Download presentation
Presentation is loading. Please wait.
Published byHilary Cook Modified over 6 years ago
1
Lessons learned from deploying Windows Server 2016
6/18/2018 2:29 PM THR3055 Lessons learned from deploying Windows Server 2016 Thomas Maurer Cloud Architect & Technology Lead Microsoft MVP @ThomasMaurer © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
2
Beginning of 2017
3
Agenda Overview Storage Networking Compute Security 6/18/2018 2:29 PM
© Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
4
6/18/2018 2:29 PM Nano Server © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
5
Nano Server I am sorry ;-)
7
Container-optimized Nano Server
The Windows Server team has closely partnered with he .NET Team to bring the .NET Core 2.0 work to Windows Containers with an optimized container image based on Nano Server. For Windows Server RS3
8
6/18/2018 2:29 PM Storage © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
9
Software Defined Storage v3
Storage Spaces Direct Use standard servers with local storage to build highly available and scalable software-defined storage Storage Replica Create affordable business continuity and disaster recovery among datacenters Storage QoS Prevent noisy neighbors from impacting high priority workloads with a Storage QoS policy
10
Scenarios Hyper-converged Converged (Disaggregated)
- Compute and Storage resources together - Compute and Storage scale and are managed together - Typically small to medium sized scale-out deployments - Compute and Storage resources separate - Compute and Storage scale and are managed independently - Typically larger scale-out deployments HYPER-V CLUSTER HYPER-V CLUSTER(S) SMB3 / RDMA STORAGE NETWORK FABRIC SCALE-OUT FILE SERVER CLUSTER
11
Scale out to Max 2 node minimum Up to 16 servers Up to 416 disks
2+ cache drives 4+ capacity drives Up to 16 servers Up to 416 disks
12
Typical S2D Configurations
NVMe SSD HDD Cache mirror parity Balanced (mixed workloads) Performance Tier Capacity Tier NVMe SSD Cache mirror parity Medium (High perf. workloads) Performance Tier Capacity Tier NVMe SSD Cache mirror Ultra (Ultra High perf. workloads) Performance Tier
13
Storage Spaces Direct Demo
15
Extended Storage Spaces Direct Clusters
16x HPE DL380 G9 2x Intel Xeon 16 Core 768 GB RAM 2x 1.6 TB NVMe 16x 1.6 TB SSD 2x Mellanox ConnectX-4 100GbE 400 TB Usable Flash Only Storage
16
Storage Spaces Direct: Requirements
2 up to 16 Storage Nodes 10 Gbps or higher / RDMA (RoCE / iWARP) Min. 2 Caching Devices (NVMe or SSD) per Node Min. 4 Capacity Devices (SSD or HDD) per Node Storage Controller in HBA Mode (no RAID) Certified HW
17
Storage Spaces Direct: Key Points
Think about the scale you need RDMA (RoCE / iWARP) Caching Devices (NVMe or SSD) per Node Capacity Devices (SSD or HDD) per Node Think about getting Certified Hardware and the Windows Server Software-Defined (WSSD) Program
18
Windows Server Software-Defined (WSSD) Program
20
RAID Inc. Ability™ HCI Series S2D200 SuperMicro SYS-2028U-TRT+
Cisco UCS C240 M4 DataON S2D-3110 DELL PowerEdge R730XD Fujitsu Primergy RX2540 M2 HPE ProLiant DL380 Gen9 Inspur NF5280M4 Intel MCB2224TAF3 Lenovo X3650 M5 NEC Express5800 R120f-2M Quanta D51B-2U (MSW6000) RAID Inc. Ability™ HCI Series S2D200 SuperMicro SYS-2028U-TRT+
21
Storage Replica Protection of key data and workloads
Synchronous replication Storage agnostic mirroring of data in physical sites with crash- consistent volumes ensuring zero data loss at the volume level. Increase resilience Unlocks new scenarios for metro-distance cluster-to-cluster disaster recovery and stretch failover clusters for automated high availability. Complete solution End-to-end for storage and clustering, including Hyper-V, Storage Replica, Storage Spaces, cluster, Scale-Out File Server, SMB3, deduplication, Resilient File System (ReFS), NTFS, and Windows PowerShell. Streamlined management Graphical management for individual nodes and clusters through Failover Cluster Manager and Azure Site Recovery. Stretch cluster and cluster-to-cluster Site 1 Site 2
22
Storage Replica – Key Take Aways
Best kept secrets in Windows Server 2016 Works for Hyper-V Hosts Works for Hyper-V Clusters Works inside Virtual Machines Works for Physical Hosts Works in Azure
23
Storage Replica: Requirements
Any volume (SAS, SAN, iSCSI, Local) <5 ms round trip between sites for synchronous replication RDMA (recommended) Identical size for source / target volume SSDs for log disks recommended (min. 8GB size) Identical physical disk geometry (phys. sector size) Turn on SR write ordering for distributed app data
24
6/18/2018 2:29 PM Network © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
25
Software-Defined Networking is a game changer
Think about RDMA …
26
6/18/2018 2:29 PM Compute © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
27
Challenges in protecting high-value assets
6/18/2018 Challenges in protecting high-value assets Any seized or infected host administrators can access guest virtual machines Fabric Hypervisor Customer Storage Host OS Guest VM Legitimate host? Impossible to identify legitimate hosts without a hardware based verification Tenants VMs are exposed to storage and network attacks while unencrypted © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
28
6/18/2018 Confidently protect sensitive customer data: Designed for ‘zero-trust’ environments Any seized or infected host administrators can access guest virtual machines Hardware-rooted technologies to separate the guest operating system from host administrators Virtual Secure Mode Process and Memory access protection from the host Host OS Customer Customer Virtual machine OS Data Workload Compute Storage Network Hypervisor Fabric Guest VM Guest VM Guarded fabric to identify legitimate hosts and certify them to run shielded tenant Generation 2 VMs Impossible to identify legitimate hosts without a hardware based verification Host Guardian Service Enabler to run Shielded Virtual Machines on a legitimate host in the fabric Trust the host Storage Virtualized trusted platform module (vTPM) support to encrypt virtual machines Tenants VMs are exposed to storage and network attacks while unencrypted Shielded VM Bitlocker enabled VM Hypervisor Hypervisor Fabric Fabric Host Guardian Service © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
29
Improvements Operational Backup and Checkpoints …
Hot Add / Remove Network Adapters Online Memory Resize PowerShell Direct Cluster Rolling Upgrades Backup and Checkpoints …
31
Containers: A new approach
6/18/2018 2:29 PM Containers: A new approach Physical Applications traditionally built and deployed onto physical systems with 1:1 relationship New applications often required new physical systems for isolation of resources Physical/virtual Package and run apps within containers Virtual Higher consolidation ratios and better utilization Faster app deployment than in a traditional, physical environment Apps deployed into VMs with high compatibility success Apps benefited from key VM features i.e., live migration, HA Key benefits Further accelerate of app deployment Reduce effort to deploy apps Streamline development and testing Lower costs associated with app deployment Increase server consolidation © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
32
6/18/2018 2:29 PM One More thing © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
33
6/18/2018 2:29 PM Licensing © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
35
Core Based Licensing New Core Based Model
Costs increase with more physical Cores
36
Please evaluate this session
Tech Ready 15 6/18/2018 Please evaluate this session From your Please expand notes window at bottom of slide and read. Then Delete this text box. PC or tablet: visit MyIgnite Phone: download and use the Microsoft Ignite mobile app Your input is important! © 2012 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
37
6/18/2018 2:29 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.