49
NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY 1 Interactive VDI Design Workshop Team member 1, Team member 2 NutanixTeam

Nutanix vdi workshop presentation

Embed Size (px)

DESCRIPTION

 

Citation preview

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

1Interactive VDI Design Workshop

Team member 1, Team member 2NutanixTeam

2

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Session Interactivity

• If Tweeting about this session, please use @Nutanix in your tweet.

2

3

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

VDI Technical Components3

WHERE THE DESKTOPS LIVE STORAGE

COMPUTE

VDI

WHERE THE DESKTOPS RUN

HOW THE DESKTOPS ARE DELIVERED

4

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

STORAGE – BUILDING THE BASE

FOR SUCCESS

4

5

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

The Biggest On-Going Lie5

6

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Storage Design6

Infrastructure Gotcha's Network InterconnectLimited number of storage Controllers

Performance is King Random steady state I/O attributes of Virtual Desktop (results in excess spindle count)Reads are Easy, Writes are HardOverprovisioning of storage required for acceptable performance (expensive)Network interconnect often becomes a bottleneck

7

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

IO Dispersion 7

Tiered storage is defined with a single aggregate, but volumes are broken down into the following six different types: • Operating System Template • Master Replica • Parent Replica • Linked Clone – Composed of Delta Footprint + Log + User Data Disk. • Persistent Disk – Optional, and ideally not used for Stateless Desktop • Disposable Disk

8

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

IO Dispersion 8

Storage tiering – Manual vs Automatic • Replica on SSD storage

• Offload operations• C:\ - System disk• Profile -View Virtual Profiles• User Data –Folder Redirection for Home Directory• Applications –Streamed ThinApp

9

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

IO Dispersion – XenDesktop9Tiered storage is defined with a single aggregate, but volumes are broken down into the following types: Machine Creation Services (MCS)• Master Image• Master Snapshot • Host Snapshot• Difference Disk• ID Disk• PvDisk – Optional

Provisioning Services (PVS)• Master vDisk• Difference Disk• Write Cache• PvDisk – Optional Master

vDisk File

PVS Server/ VM

Compute Host

R/O Image Streamed from PVS

Write Cache

Compute Host

ID DIsk

VM

DifferenceDisk

Host Snapshot

(R/O)

VM

ReadWrite

10

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

IO Dispersion 10Storage tiering – Manual vs Automatic • Replica on SSD storage

• Offload operations• C:\ - System disk• Profile -View Virtual Profiles / Citrix UPM• User Data –Folder Redirection for Home Directory• Applications –Streamed ThinApp, Streamed XenApp, or

Hosted XenApp

11

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

11

COMPUTE – Squeezing Them In

12

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

How Many VM’s Can Fit in this sucker?12

13

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

How Many VM’s Can Fit In This sucker?13CPU

14

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

How Many VM’s Can Fit In This sucker?14RAM

15

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Setting Memory Reservation15

16

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

32 is the New 816Cluster Size

17

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Why Not 10,000 Users per vCenter?17

18

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Pods & Blocks18

19

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Pods & Blocks19

Pods• User/datacenter• Security boundaries• BCDR requirements• Networking• Stretching the Storage\Failure domains

Blocks• Pool Types• Administration• Operational Impact\sizing

20

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Brokers20

21

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

21

Delivering the Desktop

22

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Load Balancers22

23

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Networking23

• Mark the Traffic• WRED FTW!• Scanvenger• USB Traffic• Stay under 80%• 200kps for average user• Application Streaming• Subnet sizing

• /25 /24/ /23 /22

24

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Networking - Optimize your Protocol for your Use Case24

• Frame Rate• Bandwidth Floor• Min & Max Image Quality • Audio Limit• Group Policy• Caching

25

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Picking your Clients\End Point25

• Managed \ Unmanaged• Security • Repurposing • Future Plans \ Upgrades

26

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Security Considerations26

• vShield Manager• App\ Zone• Data Security• EndPoint• Certificates

27

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Security Considerations – Authentication 27

• Password• Smartcards• Kiosk Mode• Radius• Copy and Paste• USB – Allow or Disallow

28

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Application Deployment 28

• Do What Works For You • ThinApp, XenApp & App-V – The Bubble

• Stream or Not to Stream• Compression • ThinReg vs SDK

• Unidesk & Mirage – Layering • ProfileUnity – GUI & Scripts• Horizon• All of the above will have impact on

storage & performance

29

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

User Personalization 29

• Test, Test, Test • ViewPersona - RTO• Unidesk & Mirage – Layering • ProfileUnity• All of the above will have impact on

storage & performance

30

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Persistent vs Non-Persistent30

• Quick logon• Like a regular desktop to

maintain• Easier to find the desktop• Infrastructure people will love • Hardier recovery

Persistent Non-Persistent• Delete instead of fix• Spare Pool• Survival of ADAM errors• Larger impact on IO• Profile Management

Needed• InfoBlox • Other considerations

• Pool Size• Power On/Power Off

31

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

AD Blunders That Can Hurt You31

http://carlwebster.com/briforum-2012-chicago

• Configure all DC’s as Global Catalog Servers• Missing Subnets in AD

• Closet Domain Controller• DNS Aging & Scavenging • Orphaned DC’s

32

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

32

KEY CONSIDERATIONSFOR SUCCESS

33

TRADITIONAL ORCONVERGED?

CONSIDERATION 1

33

34

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Virtual Desktop InfrastructureA massive strain on legacy traditional infrastructure

34

QuickTime™ and aH.264 decompressor

are needed to see this picture.

35

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

The SSD Band-Aid...that doesn’t solve the real problem

35

36

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Nutanix Converged Virtualization Appliance

36

Dramatically Lower TCO with True Convergence Built-In Enterprise-Grade Data Management

37

HOW TO SUCCESSFULLY PILOT VDI

Consideration 2

37

38

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

1) What gear for the Pilot?38

OR

41

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Rapid Desktop Program - for POC’s

• Only 85LBs per Nutanix appliance• Hundreds of VMs• Shrink from half-rack to

transit cases• Turnkey with VDI

already installed*

*not available for secured enclaves

41

42

HOW DO YOU SCALE-OUT, cost effectively?

CONSIDERATION 3

42

43

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Target lock?43

PERFECT VDI

2,000 users

please!

600 more users!

CORRECTION

MEASURED ERROR

REFERENCE

$$$$$ - WASTE - $$$$$

44

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Target lock!44

PERFECT VDI

2,000 users

please!

600 more users!

REFERENCE

CORRECTION

45

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

True Scale-Out VDI45

Provisioned 300 desktops on each Nutanix CVA & scaled LINEARLY to 3,000

47

WHERE SHOULD YOU FOCUS?

CONSIDERATION 4

47

48

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

The MANY Layers of VDI48

49

COSTCONSIDERATION 5

49

50

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

VDI Cost Breakdown: Traditional Architecture50

53

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

VDI Cost Comparison: Scale-Out53

Virtual Desktop Users

additional costsof entry

inefficientscale-out

54

NUTANIX INC. – CONFIDENTIAL AND PROPRIETARY

Q&A - Next Steps54