0 ratings0% found this document useful (0 votes) 18 views13 pagesMigration
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
+ Ror-Usage Metering and Billing : Services must be priced on a shortterm basis (eg., by
| the hour), allowing users to release (and not pay for) resources as soon as they are not
needed
+ Elasticity : users expect clouds to rapidly provide resources in any quantity at any time.
In particular, itis expected that the additional resources can be
* (a) provisioned, possibly automatically, when an application load increases and
+ (b) released when load decreases (scale up and down)
Customization: resources rented from the cloud must be highly customizable.
* In the case of inffastructure services, customization means allowing users to deploy
specialized virtual appliances and to be given privileged (root) access to the virtual
servers
(TING INTO THE CLOUD
+ Why Migrate?
+ There are economic and business reasons why an enterprise application can be migrated
into the cloud, and there are also a number of technological reasons.
+ Initiatives in adoption of cloud technologies in the enterprise,
* resulting in integration of enterprise applications running off the captive data centers with
the new ones that have been developed on the cloud.
Migration can happen at one of the five levels of
‘application,
© Scanned with OKEN ScannerFIGURE 24. The Seven-Step Model of Migration into the Cloud. (Source: Infosys
Research.)
erative Step
eS eS
TAGE BE BE, The iterative Seven-atep Model of Migration into the Cou ee
ied c uh 1d. (Sours
© Scanned with OKEN ScannerMigration Risks and Mitigation
+ The biggest challenge to any cloud migration project is how effectively the migration
risks are identified and mitigated.
Migration risks for migrating into the cloud fall under two broad categories:
general migration risks
the security-related migration risks
several issues identifying all possible production level deviants:
— the business continuity and disaster recovery in the world of cloud computing
service;
= the compliance with standards and governance issues; the IP and licensing issues;
= the quality of service (QoS) parameters as well as the corresponding SLAS
‘committed to;
= the ownership, transfer, and storage of data in the application;
= the portability and interoperability issues which could help mitigate potential
= et
vendor lock-ins;
front - as addressed in the guideline document published by the Cloud
© Scanned with OKEN Scanneres in the Cloud
RE 2.3. ‘Under the hood’ challenges ofthe cloud computing services implementations.
Fcloud computing means dependence on others and that could possibly limit flexibility
he others are likely become the bigger Internet companies like Google and IBM,
may monopolise the market.
e argue that this use of supercomputers is a retum to the time of mainframe
g that the PC was a reaction against.
d prove to be a big issue:
ill unclear how safe out-sourced data is and when using these services
ship of data is not always clear.
es relating to policy and access:
data is stored abroad whose policy do you adhere to?
if the remote server goes down?
© Scanned with OKEN Scanner‘oe
> INFRASTRUCTURE AS A SERVICE PROVIDERS (IAAS)
+ Public Infrastructure as a Service providers commonly offer viral servers containing
‘one or more CPUs, OS, software stack, storage space and communication facilities
+ The most relevant features are:
* (i) geographic distribution of data centers;
* ii) variety of user interfaces and APIs to access the system;
* (ili) specialized components and services that aid particular applications (c.8.
loadbalancers,)
+ Gis) choice of virtualization platform and operating systems;
(¥) different billing methods and period
‘Geographic Presence: To improve availability and responsiveness, a provider of worldwide
_ services would typically build several data centers distributed around the world.
+ Availability zones are “distinct locations that are engineered to be
insulated from failures in other availability zones and provide inexpensive,
low-latency network connectivity to other availability zones in the same
- various usersand their preferences.
es of user interfaces (UI) provide different levels of abs
© Scanned with OKEN Scanner|
|
|
|
‘Advance reservations allow users to request for an IaaS provider to reserve resources
fora specific time frame in the future, thus ensuring that cloud resources will be available
at that time
+ Amazon Reserved Instances is a form of advance reservation of capacity,
allowing users to pay a fixed amount of money in advance to guarantee resource
availability
Automatic Sealing and Load Balancing.
‘As mentioned earlier in this chapter, elasticity is a key characteristic of the cloud
computing model.
Applications often need to scale up and down to meet varying load conditions.
Service-Level Agreement.
Service-level agreements (SLAs) are offered by IaaS providers to express their
commitment to delivery of a certain QoS.
To customers it serves as a warranty.
+ Amazon EC2 states that “if the annual uptime Percentage for a customer drops
below 99.95% for the service year, that customer is eligible to receive a service
credit equal to 10% of their bill”
‘Hypervisor and Operating System Choice:
— Traditionally, IaaS offerings have been based on heavily
Xen deployments. a
= Iaa$ providers needed expertise in Linux, 1
© Scanned with OKEN Scanner+ the user pays only for the capacity of the provisioned resources at « particular time
‘Amazon Elastic Compute Cloud (EC2) is an IaaS service that provides elastic compute
‘capacity in the cloud
Private Cloud and Infrastructure Services
+ A private cloud aims at providing public cloud functionality, but om private resources,
While maintaining control over an organization's data and resources 10 meet vecurity wnd
governance’s requirements in an organization,
+ Private clouds exhibit the following characteristis:
= Allow service provisioning and compute capability for an organization's users in
‘a self-service manner.
= Automate and provide well-managed virtualized environments,
= Optimize computing resources, and servers’ utilization.
= Support specific workloads,
+ Examples are Eucalyptus and OpenNebula
Svhich a combination of private/internal and enteral cloud resourees exist together by
‘enabling outsourcing of noneritical services and functions in public cloud and keeping the
critical ones internal
Release resources from a public cloud and to handle sudden demand usage, which ie
loud and Virtualization Standardization Efforts
© Scanned with OKEN Scanner+ NMAN'S OVE (Qpen Viruslization Format) in a collaboration between industry key
pinyers: Dell HP_ IBM. Microsoft, NenSource, and Vmware. |
- (OVE sqecification provides 2 common format to package and securely distribute virtual |
sapplimess across makin virtualization pistiorms. |
= WMAN grofikes define 2 consis way of managing a heterogencous virtualized
‘ereromme |
> StumtinGinmton effort has boon intimed by Open Grid Forum (OGF) through organizing
ssn oicanl new working group to deter 2 standard API for cloud lasS, the Open Cloud
‘Computing Inexface Working Group (OCCIWG)
NSRTWAL MACHINES PROVISIONING
= Tygpicel it cycle of VM and its major possible states of operation, which make the
‘mumnagomecat and automation of VMs in virtual and cloud eavironments easier
Poses: S
+ Stops ap Provision WM. Hore, we descrie the common and norm steps of provisioning
axils
+ Firstly, you end tp sect 2 server from 2 pool of available servers (physical servers with
snough capucty) albag with the appropriste OS template you need to provision the
summusl machine.
= Secondly, yo mend to lad the anprepriste software (operating system you selected in the
precious stp, devine drivers, middleware, and the necdod applicstions for the service |
cegured)
© Scanned with OKEN ScannerRey See
———_
+ Thirdly, you need to customize and configure the machine (eg, IP address, Gateway) 9
‘age resources,
the virtual server is ready to start with its newly loaded software
configure an associated network and stor
+ Finally,
sdoallcated to onher VMs
* in the context of virtual machines, isthe process of moving @ virtual machine from one
host server or storage location to another ,
. \ere are different techniques of VM migration,
how/life migration,
-cold/regular migration, and
© Scanned with OKEN Scannerit will be eligible, for this machine, to either be moved to another underutilized host or
more resources for it
‘There should be an integration between virtualization’s management tools (with its
migrations and performance’s monitoring capabilities), and SLA’s management tools to
achieve balance in resources by migrating and monitoring the workloads, and
accordingly, meeting the SLA
Migration of Virtual Machines to Alternate Platforms
+ Advantages of having facility in data center's technologies is
+ to have the ability to migrate virtual machines from one platform to another
+ For example, the VMware converter that handles migrations between ESX host
+ the VMware server; and the VMware workstation.
+ The VMware converter can also import fiom other virtualization platforms, such as
Microsoft virtual server machines
Deployment Seenario:
+ ConVirt deployment consists of at least one ConVint workstation, .
\whereConVirt is installed and ran, which provides the main console for managing the
‘YM life eyele, managing images, provisioning new VMs, monitoring machine |
and so on.
There are two essential deployment scenarios one
A, basic configuration in which the Xen or
machine, where ConVirt is already aed B,
© Scanned with OKEN Scanneradi
cms the instalation is doe and you are ready to manage your vial infarct, then
you-can start the Cont management console:
of servers" pools existing (QA Lab in our scenario) and on its context mem,
‘Select any
select “Add Server.”
‘You wil be faced with a message asking about the virtualization platform you wart to
manage (Xen or KVM), as shown in Figure
| choose KVM, and then enter the managed server information and credentials (IP,
sername, and password) as shown in Figure
‘nce the server is synchronized and authenticated with the management console, it will
appear in the left pane/of the ConVirt,
+ Live Migration Effeet on a Running Web Server.
«Clark et al. did evaluate the above migration on an Apache 1.3
static content at a high rate, as illustrated in Figure 5.6.
+The throughput is achieved when continuously serving a:
hnundred concurrent clients.
+ This simple example demonstrates that
controlled impact on live services and
© Scanned with OKEN Scanner+ ‘This sanice feature of the Citrix XenServer product, inherited from the Xen live migrate
| tity, which provides the IT administrator with the facility to move a running YM fiom
‘one XenServer to another inthe same poo! without interrupting the service
‘Regular/Cold Migration.
‘Cold migration is the migration of a powered-off virtual machine,
| + Main differences between live migration and cold migeation are that
| + 1) live migration needs a shared storage for virtual machines in the server's pool, but
‘cold migration does not;
+ 2) live migration for a virtual machine between two hosts, there would be certain CPU
‘compatibility checks to be applied; while in cold migration this checks do not apply
*+ ‘The cold migration process (VMware ) can be summarized as follows:
+ The configuration files, including the NVRAM file (BIOS settings), log files, as
well as the disks of the virtual machine, are moved from the source host to the
destination hosts associated storage area.
+ ‘The virtual machine is registered with the new host
+ After the migration is completed, the old version of the virtual ee
fiom the source host.
Live Storage Migration of Virtual Machine,
* This kind of migration constitutes moving the
‘running virtual machine to a new data store
the virtual machine's service
© Scanned with OKEN Scanner+ By using its Management Studio anda set ofWeb interfaces, itis possible to setup either
public or private clouds, monitor their stats, update their configuration, and perform the
basic management operations.
© Scanned with OKEN Scanner