Cloud computing environments provide enhanced scalability and flexibility to IT organizations. Many options exist for building cloud strategies, public, private etc. For many companies private cloud is an attractive option because it allows them to maintain full visibility and control of their IT systems. Private clouds can also be further enhanced by merging private cloud systems with public cloud systems in a hybrid cloud. This allows some systems to gain the economies of scale offered by public cloud while others are maintained internally. Some great examples of hybrid strategies would be:
- Utilizing private cloud for mission critical applications such as SAP while relying on public cloud for email systems, web hosting, etc.
- Maintaining all systems internally during normal periods and relying on the cloud for peaks. This is known as Cloud Bursting and is excellent for workloads that cycle throughout the day, week, month or year.
- Utilizing private cloud for all systems and capacity while relying on cloud based Disaster Recovery (DR) solutions.
Many more options exist and any combination of options is possible. If private cloud is part of the cloud strategy for a company there is a common set of building blocks required to design the computing environment.
In the diagram above we see that each component builds upon one another. Starting at the bottom we utilize consolidated hardware to minimize power, cooling and space as well as underlying managed components. At the second tier of the private cloud model we layer on virtualization to maximize utilization of the underlying hardware while providing logical separation for individual applications.
If we stop at this point we have what most of today’s data centers are using to some extent or moving to. This is a virtualized data center. Without the next two layers we do not have a cloud/utility computing model. The next two layers provide the real operational flexibility and organizational benefits of a cloud model.
To move out virtualized data center to a cloud architecture we next layer on Automation and Monitoring. This layer provides the management and reporting functionality for the underlying architecture. It could include: monitoring systems, troubleshooting tools, chargeback software, hardware provisioning components, etc. Next we add a provisioning portal to allow the end-users or IT staff to provision new applications, decommission systems no longer in use, and add/remove capacity from a single tool. Depending on the level of automation in place below some things like capacity management may be handled without user/staff intervention.
The last piece of the diagram above is security. While many private cloud discussions leave security out, or minimize its importance it is actually a key component of any cloud design. When moving to private cloud customers are typically building a new compute environment, or totally redesigning an existing environment. This is the key time to design robust security in from end-to-end because you’re not tied to previous mistakes (we all make them)or legacy design. Security should be part of the initial discussion for each layer of the private cloud architecture and the solution as a whole.
Private cloud systems can be built with many different tools from various vendors. Many of the software tools exist in both Open Source and licensed software versions. Additionally several vendors have private cloud offerings of an end-to-end stack upon which to build design a private cloud system. The remainder of this post will cover three of the leading private cloud offerings:
- Secure-Multi-Tenancy (NetApp, VMware, Cisco) (http://www.imaginevirtuallyanything.com/)
- Matrix (HP) (http://h18004.www1.hp.com/products/blades/components/matrix/main.html)
- Vblock (EMC, VMware, Cisco) (http://vcecoalition.com/solutions.htm)
Scope: This post is an overview of three excellent solutions for private cloud. It is not a pro/con discussion or a feature comparison. I would personally position any of the three architectures for a given customer dependant on customer requirements, existing environment, cloud strategy, business objective and comfort level. As always please feel free to leave comments, concerns or corrections using the comment form at the bottom of the post.
Secure Multi-Tenancy (SMT):
Vendor positioning: ‘This includes the industry’s first end-to-end secure multi-tenancy solution that helps transform IT silos into shared infrastructure.’
SMT is a pairing of: VMware vSphere, Cisco Nexus, UCS, MDS, and NetApp storage systems. SMT has been jointly validated and tested by the three companies, and a Cisco Validated Design (CVD) exists as a reference architecture. Additionally a joint support network exists for customers building or using SMT solutions.
Unlike the other two systems SMT is a reference architecture a customer can build internally or along with a trusted partner. This provides one of the two unique benefits of this solution.
- Because SMT is a reference architecture it can be built in stages married to existing refresh and budget cycles. Existing equipment can be reutilized or phased out as needed.
- SMT is designed to provide end-to-end security for multiple tenants (customers, departments, or applications.)
Vendor positioning: ‘The industry’s first integrated infrastructure platform that enables you to reduce capital costs and energy consumption and more efficiently utilize the talent of your server administration teams for business innovation rather than operations and maintenance.’
Matrix is a integration of HP blades, HP storage, HP networking and HP provisioning/management software. HP has tested the interoperability of the proven components and software and integrated them into a single offering.
- Of the three solutions Matrix is the only one that is a complete solution provided by a single vendor.
- Matrix provides the greatest physical server scalability of any of the three solutions with architectural limits of thousands of servers.
Vendor positioning: ‘The industry’s first completely integrated IT offering that combines best-in-class virtualization, networking, computing, storage, security, and management technologies with end-to-end vendor accountability.’
Vblocks are a combination of EMC software and storage storage, Cisco UCS, MDS and Nexus, and VMware virtualization. Vblocks are complete infrastructure packages sold in one of three sizes based on number of virtual machines. Vblocks offer a thoroughly tested and jointly supported infrastructure with proven performance levels based on a maximum number of VMs.
- Vblocks offer a tightly integrated best-of-breed solution that is purchased as a single product. This provides very predictable scalability costs when looked at from a C-level perspective (i.e. x dollars buys y scalability, when needs increase x dollars will be required for the next block.)
- Vblock is supported by a unique partnering between Cisco, EMC and VMware as well as there ecosystem of channel partners. This provides robust front and backend support for customer before during and after install.
Private cloud can provide a great deal of benefits when implemented properly, but like any major IT project the benefits are greatly reduced by mistakes and improper design. Pre-designed and tested infrastructure solutions such as the ones above provide customers a proven platform on which they can build a private cloud.