Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lessons learned from deploying Windows Server 2016

Similar presentations


Presentation on theme: "Lessons learned from deploying Windows Server 2016"— Presentation transcript:

1 Lessons learned from deploying Windows Server 2016
6/18/2018 2:29 PM THR3055 Lessons learned from deploying Windows Server 2016 Thomas Maurer Cloud Architect & Technology Lead Microsoft MVP @ThomasMaurer © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

2 Beginning of 2017

3 Agenda Overview Storage Networking Compute Security 6/18/2018 2:29 PM
© Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

4 6/18/2018 2:29 PM Nano Server © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

5 Nano Server I am sorry ;-)

6

7 Container-optimized Nano Server
The Windows Server team has closely partnered with he .NET Team to bring the .NET Core 2.0 work to Windows Containers with an optimized container image based on Nano Server. For Windows Server RS3

8 6/18/2018 2:29 PM Storage © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

9 Software Defined Storage v3
Storage Spaces Direct Use standard servers with local storage to build highly available and scalable software-defined storage Storage Replica Create affordable business continuity and disaster recovery among datacenters Storage QoS Prevent noisy neighbors from impacting high priority workloads with a Storage QoS policy

10 Scenarios Hyper-converged Converged (Disaggregated)
- Compute and Storage resources together - Compute and Storage scale and are managed together - Typically small to medium sized scale-out deployments - Compute and Storage resources separate - Compute and Storage scale and are managed independently - Typically larger scale-out deployments HYPER-V CLUSTER HYPER-V CLUSTER(S) SMB3 / RDMA STORAGE NETWORK FABRIC SCALE-OUT FILE SERVER CLUSTER

11 Scale out to Max 2 node minimum Up to 16 servers Up to 416 disks
2+ cache drives 4+ capacity drives Up to 16 servers Up to 416 disks

12 Typical S2D Configurations
NVMe SSD HDD Cache mirror parity Balanced (mixed workloads) Performance Tier Capacity Tier NVMe SSD Cache mirror parity Medium (High perf. workloads) Performance Tier Capacity Tier NVMe SSD Cache mirror Ultra (Ultra High perf. workloads) Performance Tier

13 Storage Spaces Direct Demo

14

15 Extended Storage Spaces Direct Clusters
16x HPE DL380 G9 2x Intel Xeon 16 Core 768 GB RAM 2x 1.6 TB NVMe 16x 1.6 TB SSD 2x Mellanox ConnectX-4 100GbE 400 TB Usable Flash Only Storage

16 Storage Spaces Direct: Requirements
2 up to 16 Storage Nodes 10 Gbps or higher / RDMA (RoCE / iWARP) Min. 2 Caching Devices (NVMe or SSD) per Node Min. 4 Capacity Devices (SSD or HDD) per Node Storage Controller in HBA Mode (no RAID) Certified HW

17 Storage Spaces Direct: Key Points
Think about the scale you need RDMA (RoCE / iWARP) Caching Devices (NVMe or SSD) per Node Capacity Devices (SSD or HDD) per Node Think about getting Certified Hardware and the Windows Server Software-Defined (WSSD) Program

18 Windows Server Software-Defined (WSSD) Program

19

20 RAID Inc. Ability™ HCI Series S2D200 SuperMicro SYS-2028U-TRT+
Cisco UCS C240 M4 DataON S2D-3110 DELL PowerEdge R730XD Fujitsu Primergy RX2540 M2 HPE ProLiant DL380 Gen9 Inspur NF5280M4 Intel MCB2224TAF3 Lenovo X3650 M5 NEC Express5800 R120f-2M Quanta D51B-2U (MSW6000) RAID Inc. Ability™ HCI Series S2D200 SuperMicro SYS-2028U-TRT+

21 Storage Replica Protection of key data and workloads
Synchronous replication Storage agnostic mirroring of data in physical sites with crash- consistent volumes ensuring zero data loss at the volume level. Increase resilience Unlocks new scenarios for metro-distance cluster-to-cluster disaster recovery and stretch failover clusters for automated high availability. Complete solution End-to-end for storage and clustering, including Hyper-V, Storage Replica, Storage Spaces, cluster, Scale-Out File Server, SMB3, deduplication, Resilient File System (ReFS), NTFS, and Windows PowerShell. Streamlined management Graphical management for individual nodes and clusters through Failover Cluster Manager and Azure Site Recovery. Stretch cluster and cluster-to-cluster Site 1 Site 2

22 Storage Replica – Key Take Aways
Best kept secrets in Windows Server 2016 Works for Hyper-V Hosts Works for Hyper-V Clusters Works inside Virtual Machines Works for Physical Hosts Works in Azure

23 Storage Replica: Requirements
Any volume (SAS, SAN, iSCSI, Local) <5 ms round trip between sites for synchronous replication RDMA (recommended) Identical size for source / target volume SSDs for log disks recommended (min. 8GB size) Identical physical disk geometry (phys. sector size) Turn on SR write ordering for distributed app data

24 6/18/2018 2:29 PM Network © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

25 Software-Defined Networking is a game changer
Think about RDMA

26 6/18/2018 2:29 PM Compute © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

27 Challenges in protecting high-value assets
6/18/2018 Challenges in protecting high-value assets Any seized or infected host administrators can access guest virtual machines Fabric Hypervisor Customer Storage Host OS Guest VM Legitimate host? Impossible to identify legitimate hosts without a hardware based verification Tenants VMs are exposed to storage and network attacks while unencrypted © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

28 6/18/2018 Confidently protect sensitive customer data: Designed for ‘zero-trust’ environments Any seized or infected host administrators can access guest virtual machines Hardware-rooted technologies to separate the guest operating system from host administrators Virtual Secure Mode Process and Memory access protection from the host Host OS Customer Customer Virtual machine OS Data Workload Compute Storage Network Hypervisor Fabric Guest VM Guest VM Guarded fabric to identify legitimate hosts and certify them to run shielded tenant Generation 2 VMs Impossible to identify legitimate hosts without a hardware based verification Host Guardian Service Enabler to run Shielded Virtual Machines on a legitimate host in the fabric Trust the host Storage Virtualized trusted platform module (vTPM) support to encrypt virtual machines Tenants VMs are exposed to storage and network attacks while unencrypted Shielded VM Bitlocker enabled VM Hypervisor Hypervisor Fabric Fabric Host Guardian Service © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

29 Improvements Operational Backup and Checkpoints …
Hot Add / Remove Network Adapters Online Memory Resize PowerShell Direct Cluster Rolling Upgrades Backup and Checkpoints

30

31 Containers: A new approach
6/18/2018 2:29 PM Containers: A new approach Physical Applications traditionally built and deployed onto physical systems with 1:1 relationship New applications often required new physical systems for isolation of resources Physical/virtual Package and run apps within containers Virtual Higher consolidation ratios and better utilization Faster app deployment than in a traditional, physical environment Apps deployed into VMs with high compatibility success Apps benefited from key VM features i.e., live migration, HA Key benefits Further accelerate of app deployment Reduce effort to deploy apps Streamline development and testing Lower costs associated with app deployment Increase server consolidation © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

32 6/18/2018 2:29 PM One More thing © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

33 6/18/2018 2:29 PM Licensing © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

34

35 Core Based Licensing New Core Based Model
Costs increase with more physical Cores

36 Please evaluate this session
Tech Ready 15 6/18/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite Phone: download and use the Microsoft Ignite mobile app Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

37 6/18/2018 2:29 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.


Download ppt "Lessons learned from deploying Windows Server 2016"

Similar presentations


Ads by Google