openstack-manuals/doc/arch-design/hybrid/section_tech_considerations_hybrid.xml
Shilla Saebi 352f3df8be made change to section_tech_considerations_hybrid
changed telemetery to telemetry

Change-Id: I040455a21d189994e253752333c718617b936955
2014-12-22 15:42:31 -05:00

340 lines
19 KiB
XML

<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE section [
<!ENTITY % openstack SYSTEM "../../common/entities/openstack.ent">
%openstack;
]>
<section xmlns="http://docbook.org/ns/docbook"
xmlns:xi="http://www.w3.org/2001/XInclude"
xmlns:xlink="http://www.w3.org/1999/xlink"
version="5.0"
xml:id="technical-considerations-hybrid">
<?dbhtml stop-chunking?>
<title>Technical considerations</title>
<para>A hybrid cloud environment requires inspection and
understanding of technical issues that are not only outside of
an organization's data center, but potentially outside of an
organization's control. In many cases, it is necessary to
ensure that the architecture and CMP chosen can adapt to, not
only to different environments, but also to the possibility of
change. In this situation, applications are crossing diverse
platforms and are likely to be located in diverse locations.
All of these factors will influence and add complexity to the
design of a hybrid cloud architecture.</para>
<para>The only situation where cloud platform incompatibilities
are not going to be an issue is when working with clouds that
are based on the same version and the same distribution of
OpenStack. Otherwise incompatibilities are virtually
inevitable.</para>
<para>Incompatibility should be less of an issue for clouds that
exclusively use the same version of OpenStack, even if they
use different distributions. The newer the distribution in
question, the less likely it is that there will be
incompatibilities between version. This is due to the fact
that the OpenStack community has established an initiative to
define core functions that need to remain backward compatible
between supported versions. The DefCore initiative defines
basic functions that every distribution must support in order
to bear the name "OpenStack".</para>
<para>Some vendors, however, add proprietary customizations to
their distributions. If an application or architecture makes
use of these features, it will be difficult to migrate to or
use other types of environments. Anyone considering
incorporating older versions of OpenStack prior to Havana
should consider carefully before attempting to incorporate
functionality between versions. Internal differences in older
versions may be so great that the best approach might be to
consider the versions to be essentially diverse platforms, as
different as OpenStack and Amazon Web Services or Microsoft
Azure.</para>
<para>The situation is more predictable if using different cloud
platforms is incorporated from inception. If the other clouds
are not based on OpenStack, then all pretense of compatibility
vanishes, and CMP tools must account for the myriad of
differences in the way operations are handled and services are
implemented. Some situations in which these incompatibilities
can arise include differences between the way in which a
cloud:</para>
<itemizedlist>
<listitem>
<para>Deploys instances</para>
</listitem>
<listitem>
<para>Manages networks</para>
</listitem>
<listitem>
<para>Treats applications</para>
</listitem>
<listitem>
<para>Implements services</para>
</listitem>
</itemizedlist>
<section xml:id="capacity-planning-hybrid">
<title>Capacity planning</title>
<para>One of the primary reasons many organizations turn to a
hybrid cloud system is to increase capacity without having to
make large capital investments. However, capacity planning is
still necessary when designing an OpenStack installation even
if it is augmented with external clouds.</para>
<para>Specifically, overall capacity and placement of workloads
need to be accounted for when designing for a mostly
internally-operated cloud with the occasional capacity burs.
The long-term capacity plan for such a design needs to
incorporate growth over time to prevent the need to
permanently burst into, and occupy, a potentially more
expensive external cloud. In order to avoid this scenario,
account for the future applications and capacity requirements
and plan growth appropriately.</para>
<para>One of the drawbacks of capacity planning is
unpredictability. It is difficult to predict the amount of
load a particular application might incur if the number of
users fluctuates or the application experiences an unexpected
increase in popularity. It is possible to define application
requirements in terms of vCPU, RAM, bandwidth or other
resources and plan appropriately, but other clouds may not use
the same metric or even the same oversubscription
rates.</para>
<para>Oversubscription is a method to emulate more capacity than
they may physically be present. For example, a physical
hypervisor node with 32&nbsp;GB RAM may host 24
instances, each provisioned with 2&nbsp;GB RAM. As long
as all 24 of them are not concurrently utilizing 2 full
gigabytes, this arrangement is a non-issue. However, some
hosts take oversubscription to extremes and, as a result,
performance can frequently be inconsistent. If at all
possible, determine what the oversubscription rates of each
host are and plan capacity accordingly.</para></section>
<section xml:id="security-hybrid">
<title>Security</title>
<para>The nature of a hybrid cloud environment removes complete
control over the infrastructure. Security becomes a stronger
requirement because data or applications may exist in a cloud
that is outside of an organization's control. Security domains
become an important distinction when planning for a hybrid
cloud environment and its capabilities. A security domain
comprises users, applications, servers or networks that share
common trust requirements and expectations within a
system.</para>
<para>The security domains are:</para>
<orderedlist>
<listitem>
<para>Public</para>
</listitem>
<listitem>
<para>Guest</para>
</listitem>
<listitem>
<para>Management</para>
</listitem>
<listitem>
<para>Data</para>
</listitem>
</orderedlist>
<para>These security domains can be mapped individually to the
organization's installation or combined. For example, some
deployment topologies combine both guest and data domains onto
one physical network, whereas other topologies may physically
separate these networks. In each case, the cloud operator
should be aware of the appropriate security concerns. Security
domains should be mapped out against the specific OpenStack
deployment topology. The domains and their trust requirements
depend upon whether the cloud instance is public, private, or
hybrid.</para>
<para>The public security domain is an entirely untrusted area of
the cloud infrastructure. It can refer to the Internet as a
whole or simply to networks over which an organization has no
authority. This domain should always be considered untrusted.
When considering hybrid cloud deployments, any traffic
traversing beyond and between the multiple clouds should
always be considered to reside in this security domain and is
therefore untrusted.</para>
<para>Typically used for instance-to-instance traffic within a
single data center, the guest security domain handles compute
data generated by instances on the cloud but not services that
support the operation of the cloud such as API calls. Public
cloud providers that are used in a hybrid cloud configuration
which an organization does not control and private cloud
providers who do not have stringent controls on instance use
or who allow unrestricted Internet access to instances should
consider this domain to be untrusted. Private cloud providers
may consider this network as internal and therefore trusted
only if there are controls in place to assert that instances
and tenants are trusted.</para>
<para>The management security domain is where services interact.
Sometimes referred to as the "control plane", the networks in
this domain transport confidential data such as configuration
parameters, user names, and passwords. In deployments behind an
organization's firewall, this domain is considered trusted. In
a public cloud model which could be part of an architecture,
this would have to be assessed with the public cloud provider
to understand the controls in place.</para>
<para>The data security domain is concerned primarily with
information pertaining to the storage services within
OpenStack. Much of the data that crosses this network has high
integrity and confidentiality requirements and depending on
the type of deployment there may also be strong availability
requirements. The trust level of this network is heavily
dependent on deployment decisions and as such this is not
assigned a default level of trust.</para>
<para>Consideration must be taken when managing the users of the
system, whether operating or utilizing public or private
clouds. The identity service allows for LDAP to be part of the
authentication process. Including such systems in your
OpenStack deployments may ease user management if integrating
into existing systems. Be mindful when utilizing 3rd party
clouds to explore authentication options applicable to the
installation to help manage and keep user authentication
consistent.</para>
<para>Due to the process of passing user names, passwords, and
generated tokens between client machines and API endpoints,
placing API services behind hardware that performs SSL
termination is strongly recommended.</para>
<para>Within cloud components themselves, another component that
needs security scrutiny is the hypervisor. In a public cloud,
organizations typically do not have control over the choice of
hypervisor. (Amazon uses its own particular version of Xen,
for example.) In some cases, hypervisors may be vulnerable to
a type of attack called "hypervisor breakout" if they are not
properly secured. Hypervisor breakout describes the event of a
compromised or malicious instance breaking out of the resource
controls of the hypervisor and gaining access to the bare
metal operating system and hardware resources.</para>
<para>If the security of instances is not considered important,
there may not be an issue. In most cases, however, enterprises
need to avoid this kind of vulnerability, and the only way to
do that is to avoid a situation in which the instances are
running on a public cloud. That does not mean that there is a
need to own all of the infrastructure on which an OpenStack
installation operates; it suggests avoiding situations in
which hardware may be shared with others.</para>
<para>There are other services worth considering that provide a
bare metal instance instead of a cloud. In other cases, it is
possible to replicate a second private cloud by integrating
with a private Cloud-as-a-Service deployment, in which an
organization does not buy hardware, but also does not share it
with other tenants. It is also possible use a provider that
hosts a bare-metal "public" cloud instance for which the
hardware is dedicated only to one customer, or a provider that
offers private Cloud-as-a-Service.</para>
<para>Finally, it is important to realize that each cloud
implements services differently. What keeps data secure in one
cloud may not do the same in another. Be sure to know the
security requirements of every cloud that handles the
organization's data or workloads.</para>
<para>More information on OpenStack Security can be found in the
<link
xlink:href="http://docs.openstack.org/security-guide"><citetitle>OpenStack
Security Guide</citetitle></link>.
</para>
</section>
<section xml:id="utilization-hybrid">
<title>Utilization</title>
<para>When it comes to utilization, it is important that the CMP
understands what workloads are running, where they are
running, and their preferred utilizations. For example, in
most cases it is desirable to run as many workloads internally
as possible, utilizing other resources only when necessary. On
the other hand, situations exist in which the opposite is
true. The internal cloud may only be for development and
stressing it is undesirable. In most cases, a cost model of
various scenarios helps with this decision, however this
analysis is heavily influenced by internal priorities. The
important thing is the ability to efficiently make those
decisions on a programmatic basis.</para>
<para>The Telemetry module (ceilometer) is designed to
provide information on the usage of various OpenStack
components. There are two limitations to consider: first, if
there is to be a large amount of data (for example, if
monitoring a large cloud, or a very active one) it is
desirable to use a NoSQL back end for Ceilometer, such as
MongoDB. Second, when connecting to a non-OpenStack cloud,
there will need to be a way to monitor that usage and to
provide that monitoring data back to the CMP.</para></section>
<section xml:id="performance-hybrid">
<title>Performance</title>
<para>Performance is of primary importance in the design of a
cloud. When it comes to a hybrid cloud deployment, many of the
same issues for multi-site deployments apply, such as network
latency between sites. It is also important to think about the
speed at which a workload can be spun up in another cloud, and
what can be done to reduce the time necessary to accomplish
that task. That may mean moving data closer to applications,
or conversely, applications closer to the data they process.
It may mean grouping functionality so that connections that
require low latency take place over a single cloud rather than
spanning clouds. That may also mean ensuring that the CMP has
the intelligence to know which cloud can most efficiently run
which types of workloads.</para>
<para>As with utilization, native OpenStack tools are available to
assist. Ceilometer can measure performance and, if necessary,
the Orchestration module can be used to
react to changes in demand by spinning up more resources. It
is important to note, however, that Orchestration requires
special configurations in the client to enable functioning
with solution offerings from Amazon Web Services. When dealing
with other types of clouds, it is necessary to rely on the
features of the CMP.</para></section>
<section xml:id="components">
<title>Components</title>
<para>The number and types of native OpenStack components that are
available for use is dependent on whether the deployment is
exclusively an OpenStack cloud or not. If so, all of the
OpenStack components will be available for use, and in many
ways the issues that need to be considered will be similar to
those that need to be considered for a multi-site
deployment.</para>
<para>That said, in any situation in which more than one cloud is
being used, at least four OpenStack tools will be
considered:</para>
<itemizedlist>
<listitem>
<para>OpenStack Compute (nova): Regardless of deployment
location, hypervisor choice has a direct effect on how
difficult it is to integrate with one or more
additional clouds. For example, integrating a Hyper-V
based OpenStack cloud with Azure will have less
compatibility issues than if KVM is used.</para>
</listitem>
<listitem>
<para>Networking: Whether OpenStack Networking (neutron)
or legacy networking (nova-network) is used, the network is one place
where integration capabilities need to be understood
in order to connect between clouds.</para>
</listitem>
<listitem>
<para>Telemetry module (ceilometer): Use of Telemetry
depends, in large part, on what the other parts of the
cloud are using.</para>
</listitem>
<listitem>
<para>Orchestration module (heat): Similarly, Orchestration can
be a valuable tool in orchestrating tasks a CMP
decides are necessary in an OpenStack-based
cloud.</para>
</listitem>
</itemizedlist></section>
<section xml:id="special-considerations-hybrid">
<title>Special considerations</title>
<para>Hybrid cloud deployments also involve two more issues that
are not common in other situations:</para>
<para>Image portability: Note that, as of the Icehouse release,
there is no single common image format that is usable by all
clouds. This means that images will need to be converted or
recreated when porting between clouds. To make things simpler,
launch the smallest and simplest images feasible, installing
only what is necessary preferably using a deployment manager
such as Chef or Puppet. That means not to use golden images
for speeding up the process, however if the same images are
being repeatedly deployed it may make more sense to utilize
this technique instead of provisioning applications on lighter
images each time.</para>
<para>API differences: The most profound issue that cannot be
avoided when using a hybrid cloud deployment with more than
just OpenStack (or with different versions of OpenStack) is
that the APIs needed to perform certain functions are
different. The CMP needs to know how to handle all necessary
versions. To get around this issue, some implementers build
portals to achieve a hybrid cloud environment, but a heavily
developer-focused organization will get more use out of a
hybrid cloud broker SDK such as jClouds.</para></section>
</section>