Integrated Managed Services
                          “Next Generation” of full-service ICT solution outsourcing

                                                      Design Summit / Conference
                                                            Santa Clara, California
© Mach Technology Group Pty Ltd
ABN 58 115 162 564                                      Paul Pettigrew, CEO - 27th April 2011
ask@mach.com.au                                                  Offices & Data Centres: Brisbane | Noosa | Cooroy | USA
Firstly….Thank you
• Wish to acknowledge the contributions of the
  community and the sponsoring organisations

  Believe OpenStack is on the
  cusp of being to Cloud what
    Linux was/is to the OS
• Hope that this presentation adds value to this
  conference – and helps this community through
  understanding of how this fabulous and innovative
  software is being taken to market by Australia’s
  leading next-generation technology solutions
  company                                             2
Scope of Presentation
• Current Context
  –   About Mach Technology
  –   Who is Paul Pettigrew? Why am I here?
  –   Underlying Facilities Platform
  –   How we define Cloud
  –   Cloud Security Lessons
• Integrated Technology + Services Solution
  –   Our “NG” Project’s Business Requirements
  –   Integrated Solution Architecture
  –   Rollout Strategy
  –   Our “todo wish list” for OpenStack
• Conclusion & Questions
                                                 3
Current Context


                  4
About Mach Technology
• Founded in 2005 on rising wave of Open Source,
  Linux and High Performance / Federated Grid
  Computing – to deliver outsourced solutions,
  smarter, better & at lower cost than proprietary
• Lines of business and deep expertise in:
  – Consulting & Project Management
  – Mach owned & operated Data Centres, Hosting and
    Cloud (inc IaaS/PaaS/SaaS)
  – Service Desk
  – Technical Services
  – Onsite Field Services
  – 24/7 automated deep monitoring and self-healing
  – Turnkey outsourced ICT Managed Services           5
Who & Why am I here?
• Loved technology and computing, since
  wrote first program on a 1” thick pile of
  IBM cards in the early 80’s
• F/A-18 Instructor & Fighter Pilot,
  also on front line of modern
  computing introduction into
  Royal Australian Air Force



• Presenting is Mach’s way to make a contribution to the
  community and share our hard-learned knowledge
• To learn from the experts, and take knowledge back to
  Australia and pass onto others in our industry & clients
• Validate and improve our strategy                          6
Underlying Facilities        #1 Services: Shared
                          nothing, federated HA, 4N
Platform & Data Centres    Since 2005 go-live, not a
                          single second of down time




                                                      7
How we define “Cloud”
•   Elastic: resources are re-allocated, increased or decreased on demand
    (typically instantly)
•   Multi-tenant: compute, storage and network resources are shared to deliver
    multiple platform services per each hardware component and dynamically
    (re)allocated as required
•   Thin Provisioning: compute, storage and network assets provided via
    virtualised, location independent, technology agnostic platforms (no vendor
    lock-in) – i.e. using real hardware resources only when required
•   Over Subscription: compute, storage and network assets are over-allocated
    but pro-actively capacity managed to have physical provisioning occur in time
    for actual demand

                                          plus
•   Automation: Extreme levels of automation: provisioning, monitoring, self-
    healing, patching/updating & maintaining
•   Open: Portable sub-systems / no proprietary lock-in
•   Billing: Sophisticated presentation of data to enable “to the second” invoicing
                                                                                      8
Cloud Service Layers
                                                        “X-as-a-Service”
                                                                                                                         Applications
Acknowledge: based on depiction produced by Cloud.com




                                                                    Application A                 Application B           Application C             Application D         Application E


                                                                                                                             Platforms

                                                                          Directory                Database                   Message                    Web                   Other


                                                                                                        User Interface
                                                                                                                                                                    Developer API
                                                                                  Administrator                   End User                Console

                                                                                                  Availability and Security                                      Image Libraries
                                                        Integration API




                                                                                      Backup        Firewall             HA            Monitoring
                                                                                                                                                                Application Catalogue                   SaaS
                                                                                               Dynamic Workload Management
                                                                                                                                                                 Custom Templates                PaaS
                                                                                                   Resource Management
                                                                                  Servers                      Storage                    Network              Operating Systems ISOs     IaaS

                                                                                          Service Management (Billing, Metering, Accounts, Monitoring, etc)


                                                                                                                    Virtualisation Layer


                                                                             Servers                                         Network                                    Storage
                                                                                                                                                                                                           9
Sample Customer
Deployment Pattern




                     10
Cloud Security Lessons
•    Current bandwagon/marketing hype is not helping
•    Mach has government and large commercial clients acutely aware of the issues
      – Mach has solved to date, without incident – but not in fashion that meets our future
        automation and multi-tenant objectives
•    We must leverage “education” in market
      – E.g. “VLAN” accepted, but no understanding of what “OpenFlow” is and if it is
        “secure”
      – Public Key cryptography “PKI” also known and trusted
•    Storage must be addressed through unified security and identity management
      – Easy option for encryption of files, using PKI
•    We must be able to answer the question “is my data safe, secure and private”
     in a single word = Yes!
•    Goal: build upon the acceptance of the VLAN ID “tag” concept, and apply it
     across all IaaS aspects to create unified “security zones”
      – Networking: VLAN (and also OpenFlow)
      – Storage: encrypted files
      – Server: SSH / PKI based access already proven and trusted

    Can “Cloud Security” be as simple as PKI+VLAN per “security zone”?
                                                                                               11
Integrated
Technology +
  Services
  Solution
               12
Elevator Pitches
• “Bill to the second, on demand”
• “Australia’s first Next Generation, IPv6 XaaS Cloud
  Hosting Solutions”
• “Consulting, Services, XaaS, Onsite – Unified
  Platform”
• “Price per VM = others’ price per website”
• “Single bill, single sign-on”
• “Metal + Virtualisation”
• “Quad Data Centres, redundant highly available
  deployment”

                                                        13
Business Requirements
• Vision: next-generation of full ICT service outsourcing
• Principles:
   –   100% free libre Open Source; commodity hardware
   –   Mach value-adds through SI and staff service excellence
   –   Flexible, to accommodate waves of innovation over next 5 years
   –   Extreme levels of automation and self-healing
   –   No real technical skill required to enact subscriptions
   –   Moderate technical skill required to provision and maintain platform
   –   Scale out “just-in-time” per sales/revenue
   –   Multi-DC, federated architecture
   –   IPv6




                                                                              14
Our first line-up
Management Layer                                                                         OpenQRM, Zabbix,
    Provisioning
                   Monitoring
                                                  Website &
                                                                 Customer     Service
                                                                                            OTRS::ITSM,
                                                                                         389Directory Server
                                                                                                               *
    & Resource                     Billing          Online
                   & Alerting                                     Access    Management    OpenERP, Drupal,
      Tracking                                    Purchasing
                                                                                              Magento


Applications Layer
        SaaS           Plesk           DNS
                                                      Bespoke/
                                                       Other                ... + N        Plesk, Alfresco,
                                                                                            OpenERP, etc
                                                                                                               *
Virtual Network Layer
       VM FW
      Appliance
                      HW FW
                     Appliance                                              ... + N
                                                                                         pfSense, m0n0wall,
                                                                                          IPCop, BGP, DNS      *
Compute Layer
                        KVM          otherVM
    HW Compute
       Node
                      Compute
                       Node
                                     Compute
                                      Node                                  ... + N
                                                                                           KVM, Xen, ESX,
                                                                                          OpenVZ, Physical
                                                                                                               *
Management/Storage Network Layer                                                          Non-routed 10GE
                                                                                          switching network
                                                                                                               *
Unified Storage Layer
    Storage Node    Storage Node   Storage Node
                                                                            ... + N
                                                                                           OpenSolaris/ZFS
                                                                                          iSCSI, NFS & CIFS
                                                                                                               *
*     Candidate
     Technologies                                                                                                  15
Integrated Architecture
• Issue with first line-up? Too much SI
• Have progressed with aspects knew would be right
  (Phase 1)
• Fundamental: Integration of Billing Engine,
  Identity Management, Ticketing and Provisioning
• Knew from experience that IaaS solution must be
  simplified and integrated across Storage +
  Compute + Network

• Held off over past year for technology to
  emerge…and then we discovered OpenStack…
                                                     16
OpenStack makes it simple




                            17
Use Cases
• Mach is not in the business of competing
  with massive scale, constrained product
  parameters Cloud hosting
• Our value is leveraging emerging
  technologies in a thrifty + high quality
  fashion, to deliver a total solution
• Must accommodate both “metal” &/or
  “virtual”
• Security Lessons must be addressed
• Able to abstract to 5x Use Cases…
                                             18
Scenario 1: Single VM
• Single VM connected to the internal network for storage access and the
  external network for WAN
• Should be able to talk L2 to management system, storage nodes and
  WAN gateway, but nothing else (VM1 and VM2 cannot see each other)
• Should be the default for all new VMs
L2 Zone



     Storage




                                                   External Network
                  Internal Network



                                     VM1                               WAN
    nodes and
                                                                      Gateway
   management




                                     VM2



                                                                                19
Scenario 2: Multiple VMs
•     Multiple VMs connected to the internal network for storage access and the
      external network for WAN, all in the same security zone
•     Like scenario 1, but the VMs in the same zone should be able to talk L2 to each
      other (VMs 1,2 and 3 can communicate, but cannot talk to VM4)
•     This is for customers with multiple VMs that need to communicate at L2 (they
      can already communicate at L3 via the WAN Gateway)
    L2 Zone
                                          VM1

        Storage




                                                             External Network
                       Internal Network


                                          VM2                                    WAN
       nodes and
                                                                                Gateway
      management
                                          VM3




                                          VM4



                                                                                          20
Scenario 3: VSD
• Single or multiple VMs connected to the internal network for storage
  access and the external network for WAN, with a VSD in the same
  security zone
• All access to the VMs from the WAN filtered (bridged or routed modes
  supported) by VSD, VMs cannot talk to WAN gateway directly

L2 Zone
                                     VM1

    Storage




                                                       External Network
                  Internal Network


                                     VM2         VSD                       WAN
   nodes and
                                                                          Gateway
  management
                                     VM3




                                           VM4



                                                                                    21
Scenario 4: Physical FW
• Single or multiple VMs connected to the internal network for storage
  access and the external network for WAN, with a physical FW (i.e.
  Cisco ASA device) in the same security zone
• All access to the VMs from the WAN filtered by FW device, VMs cannot
  talk L2 to WAN gateway directly

L2 Zone
                                     VM1

    Storage                                      Phys.




                                                         External Network
                  Internal Network


                                     VM2                                     WAN
   nodes and                                      FW                        Gateway
  management
                                     VM3




                                           VM4



                                                                                      22
Scenario 5: Dedicated Metal
• To support customer requests for non-virtualised, physical
  server OS deployment (i.e. Linux/Windows running on
  metal) – “dedicated metal machines” (DMM)
• We want them to be configured the same as all compute
  nodes such that they can easily be managed in the same
  way and converted DMM<->VM
   – Any solution that gets these servers onto the virtual switching
     fabric so we can control their L2 in the same way requires
     repatching when a DMM becomes a VM host or vice versa
• The solution is to gateway the DMM L2 through a box that
  is on the virtual switching fabric – see next slide




                                                                       23
Scenario 5: DMM Patching
• Dedicated metal machines repatched to gateway through a
  Linux GW that places them on virtual switching fabric
• The physical switch is configured with every port in it’s own
  port-based VLAN, with the Linux GW port in every VLAN
• Supporting the feature will guarantee we can meet
  specialist/dedicated requirements of our large customers


          DMM


          DMM
                     Physical     Linux       Virtual
                      Switch       GW         Switch
          DMM




                                                                  24
What was left?
• Identity
  – Issue is that every subsystem has its own
    identity/auth solution
  – Critical that a centralised, multi-tenant, multi-
    subsystems platform exist
• Billing
  – Basic subscription billing for a rudimentary
    Cloud hosting product stack easy
  – As an outsourcer, must support single invoice
     • Subscription + Fixed Price or T&M + Known & Ad
       Hoc
                                                        25
Identity Management
• Closely integrated with the Billing Engine is the idea of
  Identity Management
• Needs to map all of our Accounts, all of their Users and all
  of the access control for which users can access which
  Subscriptions
• Billing can use this information for generation of XaaS
  billing data
• Ticketing can use this information for linking Tickets to
  associated Subscription procured
   – E.g. Add a note “article” to a ticket for 15mins worked on “Hosted
     Exchange” for Account “ABC”
• Provisioning can use this information for access control to
  systems/applications

                                                                          26
Centralised Directory
(389 HA)
• Clustered 389 Directory Server for centralised
  authentication, account and billing metadata
  – Multi-master replication of directory writes
  – Many active nodes for directory reads (authentications
    etc)
  – Support multiple customers in directory hierarchy
  – Easily add new attributes for billing and account/profile
    metadata to be used in other applications
  – Support SSL authentications over the Internet
  – Provide password and account metadata
    synchronisation for Active Directory


                                                                27
Billing Architecture
                                                                                                               In-house
                                                                Bill Presentment       Ticket
    Website                   Shopping Cart                                                                   Management
                                                                    & Payment       Presentment
                                                                                                                 Tools
                                                                   Mach API




                                                                                                                    Integrate
                                                                        Integrate
                                                                                                                 Identity 
                                                                Billing Engine 
               Integrate




                                                                                                  Integrate
                                              Single 
                                             Invoice                                                           Management 
                                                                   (jBilling)
                                                                                                                  (389)
                           Happy Customers




                                                                      Mediation
                                                                       Process
                                                                    Billing Data

    VMs

  Storage                                                VZ                          Tickets
                SaaS
    SaaS
                PaaS
                                                        Plesk        PBAS           Timesheet   OTRS
              OpenStack                                 DNS                           Work
 Networking                                                                           Orders


                                                                   Identity Data

                                                                                                                                28
Rollout Plan
•   Phase   1   –   Alignment & Initial Steps
•   Phase   2   –   Trial Remaining Pieces
•   Phase   3   –   BETA Launch
•   Phase   4   –   “New Normal”




                                                29
Phase 1 – Alignment /
Initial Steps
• Phase 1 – Alignment / Initial Steps
  – Mediawiki for all doco, smart URL linking access from other systems
    (1,944 articles, 15,708 edits/updates)
  – Zabbix for 24/7 monitoring & (initial) self-healing via federated HA
    platform (578 hosts; 17573 data items; 6325 smart trigger
    calculations; 5592 automated tests performed per minute)
  – OTRS::ITSM for ITILv3 Service Management (2,700 tickets per
    month)
  – Bacula for backup & recovery independent of cloud platform
    (42,689 backups, 0.53TB delta per day across 546 volumes)
  – 389 Directory Server Cluster, deployed federated HA (~3000
    customers)
  – BETA: KVM based platforms for Linux/Windows/BSD/Solaris (15
    hosts, 55 VMs)

                           Completed & working perfectly :-)
                                                                           30
Phase 2 – Trial Remaining
Pieces
• Phase 2 – Trial Remaining Pieces
   – OpenStack
   – IPv6
   – Billing: Jbilling
   – Unified web
     portal platform (Drupal)
   – OpenFlow &
     Open vSwich

                         Photo:
R&D rig, 4x compute + 2x Storage     31
Phase 3 – BETA Launch
• Phase 3 – BETA Launch
  – Phase 1 + 2 aspects completed
  – Across 2x DC’s (only) to prove distributed/federated
    solution
  – Limited (spin-off brand) launch to prove in marketplace




                                                              32
Phase 4 – New Normal
• Phase 4 – New Normal (no longer
  “Next Generation”)
  – New sales onto new platform
  – Migrate old services


  – Complete 6-9mths
    • Risks addressed in Phases 2/3 before the
      company goes “all in”


                                                 33
OpenStack Wishlist
•   CAVEAT: very happy to be corrected if these points are already
    addressed
•   Unified security zone across compute + storage + network, for each
    cloud/domain
     – Spans multiple DC’s (low WAN comms)
     – Multiple clouds per account
     – Encryption of storage objects (files, VM disk images, etc)
•   Billing units and metering
     – Billing platform must not need to know detailed technical operation
     – Abstract to universal “billing unit”, price book applied in billing platform
     – Bill “on demand” to the second
•   Class of service – abstracted as a high level concept, then given technical
    meaning and billing alignment, e.g.:
     – Single
     – Cold/offline DR failover
     – Hot/live HA failover
•   Extreme automation, especially in management of platform and patching
    burden
     – An integrated and supported toolchain                                          34
Conclusion &
 Questions

               35

More Related Content

PDF
Ssc cloud computing vision afac dec17 12 final english
PPT
IBM - Massimo Leoni, Cloud Computing, Milano 2 luglio 2009
PDF
Sc World Congress Econference March 2011
PDF
Vision - The Agile Data Center
PDF
Venus-c: Using open source clouds in eScience
 
PPT
CCitDG Presenation
PDF
20120620 moving to windows azure
PDF
Building a Hybrid Platform as a Service
Ssc cloud computing vision afac dec17 12 final english
IBM - Massimo Leoni, Cloud Computing, Milano 2 luglio 2009
Sc World Congress Econference March 2011
Vision - The Agile Data Center
Venus-c: Using open source clouds in eScience
 
CCitDG Presenation
20120620 moving to windows azure
Building a Hybrid Platform as a Service

What's hot (20)

PPT
Virtualisation with service management as enabler for cloud computing - Kingd...
PDF
GlassFish Mobility Platform - Hans Hrasna
PDF
Data in your SOA: From SQL to NoSQL and Beyond
PDF
Lenovo: The Cloud Over BYOD
PDF
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
PDF
Towards a Federated Cloud Ecosystem
PDF
Cloud computing ppt_0
PPTX
NIC 2013 - Configure and Deploy Private Cloud
PDF
Achieve Cloud Scale by Implementing Elastic Load Balancing, Asset Deployment,...
PPT
Presentación Carlos Spera Cablevisión Day 2010
PDF
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
PDF
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution
PPTX
Le cloud microsoft - Présentation "fourre-tout" - Base
PDF
MPLS 2010: Network Enabled Cloud and Service Models
PDF
Cloud Computing at UTM Shillong
PPTX
Pre mts Sharepoint 2010 i SQL Server 2012
PDF
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
PDF
Open Group Conference Csi V5.1
PDF
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
PDF
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
Virtualisation with service management as enabler for cloud computing - Kingd...
GlassFish Mobility Platform - Hans Hrasna
Data in your SOA: From SQL to NoSQL and Beyond
Lenovo: The Cloud Over BYOD
Strategic Importance of Semantic Technologies as a Key Differentiator for IT ...
Towards a Federated Cloud Ecosystem
Cloud computing ppt_0
NIC 2013 - Configure and Deploy Private Cloud
Achieve Cloud Scale by Implementing Elastic Load Balancing, Asset Deployment,...
Presentación Carlos Spera Cablevisión Day 2010
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
[OSDC.tw 2011] The Path to Pass into PaaS -- How We Build the Solution
Le cloud microsoft - Présentation "fourre-tout" - Base
MPLS 2010: Network Enabled Cloud and Service Models
Cloud Computing at UTM Shillong
Pre mts Sharepoint 2010 i SQL Server 2012
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Open Group Conference Csi V5.1
Semantic Mediation Bus: An Ontology-based Runtime Infrastructure for Service ...
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
Ad

Similar to Mach Technology (20)

PDF
Mon1420 build clouds-oliviermaes-citrix
PDF
Paving the Way to IT-as-a-Service
PPTX
CloudStack Collaboration Conference 12; Refactoring cloud stack
PPTX
Citrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStack
PDF
Dell open stack powered cloud solution introduce & crowbar demo cosug-2012
PDF
Development Model for The Cloud
PDF
High Value Cloud Services
PPTX
Building a cloud with cisco ucs and citrix
PDF
자바(Java)를 위한 클라우드 환경 기반 Paas
PDF
JAVA를 활용한 클라우딩 환경 기반 PaaS
PDF
Building A Cloud Platform
PDF
Making of a Successful Cloud Business
PPT
Cloud Computing Webinar
PDF
Cloudcamp Barcelona 2009 Lightning Talk - 3scale
PPTX
The role of hyper-v in nist model
PDF
Choosing Your Windows Azure Platform Strategy
PDF
Cloud + Soa: Enterprise Service Platform
PDF
Chris Kemp: NASA Nebula
PPTX
BayThreat Why The Cloud Changes Everything
PDF
Building and Managing Cloud Applications and Infrastructure
Mon1420 build clouds-oliviermaes-citrix
Paving the Way to IT-as-a-Service
CloudStack Collaboration Conference 12; Refactoring cloud stack
Citrix CloudStack - Build Your Own Scalable Infrastructure Cloud with CloudStack
Dell open stack powered cloud solution introduce & crowbar demo cosug-2012
Development Model for The Cloud
High Value Cloud Services
Building a cloud with cisco ucs and citrix
자바(Java)를 위한 클라우드 환경 기반 Paas
JAVA를 활용한 클라우딩 환경 기반 PaaS
Building A Cloud Platform
Making of a Successful Cloud Business
Cloud Computing Webinar
Cloudcamp Barcelona 2009 Lightning Talk - 3scale
The role of hyper-v in nist model
Choosing Your Windows Azure Platform Strategy
Cloud + Soa: Enterprise Service Platform
Chris Kemp: NASA Nebula
BayThreat Why The Cloud Changes Everything
Building and Managing Cloud Applications and Infrastructure
Ad

More from Open Stack (20)

KEY
OpenStack Boston User Group, OpenStack overview
PDF
OpenStack Swift overview oscon2011
PDF
Dell Crowbar and OpenStack at OSCON
KEY
EMEA OpenStack Day, July 13th 2011 in London - Jim Curry intro
PPTX
OpenStack Technology Overview
PDF
JCO Conference OpenStack
PDF
OpenStack 101 Technical Overview
PDF
Nova HA
PPTX
Nebula james Williams
PPT
Open stack dashboard diablo
PDF
Snapshot clone-boot-presentation-final
PPTX
Opening Presentation
PDF
Gluster open stack dev summit 042011
PDF
Swift container sync
ODP
The site architecture you can edit
PDF
OpenStack on Intel
PDF
Operating the Hyperscale Cloud
PPTX
Openstack and eBay
PPTX
OpenStack Opportunity - Citrix
PPTX
PaaS on Openstack
OpenStack Boston User Group, OpenStack overview
OpenStack Swift overview oscon2011
Dell Crowbar and OpenStack at OSCON
EMEA OpenStack Day, July 13th 2011 in London - Jim Curry intro
OpenStack Technology Overview
JCO Conference OpenStack
OpenStack 101 Technical Overview
Nova HA
Nebula james Williams
Open stack dashboard diablo
Snapshot clone-boot-presentation-final
Opening Presentation
Gluster open stack dev summit 042011
Swift container sync
The site architecture you can edit
OpenStack on Intel
Operating the Hyperscale Cloud
Openstack and eBay
OpenStack Opportunity - Citrix
PaaS on Openstack

Recently uploaded (20)

PPTX
Modernising the Digital Integration Hub
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
What is a Computer? Input Devices /output devices
PDF
August Patch Tuesday
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Five Habits of High-Impact Board Members
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A review of recent deep learning applications in wood surface defect identifi...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
DOCX
search engine optimization ppt fir known well about this
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
Modernising the Digital Integration Hub
Chapter 5: Probability Theory and Statistics
A comparative study of natural language inference in Swahili using monolingua...
What is a Computer? Input Devices /output devices
August Patch Tuesday
Benefits of Physical activity for teenagers.pptx
Getting started with AI Agents and Multi-Agent Systems
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Enhancing emotion recognition model for a student engagement use case through...
Five Habits of High-Impact Board Members
CloudStack 4.21: First Look Webinar slides
observCloud-Native Containerability and monitoring.pptx
1 - Historical Antecedents, Social Consideration.pdf
Hindi spoken digit analysis for native and non-native speakers
A review of recent deep learning applications in wood surface defect identifi...
Module 1.ppt Iot fundamentals and Architecture
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
search engine optimization ppt fir known well about this
sustainability-14-14877-v2.pddhzftheheeeee
Taming the Chaos: How to Turn Unstructured Data into Decisions

Mach Technology

  • 1. Integrated Managed Services “Next Generation” of full-service ICT solution outsourcing Design Summit / Conference Santa Clara, California © Mach Technology Group Pty Ltd ABN 58 115 162 564 Paul Pettigrew, CEO - 27th April 2011 [email protected] Offices & Data Centres: Brisbane | Noosa | Cooroy | USA
  • 2. Firstly….Thank you • Wish to acknowledge the contributions of the community and the sponsoring organisations Believe OpenStack is on the cusp of being to Cloud what Linux was/is to the OS • Hope that this presentation adds value to this conference – and helps this community through understanding of how this fabulous and innovative software is being taken to market by Australia’s leading next-generation technology solutions company 2
  • 3. Scope of Presentation • Current Context – About Mach Technology – Who is Paul Pettigrew? Why am I here? – Underlying Facilities Platform – How we define Cloud – Cloud Security Lessons • Integrated Technology + Services Solution – Our “NG” Project’s Business Requirements – Integrated Solution Architecture – Rollout Strategy – Our “todo wish list” for OpenStack • Conclusion & Questions 3
  • 5. About Mach Technology • Founded in 2005 on rising wave of Open Source, Linux and High Performance / Federated Grid Computing – to deliver outsourced solutions, smarter, better & at lower cost than proprietary • Lines of business and deep expertise in: – Consulting & Project Management – Mach owned & operated Data Centres, Hosting and Cloud (inc IaaS/PaaS/SaaS) – Service Desk – Technical Services – Onsite Field Services – 24/7 automated deep monitoring and self-healing – Turnkey outsourced ICT Managed Services 5
  • 6. Who & Why am I here? • Loved technology and computing, since wrote first program on a 1” thick pile of IBM cards in the early 80’s • F/A-18 Instructor & Fighter Pilot, also on front line of modern computing introduction into Royal Australian Air Force • Presenting is Mach’s way to make a contribution to the community and share our hard-learned knowledge • To learn from the experts, and take knowledge back to Australia and pass onto others in our industry & clients • Validate and improve our strategy 6
  • 7. Underlying Facilities #1 Services: Shared nothing, federated HA, 4N Platform & Data Centres Since 2005 go-live, not a single second of down time 7
  • 8. How we define “Cloud” • Elastic: resources are re-allocated, increased or decreased on demand (typically instantly) • Multi-tenant: compute, storage and network resources are shared to deliver multiple platform services per each hardware component and dynamically (re)allocated as required • Thin Provisioning: compute, storage and network assets provided via virtualised, location independent, technology agnostic platforms (no vendor lock-in) – i.e. using real hardware resources only when required • Over Subscription: compute, storage and network assets are over-allocated but pro-actively capacity managed to have physical provisioning occur in time for actual demand plus • Automation: Extreme levels of automation: provisioning, monitoring, self- healing, patching/updating & maintaining • Open: Portable sub-systems / no proprietary lock-in • Billing: Sophisticated presentation of data to enable “to the second” invoicing 8
  • 9. Cloud Service Layers “X-as-a-Service” Applications Acknowledge: based on depiction produced by Cloud.com Application A Application B Application C Application D Application E Platforms Directory Database Message Web Other User Interface Developer API Administrator End User Console Availability and Security Image Libraries Integration API Backup Firewall HA Monitoring Application Catalogue SaaS Dynamic Workload Management Custom Templates PaaS Resource Management Servers Storage Network Operating Systems ISOs IaaS Service Management (Billing, Metering, Accounts, Monitoring, etc) Virtualisation Layer Servers Network Storage 9
  • 11. Cloud Security Lessons • Current bandwagon/marketing hype is not helping • Mach has government and large commercial clients acutely aware of the issues – Mach has solved to date, without incident – but not in fashion that meets our future automation and multi-tenant objectives • We must leverage “education” in market – E.g. “VLAN” accepted, but no understanding of what “OpenFlow” is and if it is “secure” – Public Key cryptography “PKI” also known and trusted • Storage must be addressed through unified security and identity management – Easy option for encryption of files, using PKI • We must be able to answer the question “is my data safe, secure and private” in a single word = Yes! • Goal: build upon the acceptance of the VLAN ID “tag” concept, and apply it across all IaaS aspects to create unified “security zones” – Networking: VLAN (and also OpenFlow) – Storage: encrypted files – Server: SSH / PKI based access already proven and trusted Can “Cloud Security” be as simple as PKI+VLAN per “security zone”? 11
  • 12. Integrated Technology + Services Solution 12
  • 13. Elevator Pitches • “Bill to the second, on demand” • “Australia’s first Next Generation, IPv6 XaaS Cloud Hosting Solutions” • “Consulting, Services, XaaS, Onsite – Unified Platform” • “Price per VM = others’ price per website” • “Single bill, single sign-on” • “Metal + Virtualisation” • “Quad Data Centres, redundant highly available deployment” 13
  • 14. Business Requirements • Vision: next-generation of full ICT service outsourcing • Principles: – 100% free libre Open Source; commodity hardware – Mach value-adds through SI and staff service excellence – Flexible, to accommodate waves of innovation over next 5 years – Extreme levels of automation and self-healing – No real technical skill required to enact subscriptions – Moderate technical skill required to provision and maintain platform – Scale out “just-in-time” per sales/revenue – Multi-DC, federated architecture – IPv6 14
  • 15. Our first line-up Management Layer OpenQRM, Zabbix, Provisioning Monitoring Website & Customer Service OTRS::ITSM, 389Directory Server * & Resource Billing Online & Alerting Access Management OpenERP, Drupal, Tracking Purchasing Magento Applications Layer SaaS Plesk DNS Bespoke/ Other ... + N Plesk, Alfresco, OpenERP, etc * Virtual Network Layer VM FW Appliance HW FW Appliance ... + N pfSense, m0n0wall, IPCop, BGP, DNS * Compute Layer KVM otherVM HW Compute Node Compute Node Compute Node ... + N KVM, Xen, ESX, OpenVZ, Physical * Management/Storage Network Layer Non-routed 10GE switching network * Unified Storage Layer Storage Node Storage Node Storage Node ... + N OpenSolaris/ZFS iSCSI, NFS & CIFS * * Candidate Technologies 15
  • 16. Integrated Architecture • Issue with first line-up? Too much SI • Have progressed with aspects knew would be right (Phase 1) • Fundamental: Integration of Billing Engine, Identity Management, Ticketing and Provisioning • Knew from experience that IaaS solution must be simplified and integrated across Storage + Compute + Network • Held off over past year for technology to emerge…and then we discovered OpenStack… 16
  • 17. OpenStack makes it simple 17
  • 18. Use Cases • Mach is not in the business of competing with massive scale, constrained product parameters Cloud hosting • Our value is leveraging emerging technologies in a thrifty + high quality fashion, to deliver a total solution • Must accommodate both “metal” &/or “virtual” • Security Lessons must be addressed • Able to abstract to 5x Use Cases… 18
  • 19. Scenario 1: Single VM • Single VM connected to the internal network for storage access and the external network for WAN • Should be able to talk L2 to management system, storage nodes and WAN gateway, but nothing else (VM1 and VM2 cannot see each other) • Should be the default for all new VMs L2 Zone Storage External Network Internal Network VM1 WAN nodes and Gateway management VM2 19
  • 20. Scenario 2: Multiple VMs • Multiple VMs connected to the internal network for storage access and the external network for WAN, all in the same security zone • Like scenario 1, but the VMs in the same zone should be able to talk L2 to each other (VMs 1,2 and 3 can communicate, but cannot talk to VM4) • This is for customers with multiple VMs that need to communicate at L2 (they can already communicate at L3 via the WAN Gateway) L2 Zone VM1 Storage External Network Internal Network VM2 WAN nodes and Gateway management VM3 VM4 20
  • 21. Scenario 3: VSD • Single or multiple VMs connected to the internal network for storage access and the external network for WAN, with a VSD in the same security zone • All access to the VMs from the WAN filtered (bridged or routed modes supported) by VSD, VMs cannot talk to WAN gateway directly L2 Zone VM1 Storage External Network Internal Network VM2 VSD WAN nodes and Gateway management VM3 VM4 21
  • 22. Scenario 4: Physical FW • Single or multiple VMs connected to the internal network for storage access and the external network for WAN, with a physical FW (i.e. Cisco ASA device) in the same security zone • All access to the VMs from the WAN filtered by FW device, VMs cannot talk L2 to WAN gateway directly L2 Zone VM1 Storage Phys. External Network Internal Network VM2 WAN nodes and FW Gateway management VM3 VM4 22
  • 23. Scenario 5: Dedicated Metal • To support customer requests for non-virtualised, physical server OS deployment (i.e. Linux/Windows running on metal) – “dedicated metal machines” (DMM) • We want them to be configured the same as all compute nodes such that they can easily be managed in the same way and converted DMM<->VM – Any solution that gets these servers onto the virtual switching fabric so we can control their L2 in the same way requires repatching when a DMM becomes a VM host or vice versa • The solution is to gateway the DMM L2 through a box that is on the virtual switching fabric – see next slide 23
  • 24. Scenario 5: DMM Patching • Dedicated metal machines repatched to gateway through a Linux GW that places them on virtual switching fabric • The physical switch is configured with every port in it’s own port-based VLAN, with the Linux GW port in every VLAN • Supporting the feature will guarantee we can meet specialist/dedicated requirements of our large customers DMM DMM Physical Linux Virtual Switch GW Switch DMM 24
  • 25. What was left? • Identity – Issue is that every subsystem has its own identity/auth solution – Critical that a centralised, multi-tenant, multi- subsystems platform exist • Billing – Basic subscription billing for a rudimentary Cloud hosting product stack easy – As an outsourcer, must support single invoice • Subscription + Fixed Price or T&M + Known & Ad Hoc 25
  • 26. Identity Management • Closely integrated with the Billing Engine is the idea of Identity Management • Needs to map all of our Accounts, all of their Users and all of the access control for which users can access which Subscriptions • Billing can use this information for generation of XaaS billing data • Ticketing can use this information for linking Tickets to associated Subscription procured – E.g. Add a note “article” to a ticket for 15mins worked on “Hosted Exchange” for Account “ABC” • Provisioning can use this information for access control to systems/applications 26
  • 27. Centralised Directory (389 HA) • Clustered 389 Directory Server for centralised authentication, account and billing metadata – Multi-master replication of directory writes – Many active nodes for directory reads (authentications etc) – Support multiple customers in directory hierarchy – Easily add new attributes for billing and account/profile metadata to be used in other applications – Support SSL authentications over the Internet – Provide password and account metadata synchronisation for Active Directory 27
  • 28. Billing Architecture In-house Bill Presentment Ticket Website Shopping Cart Management & Payment Presentment Tools Mach API Integrate Integrate Identity  Billing Engine  Integrate Integrate Single  Invoice Management  (jBilling) (389) Happy Customers Mediation Process Billing Data VMs Storage VZ Tickets SaaS SaaS PaaS Plesk PBAS Timesheet OTRS OpenStack DNS Work Networking Orders Identity Data 28
  • 29. Rollout Plan • Phase 1 – Alignment & Initial Steps • Phase 2 – Trial Remaining Pieces • Phase 3 – BETA Launch • Phase 4 – “New Normal” 29
  • 30. Phase 1 – Alignment / Initial Steps • Phase 1 – Alignment / Initial Steps – Mediawiki for all doco, smart URL linking access from other systems (1,944 articles, 15,708 edits/updates) – Zabbix for 24/7 monitoring & (initial) self-healing via federated HA platform (578 hosts; 17573 data items; 6325 smart trigger calculations; 5592 automated tests performed per minute) – OTRS::ITSM for ITILv3 Service Management (2,700 tickets per month) – Bacula for backup & recovery independent of cloud platform (42,689 backups, 0.53TB delta per day across 546 volumes) – 389 Directory Server Cluster, deployed federated HA (~3000 customers) – BETA: KVM based platforms for Linux/Windows/BSD/Solaris (15 hosts, 55 VMs) Completed & working perfectly :-) 30
  • 31. Phase 2 – Trial Remaining Pieces • Phase 2 – Trial Remaining Pieces – OpenStack – IPv6 – Billing: Jbilling – Unified web portal platform (Drupal) – OpenFlow & Open vSwich Photo: R&D rig, 4x compute + 2x Storage 31
  • 32. Phase 3 – BETA Launch • Phase 3 – BETA Launch – Phase 1 + 2 aspects completed – Across 2x DC’s (only) to prove distributed/federated solution – Limited (spin-off brand) launch to prove in marketplace 32
  • 33. Phase 4 – New Normal • Phase 4 – New Normal (no longer “Next Generation”) – New sales onto new platform – Migrate old services – Complete 6-9mths • Risks addressed in Phases 2/3 before the company goes “all in” 33
  • 34. OpenStack Wishlist • CAVEAT: very happy to be corrected if these points are already addressed • Unified security zone across compute + storage + network, for each cloud/domain – Spans multiple DC’s (low WAN comms) – Multiple clouds per account – Encryption of storage objects (files, VM disk images, etc) • Billing units and metering – Billing platform must not need to know detailed technical operation – Abstract to universal “billing unit”, price book applied in billing platform – Bill “on demand” to the second • Class of service – abstracted as a high level concept, then given technical meaning and billing alignment, e.g.: – Single – Cold/offline DR failover – Hot/live HA failover • Extreme automation, especially in management of platform and patching burden – An integrated and supported toolchain 34