Nasuni at SFD 16

 

GWbnBM4

Nasuni was a new company to me, but they had a great presentation and I really liked what they presented.  They are providing a solution to a real problem that a lot of companies are running into.  The cloud is a great solution to so many problems that IT departments are encountering, but going to the cloud is not always easy as it looks. Nasuni provides a solution that simplifies the distributed NAS.

The first line from the Nasuni website says it best “Nasuni is primary and archive file storage capacity, backup, DR, global file access, and multi-site collaboration in one massively scalable hybrid cloud solution.”  It does this through providing a solution to to have a “unified NAS” on top of public clouds.  It is essentially and overlay that is controlled by using an on premise appliance either through a VM on your current infrastructure or a Nasuni physical appliance and keeps the data locally cached.  This allows that in the event of internet access being down users can continues to access storage, and when internet is restored the data will be synced up.

There are no limits on the amount of files or file sizes.  The files in a solution like this can be access by multiple users and be changing all the time.  To prevent issues files are locked when a user is accessing it.  Once the file is done being accessed the file will remain locked until it is synced up with the cloud.  Through the continuous versioning of files and in the event of malware or such other issues. Files can be rolled back to another version before the incident occurred.  All the data is deduped and compressed for effective storage utilization.  Files can also be encrypted to prevent any data theft.   Managing a solution like this with multiple devices across many sites could be very complex and time consuming, but with Nasuni everything is managed from a single pane limiting operation costs.

1.PNG

 

Nasuni looks like a great product that really simplifies the migration to the cloud.  By supporting the big players such as AWS, Azure and GCP they give customers plenty of options on what cloud they wish to utilize.  With the caching device they ensure that data can be always accessible even if there are issues preventing access to the cloud and limiting the amount of data that has to be transferred.

You can see this presentation from Nasuni and all the other presentations from Storage Field Day 16 at http://techfieldday.com/event/sfd16/

 

NetApp OnCommand Insight

NetApp presented on its product OnComand Insight at Storage Field Day 16 this year.  What made the presentation unique from the rest of the presentations was that it was about an analytics and monitoring tool.  The only such presentation at the event.    OnCommand is an on premise appliance that can be setup as a VM in your environment.   Once it is fully deployed it will start reporting information about your environment.  Unlike other similar products it only reports on what it sees in your data center.  As opposed to comparing your environment to other environments.

255

OnCommand Insight is always watching your environment, and If an issues arises it can be setup to automatically generate a ticket and alert the proper team of the issue.  It supports Restful API so whatever needs to be done can be scripted out, and Licensing is done by the raw capacity.

They also spoke of the product Cloud Insights.  It is not a direct replacement for OnCommand, but takes many of its features and adds on top of it.  Cloud Insights is designed for the modern Hybrid data center. It can monitor both what is on premises and what is running in the cloud.    As more and more companies go hybrid it is imperative to have a tool that can monitor both and give recommendations on where to run a workload.

One of my favorite features is that is agnostic of what it monitors.  Monitoring is done via plugins and there is a large repository where you can download more.  It reminds me a lot of EMC ViPR SRM as it could monitor more than just EMC products, but NetApp has really gone a step further and its capabilities.

Take a look at the presentation from NetApp and the rest of the Storage Field Day 16 presentations here.

Etherchannel, LACP and VMware

Recently I have had some discussions about using LACP and static etherchannel with VMware.  The conversations have mainly revolved around how to get it setup, and what are the different use cases for it. The biggest question was about what exactly is the difference between the two.  Are they the same thing with different names or are they actually different things?

nirclecom_user_file_VR9EFwHQTILTpFyG4tnAFjWnKn6tVUGoSyBc

Etherchannel and LACP are used to accomplish the same thing, but they both do it in a slightly different way.  They are used to form a link-aggregation-groups (LAG) made of multiple physical links to connect networking devices together.  This is needed to avoid getting a loop in the network, that is normally handled by using the Spanning Tree Protocol.   So what is the real difference between the two?  LACP has two modes.  Active and passive, if one or both sides are set for active then they form a channel.   With Etherchannel one side must be set for active and the other set for passive.  Otherwise no channel will form.  Seems fairly simple but…

The reason all of this matters is that the virtual switches with VMware cannot form a loop.  So by setting up LACP or etherchannel you are just increasing your operational cost, and the complexity of the network.  It requires greater coordination with the networking team to ensure that LACP or etherchannel are setup with the same exact settings.   LACP and etherchannel offer different forms of load balancing.  This is accomplished by using hashes based on things such as source IP, source MAC. There are quite a few options to choose from.  Once the hash is created the packet is sent down a certain link determined by the hash that was generated..  This creates a constraint because now every packet is sent down that same link, and will keep using it until a link fails and it is forced to use another link.  So it is possible that if 2 VM’s are communicating over a LAG all traffic could be going across just one link, and leaving the other links underutilized.  The distributed switch and physical switch must be setup to use the same settings or a link will not be established. LACP is only available by using the Distributed switch which is only available with Enterprise Plus Licensing.

If you are able to use the Distributed switch it also supports Load Base Teaming.  LBT is the only true load balancing method.  It will send traffic across all links based on the actual utilization of the link.  This is a far superior load balancing feature and if you are already paying for it you should be using it.  There is also the myth that bonding two 10gb links will give you 20gb of throughput.  As I discussed earlier the limitation is that vNIC can only utilize one link at a time.  It cannot break up streams across two links for increased throughput.  You can only really gain the throughput advantage with multiple VM’s utilizing them.

download (2)

As a best practice you should always use trunk ports down to your hypervisor hosts, this allows the host to utilize multiple VLAN’s as opposed to placing the switch ports into access mode and allowing only one VLAN, customers who do this often end up re-configuring their network later on and its always a pain. I generaly recommend setting up each port on the physical switch in a standard trunk mode with all the VLAN’s that you need.  Then on the virtual switch build out all of your portgroups and have the traffic tagged there with the VLAN needed for that portgroup.  By doing this and using LBT you have a simple yet efficient design.

Now there is one caveat to all of this  vSAN does not support LBT, but it does support LACP, and if you have vSAN you are licensed for the distributed switch.  LACP has one advantage over LBT and that is the fail over time.  This is the time it takes for a dead link to be detected and traffic sent to another link. LACP failover is faster than that of LBT, and this failover time could mean the difference between a failed write with vSAN.  Which can limit any downtime, but with a production hopefully there will not be many links going offline.

VMworld 2018!!!

It is finally that time of year.  The greatest time of year. It is time for VMworld!!!  August 26-30 is the the time where everyone packs up and spends a week in Las Vegas with some of the greatest minds in Virtualization.

download

VMworld is a great opportunity to learn about some of the latest technology in the industry.  The show floor will be backed with tons of vendors.  Some you have heard of and some that you haven’t.  You may find that vendor that has just the solution that you have been looking for.  All the vendors will have lots of information about the various products and solutions that they offer.  It is a great idea to talk to as many as you can.  Always a great opportunity to learn something new, and they usually have some great prize and swag!

The sessions will be excellent as always presented by some of the smartest people you have ever met.  You can take a look of all the sessions here.  If you can’t make it to VMworld they will post most of the sessions on Youtube shortly after.

They will also be offering training sessions on the various VMware products, and if you ready for it you can take one of the certification tests.  Maybe finally get that VCP or VCAP that you have been working on.

The best part of all of this is the networking, and the lifelong friends you will make.  Through VMworld and various other social events I met many great people and friends.  It is a great community to be a part of, and I hope this year I will be able to meet up with as many people I can at the various events.

download (1)

Blog at WordPress.com.

Up ↑