David Lefebvre Consulting Systems Engineer October 2015 Changing the role of IT Implementing the Hybrid Data Center In partnership with:
David Lefebvre
Consulting Systems EngineerOctober 2015
Changing the role of IT
Implementing the Hybrid Data Center
In partnership with:
2© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enterprise Workloads
Native CloudApplications
Big Data &Analytics
Collaboration & Video
HCS
IaaS
PaaS
Meraki
Analytics
WebEx
Security
IOE Apps
HANA aaS
IaaSPaaSNFV
vDesktop aaSvDesktop aaS
MicrosoftSuite aaS
Cisco Powered PartnerClouds
Cisco Cloud Services
Enterprise PrivateCloud
PublicClouds
3© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Building Private Cloud
4© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
A Major Shift
IT as a Service IaaS | PaaS | SaaS | XaaS
Flexible Consumption Models
CONSOLIDATIONVIRTUALIZATION
HYBRID CLOUDS
POLICY DRIVENAUTOMATION
TRADITIONAL DATA CENTER
We are here
CLOUD-READY DATA CENTER
5© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SaaS
Compute Storage Network
Autom
ation • Orchestration
Customer Interface
Service Catalog
Organization • Governance • Process
Risk • Security • Compliance
Applications
Platform
Abstraction • Virtualization
Infrastructure • Environmentals
10
9
8
7
2
1
3 4
5
6
PaaS
IaaS
FinanceTracking
The Domain Ten Architecture
6© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Automation
7© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
8© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
UCS Management Reduced time to deploy Rapid resource reallocation
Reduced infrastructure Cohesive resource pools
Unified Fabric
Compute With NO Compromise Blade and rack Integration Physical and virtual workloads
Virtualized I/O Improved scalability and flexibility Increased performance
Unified Computing Product Innovation
XML API STANDARDAPIs
9© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
UCS Service Profiles
SIM CardIdentity for a Phone
Service ProfileIdentity for a Server
UCS Service Profile
Network Policy
Storage Policy
Server Policy
10© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Subject Matter ExpertsDefine Policies
1
UCS: Embedded AutomationIntegrated, Policy-Based Infrastructure Management
Policies Create Service Profile Templates
Clone Templates toCreate Service Profiles
Associate Service Profiles to Configure Hardware
Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels
Server port configuration including LAN and SAN settings
Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions
Unique user ID (UUID), firmware revisions,and RAID controller settings
Service profile assigned to server, chassis slot, or pool
Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels
Server port configuration including LAN and SAN settings
Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions
Unique user ID (UUID), firmware revisions,and RAID controller settings
Service profile assigned to server, chassis slot, or pool
Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels
Server port configuration including LAN and SAN settings
Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions
Unique user ID (UUID), firmware revisions,and RAID controller settings
Service profile assigned to server, chassis slot, or pool
Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels
Server port configuration including LAN and SAN settings
Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions
Unique user ID (UUID), firmware revisions,and RAID controller settings
Service profile assigned to server, chassis slot, or pool
Uplink port configuration, VLAN, VSAN, QoS, and EtherChannels
Server port configuration including LAN and SAN settings
Network interface card (NIC) configuration: MAC address,VLAN, and QoS settings;host bus adapter HBA configuration: worldwide names (WWNs), VSANs, and bandwidth constraints;and firmware revisions
Unique user ID (UUID), firmware revisions,and RAID controller settings
Service profile assigned to server, chassis slot, or pool
2 3 4
NetworkSME
ServerSME
StorageSME
11© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Element ManagerSDN Controller
Automation / Orchestration
The New Data Center
Data Center 1
Campus
Core Core
Leaf Leaf Leaf
Spine Spine Spine Spine
Border Border
Data Center 2
Campus
Spine Spine Spine Spine
Core Core
Leaf Leaf Leaf Border Border
Data Center Interconnect
12© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Fabric Forwarding
Leaf
Spine Spine SpineSpine
Leaf
PacketSent
Lookup NextHop
Encapsulate &forward
Decapsulate &Deliver
13© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Spine Leaf Protocols
Fabric Path+ Proven
- Proprietary
Layer 3+ Interoperability
- No Layer 2
BGP EVPN+ Interoperability- Management
ACI+ Capability
- New Infrastructure
14© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
APIC
Application Centric Infrastructure
ADC APP DBF/WADC
WEB
HYPERVISORHYPERVISOR HYPERVISOR
CONNECTIVITY POLICY
SECURITY POLICIES QOS STORAGE AND
COMPUTE
APPLICATION L4..7
SERVICES
SLAQoSSecurityLoadBalancing
APP PROFILE
15© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Orchestration
16© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Automation and Orchestration - UCS Director
17© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
SaaS
Compute Storage Network
Autom
ation • Orchestration
Customer Interface
Service Catalog
Organization • Governance • Process
Risk • Security • Compliance
Applications
Platform
Abstraction • Virtualization
Infrastructure • Environmentals
10
9
8
7
2
1
4
5
6
PaaS
IaaS
FinanceTracking
The Domain Ten Architecture
18© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Cisco UCS Director
• Streamlines deployment
• Reduces provisioning by 88.4%1
• Unified provisioning & management
• Delivers consistency & speed
Principled Technologies, “Simplify server provisioning with Cisco UCS Director, December, 2014”
19© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Multivendor Support
ACI / Nexus StorageUCS Hypervisor
20© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Service Selection - Prime Service Catalog
21© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Prime Service Catalog
Services
2. User Orders Service
Service Items
1. UCSD Offers Services
3. UCSD ProvisionsServices
4. PSC discovers and syncs attributes/status
22© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Application Support in Stack Designer
23© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Intergrating Public Cloud
24© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Enterprise Workloads
Native CloudApplications
Big Data &Analytics
Collaboration & Video
HCS
IaaS
PaaS
Meraki
Analytics
WebEx
Security
IOE Apps
HANA aaS
IaaSPaaSNFV
vDesktop aaSvDesktop aaS
MicrosoftSuite aaS
Cisco Powered PartnerClouds
Cisco Cloud Services
Enterprise PrivateCloud
PublicClouds
25© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
EnterprisePrivateCloud
Intercloud Fabric
VMware
vCenter
Hyper-V
SCVMM
Cloud Integration - Intercloud Fabric
User Portal
Migration
Cloud Provider
API Calls
Cloud Provider
API Calls
Cloud Provider
API Calls
Cloud Provider
API Calls
Secure Tunnel
26© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
27© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
OR
Do You Have Leverage?
28© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
28
Compliance Issues
29© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Evaluate The Metrics That Matter To You
Cost Security DRAvailabilityTimeliness
Scalability Performance LeverageComplianceTroubleshooting
30© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Doing IT RightThings to consider
31© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Defining Trust
ContractsReputationKnowledgeExperience
TestingTools
Controls
Trusted Untrusted
32© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Defining TrustTrusted Untrusted
33© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Verify Your Assumptions
34© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Test And Test Again
35© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Have A Migration Plan
36© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
Have A Backout Plan
37© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4
Any Cloud
Managed
Public
Private Private Cloud
Stack
Integrated Infrastructure
3
Build Your Private Cloud
Cisco Data Center Strategy
8 Network Compute Storage Enterprise Wide Policy 9 Analytics Enterprise Wide Analytics
10SECURITY
1
Modernize Infrastructure
Network
Compute
Storage
L4-7 / Security
DATA CENTER
POLICY
Automate and Simplify
2
SecurelyTransfer Workloads
5
Self-Service Portal
6
Extend Policy
7
38© 2015 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
4
Any Cloud
Managed
Public
Private Cloud
Software Stack
Integrated Infrastructure
3
Build Your Private Cloud
Cisco Data Center Portfolio
7 Network Compute Storage Enterprise Wide Policy 9 Analytics Enterprise Wide Analytics
10SECURITY
1
Open and Programmable Infrastructure
Network
Compute
Storage
L4-7 / Security
DATA CENTER
POLICY
21
Nexus / MDS
UCS
3rd Party Storage
ASA / FirePOWER
2
UCS Director
ACI (APIC)
UCSM
Automate and Simplify
Cisco ONE Enterprise
Cloud / OpenStackUCS Integrated Infrastructure
3
8 UCS Mini + 3rd party storage Data VirtualizationAnalytics Platform + Solutions9
CISCO SECURITY SOLUTIONS (Network + AMP + E-mail + Web )10
4
Move Data and Workloads Securely
5
Move Services AcrossCatalogs
6
Extend Policy Model
Cisco Intercloud Fabric
5
Cisco Prime Services Catalog
6
ACI Policy Model
Intercloud
77
Thank You. Visit us in the World of Solutions.
In partnership with: