts (2)
Cloud_and_Virtualization_Concepts (2)
Concepts
From NDG, in partnership with VMware IT Academy
www.vmware.com/go/academy
Why learn virtualization?
• Modern computing is more efficient due to virtualization
• Similar to how your brain controls your actions, software controls hardware
Motherboard Printed Circuit Board (PCB) that holds the processor, RAM, ROM, network
and Input/Output (I/O) and other components
Chipset A collection of microchips on motherboard that manage specific functions
Storage A persistent (non-volatile) storage device such as a Hard Drive Disk or Solid
State Drive
Software
• System software is necessary for hardware to function
• Application software tells your system to execute a task you want done
Now that you are aware of the roles of hardware and software, the concept of
virtualization will be easier to grasp. Virtualization is the “layer” of technology
that goes between the physical hardware of a device and the operating system
to create one or more copies of the device.
What is a VM?
• VM stands for “Virtual Machine”
• Hosts VMs
• The hypervisor pulls physical resources (i.e., CPU, RAM) from the server
and turns them into virtual hardware
Types of Hypervisors
• Type 1 Hypervisor – Bare metal hypervisor (VMware ESXi)
• Types of servers:
- Tower
- Blade server
- Rack-mounted server
Compute Systems
• What is the architecture of a server?
• Classic architecture is 32-bit and in 2003 the 64-bit extension was released
for x86 architecture.
• Levels of RAID are used to identify types of RAID and what storage
availability and redundancy they offer (i.e., 1 = mirroring, 5 = parity)
Storage - Block vs. File-Level
• Block-Level Storage – Data is written to and accessed from storage volumes (blocks)
• File-Level Storage – Data is written to disks but accessed from the default file system
Storage – Types of Data Center Storage
• DAS (Direct Attached Storage) – Storage device is directly attached to a server (block-
level)
• SAN (Storage Area Network) – Clustered storage devices on their own network that
servers can connect to (block-level)
Common Data Center Storage Protocols
Protocol Application
Zombies
Virtual Data Center
Benefits of a Virtual Data Center
• Data centers use a lot of hardware and virtualization makes hardware more
efficient
• Less labor needed to monitor data center (administrator can monitor from their
desk using a program)
• A Data Center Knowledge study reported that from 2010 to 2018 there
was a 500% increase in data center utilization, but only a 6%
increase in energy consumption.
• Components of ESXi:
- Unix Microkernel
- VMware Kernel
(VMkernel)
vCenter
• vCenter: Software installed
on a dedicated server to
manage ESXi servers and
other components of a
virtualized data center.
vSphere Client
• vSphere Client: Program
with a graphical user
interface (GUI) that
allows data center
administrators to
connect to vCenter and
ESXi remotely.
vSphere Client
vSphere Host Client
• vSphere Host Client:
Program with a graphical
user interface (GUI) that
allows data center
administrators to connect
to ESXi remotely.
• What is a vSwitch?
- Virtual switch that virtual devices can
connect to in order to communicate
with each other
• What is a vLAN?
- Virtual Local Area Network that is
segmented into groups of ports isolated
from one another, creating different
network segments
Types of Virtual Networks
• Bridged Network: The host server and the VM are
connected to the same network, and the host shares
its IP address with the VM
• Two strategies:
- Containment: Not deploying any existing applications for customers on
virtual servers. Maintain applications running in the hardware-based data
center.
• Private Cloud
• Community Cloud
• Public Cloud
• Hybrid Cloud
Cloud Deployment Models
• Private Cloud: organization • Community Cloud: different
has complete control over the organizations have control
IT infrastructure. over the IT infrastructure.
Cloud Deployment Models
• Public Cloud: the cloud provider • Hybrid Cloud: organization has its
owns the IT infrastructure and own cloud but also rents IT resources
organizations rent IT resources in on the public cloud.
the cloud.
Did you know?
• Cloud providers are
committing to sustainable
computing goals.
• Containers use virtualization technology like VMs but require less resources.
Note
The kernel is like the brain of the guest OS that controls applications running on a VM or Container.
Recall the guest OS is installed on the host.
• Like an OS, the kernel includes dependencies and allows an application to run.
• Without the need for a complete OS, the container uses less resources.
Introduction to Containers
• Containers can be used on VMs since they are less resource intensive.
Introduction to Containers
• VMs use a hypervisor. What do
Containers use for virtualization?
• A pod has at least one container and has its own IP address.
• Built-in security protocols are built into the system from the start by using
DevSecOps methods.
• Built-in security includes intrinsic security where the security is woven into
the cloud infrastructure.
Container Security
• Providing intrinsic security to the cloud has two main approaches:
Zero-Trust and Micro-Segmentation.
• Micro-segmentation uses individual networking protocols for VMs and
containers on a network.
Container Security
• Zero-trust is a security architecture that implements multiple levels
of security.
• Multiple levels of security must be met before access to
infrastructure is granted.
• Zero-trust has five pillars (levels) of trust:
• Device • Application
• User • Data
• Transport/Session
Container Security
• The following describes how each pillar of zero-trust is achieved:
Pillar Method
Device Methods to secure devices, like endpoint security can be used to achieve device trust.
User User authentication methods like passwords, tokens, multi-factor authentication and risk
analysis of users are utilized for user trust.
Transport/Session Uses micro-segmentation to protect virtual sessions and encryption of data transmitted
at TCP level for transport trust.
Application Workload security, single sign-on (SSO), and application isolation are used for
application trust.
Data For data trust, data protection is used to prevent data from being compromised, lost or
corrupted.
Container Security
• The following is an overview of zero-trust security:
-
VMware Solutions
vMotion
• Moves running virtual machines from one ESXi host to another ESXi host
without service interruption (live migration)
• vSphere Storage Distributed Resource Scheduler provides the same solution for storage
clusters
Fault Tolerance (FT)
• A secondary copy of that virtual machine and its files is created on another ESXi
host and datastore
• Using FT, the transfer to a different server is seamless and will not be noticeable
to the end-user
Replication
• vSphere Replication makes copies of
VMs in a different physical location,
useful for data protection and disaster
recovery
• It can be integrated and managed in vSphere and the cloud with one interface
Tanzu
• Tanzu runs on a Kubernetes grid and manages clusters
• The Tanzu Mission Control is a management interface for the clusters, and
operates and secures K8s in the cloud
CloudHealth
• Analyze and report your cloud costs,
usage, performance, and security