Arch Design: Edits on hybrid

General edits, especially:
Add links, fix capitalization, improve markup.

Change-Id: Ifda431c0f7e986d96e72bf5be996235039e3df71
This commit is contained in:
Andreas Jaeger 2014-08-01 20:32:53 +02:00
parent 665cbe55bf
commit 831bdec5fd
5 changed files with 100 additions and 56 deletions

View File

@ -16,8 +16,8 @@
the need to create workarounds and processes to fill the need to create workarounds and processes to fill
identified gaps. Note the evaluation of the monitoring and identified gaps. Note the evaluation of the monitoring and
orchestration APIs available on each cloud platform and the orchestration APIs available on each cloud platform and the
relative levels of support for them in the chosen Cloud relative levels of support for them in the chosen cloud
Management Platform.</para> management platform.</para>
<mediaobject> <mediaobject>
<imageobject> <imageobject>
<imagedata contentwidth="4in" <imagedata contentwidth="4in"
@ -38,20 +38,24 @@
is a public cloud that is outside of the control of the is a public cloud that is outside of the control of the
designers.</para> designers.</para>
<para>There are conversion tools such as virt-v2v <para>There are conversion tools such as virt-v2v
(http://libguestfs.org/virt-v2v/) and virt-edit
(http://libguestfs.org/virt-edit.1.html) that can be used in (<link
those scenarios but they are often not suitable beyond very xlink:href="http://libguestfs.org/virt-v2v">http://libguestfs.org/virt-v2</link>)
basic cloud instance specifications. An alternative is to and virt-edit (<link
build a thin operating system image as the base for new xlink:href="http://libguestfs.org/virt-edit.1.html">http://libguestfs.org/virt-edit.1.html</link>)
instances. This facilitates rapid creation of cloud instances that can be used in those scenarios but they are often not
using cloud orchestration or configuration management tools, suitable beyond very basic cloud instance specifications. An
driven by the CMP, for more specific templating. Another more alternative is to build a thin operating system image as the
expensive option is to use a commercial image migration tool. base for new instances. This facilitates rapid creation of
The issue of image portability is not just for a one time cloud instances using cloud orchestration or configuration
migration. If the intention is to use the multiple cloud for management tools, driven by the CMP, for more specific
disaster recovery, application diversity or high availability, templating. Another more expensive option is to use a
the images and instances are likely to be moved between the commercial image migration tool. The issue of image
different cloud platforms regularly.</para></section> portability is not just for a one time migration. If the
intention is to use the multiple cloud for disaster recovery,
application diversity or high availability, the images and
instances are likely to be moved between the different cloud
platforms regularly.</para></section>
<section xml:id="upper-layer-services"> <section xml:id="upper-layer-services">
<title>Upper-layer services</title> <title>Upper-layer services</title>
<para>Many clouds offer complementary services over and above the <para>Many clouds offer complementary services over and above the
@ -116,7 +120,7 @@
multiple cloud architectures. It could be an important factor multiple cloud architectures. It could be an important factor
to assess when choosing a CMP and cloud provider. to assess when choosing a CMP and cloud provider.
Considerations are: functionality, security, scalability and Considerations are: functionality, security, scalability and
High availability (HA). Verification and ongoing testing of high availability (HA). Verification and ongoing testing of
the critical features of the cloud endpoint used by the the critical features of the cloud endpoint used by the
architecture are important tasks.</para> architecture are important tasks.</para>
<itemizedlist> <itemizedlist>
@ -142,8 +146,8 @@
<listitem> <listitem>
<para>High availability (HA) implementations vary in <para>High availability (HA) implementations vary in
functionality and design. Examples of some common functionality and design. Examples of some common
methods are Active-Hot-Standby, Active-Passive and methods are active-hot-standby, active-passive and
Active-Active. High availability and a test framework active-active. High availability and a test framework
need to be developed to insure that the functionality need to be developed to insure that the functionality
and limitations are well understood.</para> and limitations are well understood.</para>
</listitem> </listitem>

View File

@ -70,8 +70,8 @@
in one of the cloud solutions in use to support the new in one of the cloud solutions in use to support the new
functionality.</para></section> functionality.</para></section>
<section xml:id="network-operation-center-noc"> <section xml:id="network-operation-center-noc">
<title>Network Operation Center (NOC)</title> <title>Network Operation Center</title>
<para>When planning the Network Operation Center for a hybrid <para>When planning the Network Operation Center (NOC) for a hybrid
cloud environment, it is important to recognize where control cloud environment, it is important to recognize where control
over each piece of infrastructure resides. If a significant over each piece of infrastructure resides. If a significant
portion of the cloud is on externally managed systems, be portion of the cloud is on externally managed systems, be

View File

@ -18,7 +18,7 @@
non-OpenStack clouds</para> non-OpenStack clouds</para>
</listitem> </listitem>
<listitem> <listitem>
<para>High Availability across clouds (for technical <para>High availability across clouds (for technical
diversity)</para> diversity)</para>
</listitem> </listitem>
</itemizedlist> </itemizedlist>
@ -84,7 +84,7 @@
/> />
</imageobject> </imageobject>
</mediaobject> </mediaobject>
<para>In this scenario CompanyA has an additional requirement in <para>In this scenario company A has an additional requirement in
that the developers were already using AWS for some of their that the developers were already using AWS for some of their
work and did not want to change the cloud provider. Primarily work and did not want to change the cloud provider. Primarily
due to excessive overhead with network firewall rules that due to excessive overhead with network firewall rules that
@ -152,10 +152,12 @@
synchronous backup for the highest level of data protection, synchronous backup for the highest level of data protection,
but asynchronous backup could have been set as an alternative but asynchronous backup could have been set as an alternative
that is not as latency sensitive. For asynchronous backup, the that is not as latency sensitive. For asynchronous backup, the
Cinder API makes it possible to export the data and also the Block Storage API makes it possible to export the data and also the
metadata of a particular volume, so that it can be moved and metadata of a particular volume, so that it can be moved and
replicated elsewhere. More information can be found here: replicated elsewhere. More information can be found here:
https://blueprints.launchpad.net/cinder/+spec/cinder-backup-volume-metadata-support.</para> <link
xlink:href="https://blueprints.launchpad.net/cinder/+spec/cinder-backup-volume-metadata-support">https://blueprints.launchpad.net/cinder/+spec/cinder-backup-volume-metadata-support</link>.
</para>
<para>The synchronous backups create an identical volume in both <para>The synchronous backups create an identical volume in both
clouds and chooses the appropriate flavor so that each cloud clouds and chooses the appropriate flavor so that each cloud
has an identical back end. This was done by creating volumes has an identical back end. This was done by creating volumes

View File

@ -1,4 +1,8 @@
<?xml version="1.0" encoding="UTF-8"?> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE section [
<!ENTITY % openstack SYSTEM "../../common/entities/openstack.ent">
%openstack;
]>
<section xmlns="http://docbook.org/ns/docbook" <section xmlns="http://docbook.org/ns/docbook"
xmlns:xi="http://www.w3.org/2001/XInclude" xmlns:xi="http://www.w3.org/2001/XInclude"
xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xlink="http://www.w3.org/1999/xlink"
@ -91,8 +95,8 @@
rates.</para> rates.</para>
<para>Oversubscription is a method to emulate more capacity than <para>Oversubscription is a method to emulate more capacity than
they may physically be present. For example, a physical they may physically be present. For example, a physical
hypervisor node with 32 gigabytes of RAM may host 24 hypervisor node with 32&nbsp;GB RAM may host 24
instances, each provisioned with 2 gigabytes of RAM. As long instances, each provisioned with 2&nbsp;GB RAM. As long
as all 24 of them are not concurrently utilizing 2 full as all 24 of them are not concurrently utilizing 2 full
gigabytes, this arrangement is a non-issue. However, some gigabytes, this arrangement is a non-issue. However, some
hosts take oversubscription to extremes and, as a result, hosts take oversubscription to extremes and, as a result,
@ -161,7 +165,7 @@
parameters, user names, and passwords. In deployments behind an parameters, user names, and passwords. In deployments behind an
organization's firewall, this domain is considered trusted. In organization's firewall, this domain is considered trusted. In
a public cloud model which could be part of an architecture, a public cloud model which could be part of an architecture,
this would have to be assessed with the Public Cloud provider this would have to be assessed with the public cloud provider
to understand the controls in place.</para> to understand the controls in place.</para>
<para>The data security domain is concerned primarily with <para>The data security domain is concerned primarily with
information pertaining to the storage services within information pertaining to the storage services within
@ -216,8 +220,12 @@
cloud may not do the same in another. Be sure to know the cloud may not do the same in another. Be sure to know the
security requirements of every cloud that handles the security requirements of every cloud that handles the
organization's data or workloads.</para> organization's data or workloads.</para>
<para>More information on OpenStack Security can be found at <para>More information on OpenStack Security can be found in the
http://docs.openstack.org/security-guide/</para></section> <link
xlink:href="http://docs.openstack.org/security-guide"><citetitle>OpenStack
Security Guide</citetitle></link>.
</para>
</section>
<section xml:id="utilization-hybrid"> <section xml:id="utilization-hybrid">
<title>Utilization</title> <title>Utilization</title>
<para>When it comes to utilization, it is important that the CMP <para>When it comes to utilization, it is important that the CMP
@ -279,7 +287,7 @@
considered:</para> considered:</para>
<itemizedlist> <itemizedlist>
<listitem> <listitem>
<para>OpenStack Compute (Nova): Regardless of deployment <para>OpenStack Compute (nova): Regardless of deployment
location, hypervisor choice has a direct effect on how location, hypervisor choice has a direct effect on how
difficult it is to integrate with one or more difficult it is to integrate with one or more
additional clouds. For example, integrating a Hyper-V additional clouds. For example, integrating a Hyper-V
@ -287,18 +295,18 @@
compatibility issues than if KVM is used.</para> compatibility issues than if KVM is used.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>Networking: Whether OpenStack Networking (Neutron) <para>Networking: Whether OpenStack Networking (neutron)
or Nova-network is used, the network is one place or nova-network is used, the network is one place
where integration capabilities need to be understood where integration capabilities need to be understood
in order to connect between clouds.</para> in order to connect between clouds.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>Telemetry module (Ceilometer): Use of Telemetery <para>Telemetry module (ceilometer): Use of Telemetery
depends, in large part, on what the other parts of the depends, in large part, on what the other parts of the
cloud are using.</para> cloud are using.</para>
</listitem> </listitem>
<listitem> <listitem>
<para>Orchestration module (Heat): Similarly, Orchestration can <para>Orchestration module (heat): Similarly, Orchestration can
be a valuable tool in orchestrating tasks a CMP be a valuable tool in orchestrating tasks a CMP
decides are necessary in an OpenStack-based decides are necessary in an OpenStack-based
cloud.</para> cloud.</para>

View File

@ -14,9 +14,11 @@
risks.</para> risks.</para>
<para>Business considerations to make when designing a hybrid <para>Business considerations to make when designing a hybrid
cloud deployment include:</para> cloud deployment include:</para>
<itemizedlist> <variablelist>
<varlistentry>
<term>Cost</term>
<listitem> <listitem>
<para>Cost: A hybrid cloud architecture involves multiple <para>A hybrid cloud architecture involves multiple
vendors and technical architectures. These vendors and technical architectures. These
architectures may be more expensive to deploy and architectures may be more expensive to deploy and
maintain. Operational costs can be higher because of maintain. Operational costs can be higher because of
@ -26,8 +28,11 @@
virtue of using a cloud brokerage tool to deploy the virtue of using a cloud brokerage tool to deploy the
workloads to the most cost effective platform.</para> workloads to the most cost effective platform.</para>
</listitem> </listitem>
</varlistentry>
<varlistentry>
<term>Revenue opportunity</term>
<listitem> <listitem>
<para>Revenue opportunity: Revenue opportunities vary <para>Revenue opportunities vary
greatly based on the intent and use case of the cloud. greatly based on the intent and use case of the cloud.
If it is being built as a commercial customer-facing If it is being built as a commercial customer-facing
product, consider the drivers for building it over product, consider the drivers for building it over
@ -36,8 +41,11 @@
customers, thus enhancing the revenue customers, thus enhancing the revenue
opportunity.</para> opportunity.</para>
</listitem> </listitem>
</varlistentry>
<varlistentry>
<term>Time to market</term>
<listitem> <listitem>
<para>Time to Market: One of the most common reasons to <para>One of the most common reasons to
use cloud platforms is to speed the time to market of use cloud platforms is to speed the time to market of
a new product or application. A business requirement a new product or application. A business requirement
to use multiple cloud platforms may be because there to use multiple cloud platforms may be because there
@ -46,23 +54,30 @@
migrating components and refactoring to a single migrating components and refactoring to a single
platform.</para> platform.</para>
</listitem> </listitem>
</varlistentry>
<varlistentry>
<term>Business or technical diversity</term>
<listitem> <listitem>
<para>Business or technical diversity: Organizations <para>Organizations
already leveraging cloud-based services may wish to already leveraging cloud-based services may wish to
embrace business diversity and utilize a hybrid cloud embrace business diversity and utilize a hybrid cloud
design to spread their workloads across multiple cloud design to spread their workloads across multiple cloud
providers so that no application is hosted in a single providers so that no application is hosted in a single
cloud provider.</para> cloud provider.</para>
</listitem> </listitem>
</varlistentry>
<varlistentry>
<term>Application momentum</term>
<listitem> <listitem>
<para>Application momentum: A business with existing <para>A business with existing
applications that are already in production on applications that are already in production on
multiple cloud environments may find that it is more multiple cloud environments may find that it is more
cost effective to integrate the applications on cost effective to integrate the applications on
multiple cloud platforms rather than migrate them to a multiple cloud platforms rather than migrate them to a
single platform.</para> single platform.</para>
</listitem> </listitem>
</itemizedlist> </varlistentry>
</variablelist>
<section xml:id="legal-requirements-hybrid"> <section xml:id="legal-requirements-hybrid">
<title>Legal requirements</title> <title>Legal requirements</title>
<para>Many jurisdictions have legislative and regulatory <para>Many jurisdictions have legislative and regulatory
@ -91,12 +106,14 @@
</listitem> </listitem>
</itemizedlist> </itemizedlist>
<para>Examples of such legal frameworks include the data <para>Examples of such legal frameworks include the data
protection framework of the European Union protection framework of the European Union (<link
(http://ec.europa.eu/justice/data-protection/) and the xlink:href="http://ec.europa.eu/justice/data-protection/">http://ec.europa.eu/justice/data-protection/</link>)
requirements of the Financial Industry Regulatory Authority and the requirements of the Financial Industry Regulatory
(http://www.finra.org/Industry/Regulation/FINRARules/) in the Authority (<link
United States. Consult a local regulatory body for more xlink:href="http://ec.europa.eu/justice/data-protection/">http://www.finra.org/Industry/Regulation/FINRARules/</link>)
information.</para></section> in the United States. Consult a local regulatory body for more
information.</para>
</section>
<section xml:id="workload-considerations"> <section xml:id="workload-considerations">
<title>Workload considerations</title> <title>Workload considerations</title>
<para>Defining what the word "workload" means in the context of a <para>Defining what the word "workload" means in the context of a
@ -246,8 +263,8 @@
<listitem> <listitem>
<para>High availability implementations vary in <para>High availability implementations vary in
functionality and design. Examples of some common functionality and design. Examples of some common
methods are Active-Hot-Standby, Active-Passive and methods are active-hot-standby, active-passive and
Active-Active. High availability and a test framework active-active. High availability and a test framework
needs to be developed to insure that the functionality needs to be developed to insure that the functionality
and limitations are well understood.</para> and limitations are well understood.</para>
</listitem> </listitem>
@ -269,9 +286,11 @@
could remain operational.</para> could remain operational.</para>
<para>Risks that will be heightened by using a hybrid cloud <para>Risks that will be heightened by using a hybrid cloud
architecture include:</para> architecture include:</para>
<itemizedlist> <variablelist>
<varlistentry>
<term>Provider availability or implementation details</term>
<listitem> <listitem>
<para>Provider availability or implementation details: <para>
This can range from the company going out of business This can range from the company going out of business
to the company changing how it delivers its services. to the company changing how it delivers its services.
Cloud architectures are inherently designed to be Cloud architectures are inherently designed to be
@ -279,8 +298,11 @@
both perceived to be rock solid and ever flexible at both perceived to be rock solid and ever flexible at
the same time.</para> the same time.</para>
</listitem> </listitem>
</varlistentry>
<varlistentry>
<term>Differing SLAs</term>
<listitem> <listitem>
<para>Differing SLAs: Users of hybrid cloud environments <para>Users of hybrid cloud environments
potentially encounter some losses through differences potentially encounter some losses through differences
in service level agreements. A hybrid cloud design in service level agreements. A hybrid cloud design
needs to accommodate the different SLAs provided by needs to accommodate the different SLAs provided by
@ -288,8 +310,11 @@
address the actual enforceability of the providers' address the actual enforceability of the providers'
SLAs.</para> SLAs.</para>
</listitem> </listitem>
</varlistentry>
<varlistentry>
<term>Security levels</term>
<listitem> <listitem>
<para>Security levels: Securing multiple cloud <para>Securing multiple cloud
environments is more complex than securing a single environments is more complex than securing a single
cloud environment. Concerns need to be addressed at, cloud environment. Concerns need to be addressed at,
but not limited to, the application, network, and but not limited to, the application, network, and
@ -300,8 +325,11 @@
uses a relatively simple model that relies on user uses a relatively simple model that relies on user
privilege combined with firewalls.</para> privilege combined with firewalls.</para>
</listitem> </listitem>
</varlistentry>
<varlistentry>
<term>Provider API changes</term>
<listitem> <listitem>
<para>Provider API changes: APIs are crucial in a hybrid <para>APIs are crucial in a hybrid
cloud environment. As a consumer of a provider's cloud cloud environment. As a consumer of a provider's cloud
services, an organization will rarely have any control services, an organization will rarely have any control
over provider changes to APIs. Cloud services that over provider changes to APIs. Cloud services that
@ -315,5 +343,7 @@
common and basic APIs to minimize potential common and basic APIs to minimize potential
conflicts.</para> conflicts.</para>
</listitem> </listitem>
</itemizedlist></section> </varlistentry>
</variablelist>
</section>
</section> </section>