Akimbi Slingshot Virtual Cluster Management Trevor Grove DRC-SCS – CSCF University of Waterloo.

Slides:



Advertisements
Similar presentations
Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Advertisements

VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
1 Week #1 Objectives Review clients, servers, and Windows network models Differentiate among the editions of Server 2008 Discuss the new Windows Server.
Deliver your Technology-Based Labs with VMware Lab Manager 5/6/2010 Michael Fudge.
1 Week #1 Objectives Review clients, servers, and Windows network models Differentiate among the editions of Server 2008 Discuss the new Windows Server.
Senior Design Lab Policies Presented by: Trey Murdoch CSC IT Staff.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
TechNet and Community Tour - Dynamic IT Dynamic Desktop Deployment Level Advanced.
Introduction to XTMv WatchGuard Training.
Networking in VMware Workstation 8
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Virtualization Infrastructure Administration Introduction Jakub Yaghob.
Installing software on personal computer
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
VMware vCenter Server Module 4.
ProjectWise Virtualization Kevin Boland. What is Virtualization? Virtualization is a technique for deploying technologies. Virtualization creates a level.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
SERVER INTEGRATION. OVERVIEW In our project we are integrating Widows server to facilitate interaction between diverse operating systems and applications.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
SUNY IT Master's Project Using Open Source Virtualization Technology In Computer Education By: Ronny L. Bull Advised By: Geethapriya Thamilarasu, Ph.D.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Virtual IP Network Windows Server 2012 Windows 08 Dual Subnets.
IT:Network:Applications Fall  Running one “machine” inside another “machine”  OS in Virtual machines sees ◦ CPU(s) ◦ Memory ◦ Disk ◦ USB ◦ etc.
Additional SugarCRM details for complete, functional, and portable deployment.
System Center 2012 Setup The components of system center App Controller Data Protection Manager Operations Manager Orchestrator Service.
Virtualization Infrastructure Administration Hyper-V 2012 R2 Jakub Yaghob.
1 ISA Server 2004 Installation & Configuration Overview By Nicholas Quinn.
Fundamentals of Networking Discovery 1, Chapter 2 Operating Systems.

Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 4: Add Client Computers and Devices to the Network.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
IT:NETWORK:MICROSOFT SERVER 2 DHCP AND WINDOWS DEPLOYMENT SERVICES.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
MDC417 Follow me on Working as Practice Manager for Insight, he is a subject matter expert in cloud, virtualization and management.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Scott Drucker, Systems Engineer Migrating to Microsoft Vista with WinINSTALL.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 MSE Virtual Appliance Presenter Name: Patrick Nicholson.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Microsoft Virtual Academy Module 8 Managing the Infrastructure with VMM.
Remote Controller & Presenter Make education more efficiently
Cloud Computing Tony Floyd ITEC 452 Part 1 Part 2.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
3-1 VMware vSphere 4: Install, Configure, Manage – Rev B Copyright © 2009 VMware, Inc. All rights reserved. Virtual Machines Physical Switches 1000 Mbps.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Hands-On Virtual Computing
Introduction to CloudStack Networking Geoff Higginbottom CTO ShapeBlue
Senior Design Lab Policies Presented by: Trey Murdoch CSC IT Staff.
Ken Casada Technical Evangelist Microsoft Switzerland What’s new in Microsoft Azure.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
Microsoft Virtual Academy Module 12 Managing Services with VMM and App Controller.
SYSTEM CENTER VIRTUAL MACHINE MANAGER 2012 Gorazd Šemrov Microsoft Consulting Services
Virtual PC 2007 Virtualization for Fermi Desktops KTF
vSphere 6 Foundations Exam Training
VMware ESX and ESXi Module 3.
Bentley Systems, Incorporated
Desktop Virtualization
Xen Summit Spring 2007 Platform Virtualization with XenEnterprise
Printers.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
How To Configure Hotspot in Virtual Mikrotik on VMware
Presentation transcript:

Akimbi Slingshot Virtual Cluster Management Trevor Grove DRC-SCS – CSCF University of Waterloo

Overview What is Akimbi Slingshot? How do we access it? What can we do with it? Questions?

Akimbi Slingshot – what is it? Management software for sets of virtual machines Built on Microsoft Virtual Server and/or VMWare GSX products –We have the version that bundles MS Virtual Server 2005 R2 –VM: AMI BIOS with Intel 440BX chipset Usual configurations, uni-processor, SVGA video (S3 Trio64 chipset) ; Slingshot supports single NIC only

VM Management Slingshot manages –IP address assignment, static & “fenced” –VM template definition –Console management for running VMs –Virtual CD library of ISO images Fenced networks –Creates virtual router for a collection of VMs –Provides inbound and outbound NAT (automatic assignment of “interior” & “exterior” addresses)

Slingshot product components Two pieces: –Management console (the “slingshot server”) –Managed servers (worker systems where VMs run) Our setup: –Lightning ( , ): Slingshot server –Snowball1.. Snowball10 ( ): worker systems –VM storage (disks & VM state) on (new)squall (1.14)

Slingshot usage Windows, IE-browser-based –Management console is an IE application with ActiveX controls –RPC between Slingshot server & managed servers Multi-user –Every user has a collection of VM definitions (“templates”) –Shared libraries of VM templates, VM instances (“configurations”)

Network configuration Our system is behind the coldfront firewall on /16 Communication with Slingshot server can be from anywhere –Ligntning.cs.uwaterloo.ca ( ) –Requires IE with appropriate permissions Communication with managed servers must be from clients on /16 –Problem with exterior-client slingshot managed- server Lightning has a public address, snowballs do not

VPN for network access There is a VPN server (PPTP only) running on lightning.cs.uwaterloo.ca ( ) to provide access to the /16 network –Must set default route through the VPN Windows, MAC OSX have clients built-in –MAC of questionable utility – IE must support ActiveX

Other access RDP server on Lightning –Via its public address at –Only two ports available VNC server –To be established –Freeware versions appear to support only a single session

Other network details are reserved for VMs are reserved for VPN clients DNS server at ; default domain tcl.cs.uwaterloo.ca

Slingshot product abstraction Slingshot server communicates with managed servers to instantiate VM templates Templates are created on a bare machine and then enhanced to support automatic IP management –AkimbiTools –Publishing a template Published templates are used to create configurations –Configuration are collections of VM templates that can be instantiated (turned on)

Basic steps 1.Create a new template –Install an OS from an ISO image 2.Install AkimbiTools –OS-dependent, procedure for Linux requires manual intervention 3.Publish the template –Make available for use in configurations

Basic steps, 2 4.Define a configuration –One or more VM instances based on available published templates 5.Deploy the configuration –Choose fenced versus non-fenced network management –“power on” the VMs

Fenced versus non-fenced Non-fenced: –Each VM in a deployed configuration receives a static IP address from the available pool –Cloning such a configuration is not possible Fenced: –Each VM is assigned two addresses: internal and external –Cloning is possible: internal address doesn’t change, external does

Demo Deploy a bare machine (no OS) Insert an ISO & start OS install Deploy bare machine (OS) Create a single-machine configuration –Deploy fenced & unfenced, clone

Next steps For you: –Figure out how to connect to the Slingshot server with IE & ActiveX –Use demo/trials –Request a userid from me For me: –Figure out more about library management, cloning and configuration capture –Install VNC server

Questions?