SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
Virtualizing
Business-Critical
Applications with
Confidence
Tec h n i c a l W h iTe Pa P e R
Virtualizing Business-Critical
                                                                        Applications with Confidence




Challenges Using Traditional High-Availability Solutions
Within any business, there are a number of applications that are critical to its success. As a result, these
applications and the systems they run on require a higher level of availability. One of the most common methods
used to increase the availability of a business-critical application in a physical environment is to deploy a
traditional high-availability clustering solution such as Veritas Cluster Server (VCS) or Microsoft Cluster Services
(MSCS). These solutions protect against an unplanned failure of a component by providing the ability to restart
an application or set of applications on additional servers in the cluster. While typically associated with
protection against unplanned server failures, these solutions can also be utilized to decrease the effects of a
planned outage by shifting applications to redundant servers, allowing for maintenance of the original server.
The trade-off with increasing application availability through traditional high-availability clustering is an
additional cost in terms of redundant hardware, clustering software/support, and additional complexity.
Management costs also increase due to the need to maintain multiple systems that are identical in configuration
and patch levels. Operationally, it is extremely difficult to deploy a limited number of spare servers to provide
redundancy for a larger set of applications due to difficulties with application compatibility, server patch levels,
and so on. This typically results in the use of small two-node clusters deployed for only the most critical
applications, leaving the majority of applications not clustered at all.


High Availability in VMware Environments
As customers move forward with VMware® virtualization solutions, they recognize an immediate set of benefits
far beyond a simple reduction in servers. VMware includes proven and widely deployed business-continuity
solutions in VMware vSphere™ 4.1 (“vSphere”) in the form of VMware vMotion™, VMware High Availability
(VMware HA) and VMware Fault Tolerance (VMware FT).
Utilizing VMware’s revolutionary vMotion technology, IT administrators are able to move applications for server
maintenance with zero downtime and data loss. Coupled with the operating system isolation natively provided
by VMware virtualization, it is very simple to provide a small set of highly consolidated servers capable of
providing very high uptime with reduced administrative cost.
VMware HA provides a simple, reliable way to increase the availability of virtual machines hosting critical
applications. VMware HA is a virtualization-based distributed infrastructure service of VMware vSphere 4.1,
which monitors the health of virtual machines and the VMware ESX® hosts upon which they reside. If a fault is
detected, the virtual machine is automatically restarted on another ESX host with adequate capacity to host it.
VMware HA is included in all vSphere editions and can be enabled on a VMware cluster with a single check box.
As VMware HA utilizes the storage and network connectivity already in place to support vMotion, enabling high
availability is as simple as ensuring you have adequate server capacity to handle failure of one or more ESX hosts.
VMware FT extends the capabilities of VMware HA to provide even higher levels of availability for mission-critical
applications by allowing instantaneous transfer of services to a secondary image of VMware FT–enabled virtual
machines. This allows virtual machines to continue operations, even when a server failure occurs, with zero
downtime and user interruption.


Challenges in Virtualizing Tier 1 and Tier 2 Applications
VMware HA and VMware FT technology provide increased availability for a large percentage of customers. In
fact, more than 80 percent of VMware customers leverage one or both of these technologies to protect most or
all of their virtual machines. However, a method to increase the availability at the application layer is often
desired, especially for business-critical Tier 1 and Tier 2 applications. Without this protection at the application
level, organizations are exposed to application failures that might happen inside the virtual machine. In many
cases, organizations have attempted to deploy a traditional application-clustering solution into the virtual
machine’s guest operating system for this purpose.




                                                                                   Tech n i c al Wh iTe PaPe R / 2
Virtualizing Business-Critical
                                                                                   Applications with Confidence




While deploying a traditional application-clustering solution into the virtual machine addresses failures at the
application layer, it also creates significant issues with the day-to-day operations of a virtualized environment, as
these solutions were designed for physical environments. These issues include the added complexity of
maintaining multiple identical virtual machines to properly host failover, additional capacity needed to host
spare servers, and difficulty in mapping application location to a specific virtual machine within the VMware
management solution. More important, the addition of in-guest clustering significantly impacts the ability to
make use of advanced VMware features such as vMotion, VMware HA, VMware Distributed Resource Scheduler
(VMware DRS), and VMware Distributed Power Management (VMware DPM).


Extending Application High Availability in vSphere 4.1
With the release of vSphere 4.1, VMware is introducing an application programming interface (API) to allow
third-party software vendors to deploy application monitoring components inside a VMware guest OS and
inform VMware HA when problems arise. This API will allow application-clustering vendors to develop
application monitoring and control solutions that fully complement the virtual machine high availability and
management provided by vSphere.
The joint solution will include two layers of protection. The first is the in-guest protection provided by the
application HA vendor. This application-layer protection can include application-specific capabilities such as
component-level monitoring, restarting of failed services, performance monitoring, and so forth. The second
layer is VMware HA, which can restart the virtual machine in cases where the in-guest solution cannot resolve
the issue.
The user can enable application monitoring as a part of the VM Monitoring Status section of the VMware HA
settings. Enabling application monitoring allows the application-monitoring solution to register with the VMware
application awareness API and communicate application status with VMware HA. Inside vCenter Server, the user
will be able to determine which virtual machines are monitored on the application level and which ones are only
monitored for basic virtual machine health. In Figure 1 we see how the user can control the monitoring level in
the cluster and per virtual machine.




Figure 1. Configuring the VM Monitoring Level to Include Application Monitoring.




                                                                                          Tech n i c al Wh iTe PaPe R / 3
Virtualizing Business-Critical
                                                                           Applications with Confidence




Introducing the VMware HA and Symantec ApplicationHA Solution
VMware is pleased to work jointly with Symantec to provide Symantec ApplicationHA for VMware. This solution
marries the best-in-class virtualization infrastructure from VMware with the industry-leading application high
availability package from Symantec. ApplicationHA leverages more than 12 years of development of Veritas
Cluster Server to provide an application-monitoring package that runs inside a VMware guest operating
system and fully integrates with VMware HA to provide virtual machine restart as needed to react to any
application issue.
Combined together, this solution:
•	Enhances the availability of Tier 1 virtualized applications by providing a mechanism to detect and recover
  from application failures
•	Improves the manageability of virtualized applications by providing visibility of the application’s status and
  application control (that is, starting or stopping the application) through a single pane of glass — VMware
  vSphere Client, the user interface for vCenter Server
•	Reduces operational complexity and TCO by eliminating the need for different operating system–based
  clustering products
•	Allows customers to enhance the availability of their applications without sacrificing the use of advanced
  VMware features such as vMotion and DRS


Symantec ApplicationHA Overview
Symantec ApplicationHA leverages the VMware HA application awareness API to provide comprehensive
application availability in VMware environments. It is comprised of two main sets of components, as shown
in Figure 2:
•	The guest component, which is installed in each ApplicationHA–enabled virtual machine
•	A vCenter Server plug-in that provides visibility and management of the applications




                                                       VM1          VM2

                                                       SQL           SQL

                                                     Application   Application
                                                        HA            HA

                                                       OS            OS


                               VMware HA               VMware HA

                              VMware ESX              VMware ESX




Figure 2. Symantec ApplicationHA Overview.




                                                                                   Tech n i c al Wh iTe PaPe R / 4
Virtualizing Business-Critical
                                                                        Applications with Confidence




The guest component encompasses an application agent framework and various application agents. The
application agent framework provides the infrastructure that is utilized by the application agents in their
execution. The application agents are responsible for the starting, stopping, and monitoring of a given
application resource or instance.
By defining the resources that comprise an application, the application agents are able to monitor, start, and
stop the application instance and any related resources. For example, if a Microsoft SQL database were to be put
under ApplicationHA control, several resources may be required in order to support the database. These might
include mount points to make the storage available, the Microsoft SQL instance, a Microsoft SQL Agent to
perform scheduled administrative tasks, and a Microsoft SQL Online Analytical Processing (OLAP) service for
multidimensional analysis. These all would be individual resources that would need to be monitored to ensure
proper operation of the Microsoft SQL database application.
Additionally, in order to bring the Microsoft SQL application online or offline, these resources would require a
specific order of operations. To support this, resources can be made dependent on each other, similar to the
depiction in Figure 3.



      SQL Server 2008

                            OLAP_SQLSERVER1



                            Agent_SQLSERVER1



                             SQLSERVER1



                             F:Database




Figure 3. Microsoft SQL 2008 Application Resource Dependency.




Through the use of this dependency model, when an administrator starts or stops the application they can be
assured that the application resources are handled by the guest component in the correct sequence.
The resources that comprise an application are continuously monitored at a given interval to ensure proper
operation. If the monitoring of a resource detects a failure, the guest component takes action:
1. The guest components attempt to restart the application within the virtual machine. The number of
   attempts that will be made to restart an application is configurable by the user.
2. If the application does not restart successfully, the guest components communicate to VMware HA through
   VMware’s application awareness API in order to trigger a reboot of the virtual machine by VMware HA. The
   application is restarted as part of this reboot process.
The Symantec ApplicationHA vCenter Server plug-in displays the status of the application (Offline/Online/
Faulted/Partial), as well as the status of the individual resources comprising the application. ApplicationHA
state changes are also reflected under the vSphere Alarms tab, enabling administrators to configure
notifications as desired.




                                                                                  Tech n i c al Wh iTe PaPe R / 5
Virtualizing Business-Critical
                                                                       Applications with Confidence




In addition to providing visibility of an application’s state, the Symantec ApplicationHA vCenter Server plug-in
also allows for the management of the application and ApplicationHA features. This includes the ability to start
and stop the application, the ability to enable or disable ApplicationHA functionality and the ability to disable
the communication to VMware vCenter Server in order to allow a user to troubleshoot a problem application
without triggering a restart of the virtual machine.


Application and Platform Support
Symantec ApplicationHA provides application availability in Windows and Linux VMware guests. It provides
extensive support to common off-the-shelf Tier 1 applications such as Microsoft Exchange, Microsoft SQL, IIS,
WebLogic, Oracle, and SAP, as well as the ability to monitor and manage custom applications.
Please refer to the Symantec ApplicationHA documentation for the latest information about the supported
applications and platforms.


Installation and Configuration
Symantec ApplicationHA provides users with a simplified wizard-based installation and configuration process.
The installation wizard allows for the installation and registration of the VMware vCenter Server plug-in as well
as the installation of the guest components into a virtual machine.
The installation of the guest components can be remotely pushed out to one or more virtual machines at a time.
A view similar to a VMware datacenter tree view in vCenter Server is provided in the installation wizard, in which
an administrator can select a group of virtual machines as a target for installation. This view provides several
levels of granularity of selection, including that of a VMware datacenter, VMware HA cluster, or an individual
virtual machine.
For example, if an administrator wants to provide ApplicationHA to all virtual machines in a Microsoft SQL
cluster, they can select those virtual machines, as shown in Figure 4.




Figure 4. Symantec ApplicationHA Installation Wizard.




                                                                                  Tech n i c al Wh iTe PaPe R / 6
Virtualizing Business-Critical
                                                                            Applications with Confidence




A simple wizard-driven process is also provided by Symantec ApplicationHA to assist in configuring and
monitoring an application. Off-the-shelf applications, such as Microsoft SQL or Microsoft Exchange, can be
configured by this wizard using default parameters common to these applications.
Administrators can also protect non off-the-shelf, or custom, applications. The configuration process for custom
applications is also wizard based, as shown in Figure 5, making it easy for users to deploy both packaged and
custom applications. By selecting different services, processes and resources that need to be monitored, an
administrator can provide enhanced availability to a practically limitless set of applications.




Figure 5. Symantec ApplicationHA Custom Application Configuration Wizard.



Management of Symantec ApplicationHA
Symantec ApplicationHA is managed through VMware vCenter Server through its provided plug-in. Using an
already familiar interface, VMware administrators can view the status of an application and the resources that
are associated with it.
Additionally, it provides the ability to perform operations specific to Symantec ApplicationHA, such as:
•	Start or stop an application
•	Enable or disable the communication between VMware HA and Symantec ApplicationHA
•	Configure or unconfigure Symantec ApplicationHA
For example, Figure 6 shows the view of a Microsoft SQL virtual machine that has been enabled for
ApplicationHA. The plug-in appears in the context of the virtual machine in vCenter Server’s Datacenter
view on the left.




                                                                                   Tech n i c al Wh iTe PaPe R / 7
Virtualizing Business-Critical
                                                                                    Applications with Confidence




Figure 6. SQL Application Status in Symantec ApplicationHA Tab in vSphere Client.


User access control is provided through the role-based access control mechanism provided by VMware vCenter.
This allows for three types of privileges that can be assigned to the vCenter Server user roles in order to provide
the appropriate level of access. These three privileges are defined as:
•	Guest: Has visibility into status of the application
•	Operator: Has visibility into the status of the application and the ability to start or stop the application
•	Administrator: Has visibility into the status of the application, the ability to start or stop the application,
  and the ability to configure ApplicationHA




Figure 7. Privilege Model with Symantec ApplicationHA.




                                                                                           Tech n i c al Wh iTe PaPe R / 8
Virtualizing Business-Critical
                                                                                                                                         Applications with Confidence




                                  ApplicationHA Best Practices
                                  As with any solution, the key to a successful ApplicationHA deployment is to follow best practices. The following
                                  list highlights common ApplicationHA best practices:
                                  •	Prior to installing ApplicationHA, read the release notes and check the Symantec Veritas Operation Services
                                    (VOS) Web site (vos.symantec.com) for any software updates and late-breaking news.
                                  •	Configure the VMware HA clusters in vCenter Server prior to installing ApplicationHA. As ApplicationHA
                                    leverages the VMware HA cluster configuration details to help simplify deployments, doing this first will
                                    simplify the installation process.
                                  •	Install the ApplicationHA client inside all virtual machines configured in a VMware HA cluster. Enable “VM and
                                    Application Monitoring” for all virtual machines in a VMware HA cluster. Monitoring all applications in the
                                    cluster ensures the highest levels of HA.
                                  •	When running vCenter Server inside a virtual machine, install the ApplicationHA client components inside the
                                    virtual machine and use ApplicationHA to monitor the database and vCenter Server services.
                                  •	Prior to configuring application monitoring, ensure the applications are fully installed, configured, and running.
                                    ApplicationHA discovery is able to detect installed applications and automatically set up application
                                    monitoring.
                                  •	Use Veritas Operations Manager (VOM) for managing applications across physical and virtual environments
                                    from a single pane of glass or to visualize and protect multi-tier applications or for enabling users who do not
                                    have access to vCenter Server but need to visualize and control applications in VMware virtual machines.


                                  Conclusion
                                  VMware’s application awareness API provides a foundation that third-party vendors can build upon in order to
                                  provide application awareness within a virtualized environment. Symantec ApplicationHA utilizes this API to
                                  develop a robust solution that allows for increased levels of availability for critical applications, avoiding many
                                  of the issues encountered when implementing a traditional clustering solution in a virtualized environment.
                                  VMware administrators will also appreciate the VMware vSphere interface that they are familiar with to visualize
                                  and administer the solution.
                                  Overall, this solution represents another leap forward in providing support for the most critical applications
                                  within a VMware virtualized environment.




VMware, inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com
Copyright © 2011 Symantec Corporation. All rights reserved.
Copyright © 2011 VMware, Inc. All rights reserved.

Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VMware and the VMware Logo are trademarks are
trademarks or registered trademarks of VMware or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. No part of this document may be reproduced
in any form by any means without prior written authorization of Symantec Corporation and VMware, Inc. Item No: 10Q4_WP_ApplicationHA_p9_A_R2

Mais conteúdo relacionado

Mais procurados

Pivotal cf for_devops_mkim_20141209
Pivotal cf for_devops_mkim_20141209Pivotal cf for_devops_mkim_20141209
Pivotal cf for_devops_mkim_20141209minseok kim
 
Cloud foundry architecture and deep dive
Cloud foundry architecture and deep diveCloud foundry architecture and deep dive
Cloud foundry architecture and deep diveAnimesh Singh
 
Cloud Foundry: Hands-on Deployment Workshop
Cloud Foundry: Hands-on Deployment WorkshopCloud Foundry: Hands-on Deployment Workshop
Cloud Foundry: Hands-on Deployment WorkshopManuel Garcia
 
Cloud Foundry Anniversary: Technical Slides
Cloud Foundry Anniversary: Technical Slides Cloud Foundry Anniversary: Technical Slides
Cloud Foundry Anniversary: Technical Slides marklucovsky
 
Cloud Foundry Bootcamp
Cloud Foundry BootcampCloud Foundry Bootcamp
Cloud Foundry BootcampJoshua Long
 
Cloud Foundry Technical Overview at IBM Interconnect 2016
Cloud Foundry Technical Overview at IBM Interconnect 2016Cloud Foundry Technical Overview at IBM Interconnect 2016
Cloud Foundry Technical Overview at IBM Interconnect 2016Stormy Peters
 
Cloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveCloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveDave McCrory
 
Cloud Foundry and Microservices: A Mutualistic Symbiotic Relationship
Cloud Foundry and Microservices: A Mutualistic Symbiotic RelationshipCloud Foundry and Microservices: A Mutualistic Symbiotic Relationship
Cloud Foundry and Microservices: A Mutualistic Symbiotic RelationshipMatt Stine
 
What's new in Pivotal Cloud Foundry 1.6
What's new in Pivotal Cloud Foundry 1.6What's new in Pivotal Cloud Foundry 1.6
What's new in Pivotal Cloud Foundry 1.6dektlong
 
Part 1: The Developer Experience (Pivotal Cloud Platform Roadshow)
Part 1: The Developer Experience (Pivotal Cloud Platform Roadshow)Part 1: The Developer Experience (Pivotal Cloud Platform Roadshow)
Part 1: The Developer Experience (Pivotal Cloud Platform Roadshow)VMware Tanzu
 
Migrate Heroku & OpenShift Applications to IBM BlueMix
Migrate Heroku & OpenShift Applications to IBM BlueMixMigrate Heroku & OpenShift Applications to IBM BlueMix
Migrate Heroku & OpenShift Applications to IBM BlueMixRohit Kelapure
 
Run your Java apps on Cloud Foundry
Run your Java apps on Cloud FoundryRun your Java apps on Cloud Foundry
Run your Java apps on Cloud FoundryAndy Piper
 
Dissecting The PaaS Landscape
Dissecting The PaaS LandscapeDissecting The PaaS Landscape
Dissecting The PaaS LandscapeRishidot Research
 
Pivotal cloud foundry introduction
Pivotal cloud foundry introductionPivotal cloud foundry introduction
Pivotal cloud foundry introductionGaurav Shukla
 
Cloud Foundry Introduction (w Demo) at Silicon Valley Code Camp
Cloud Foundry Introduction (w Demo) at Silicon Valley Code CampCloud Foundry Introduction (w Demo) at Silicon Valley Code Camp
Cloud Foundry Introduction (w Demo) at Silicon Valley Code Campcornelia davis
 
Cloud Foundry for PHP developers
Cloud Foundry for PHP developersCloud Foundry for PHP developers
Cloud Foundry for PHP developersDaniel Krook
 
Architecture & Operations
Architecture & OperationsArchitecture & Operations
Architecture & OperationsVMware Tanzu
 
Successful Patterns for running platforms
Successful Patterns for running platformsSuccessful Patterns for running platforms
Successful Patterns for running platformsPaul Czarkowski
 
Cloud Foundry Introduction and Overview
Cloud Foundry Introduction and OverviewCloud Foundry Introduction and Overview
Cloud Foundry Introduction and OverviewAndy Piper
 

Mais procurados (20)

Pivotal cf for_devops_mkim_20141209
Pivotal cf for_devops_mkim_20141209Pivotal cf for_devops_mkim_20141209
Pivotal cf for_devops_mkim_20141209
 
Cloud foundry architecture and deep dive
Cloud foundry architecture and deep diveCloud foundry architecture and deep dive
Cloud foundry architecture and deep dive
 
Cloud Foundry: Hands-on Deployment Workshop
Cloud Foundry: Hands-on Deployment WorkshopCloud Foundry: Hands-on Deployment Workshop
Cloud Foundry: Hands-on Deployment Workshop
 
Cloud Foundry Anniversary: Technical Slides
Cloud Foundry Anniversary: Technical Slides Cloud Foundry Anniversary: Technical Slides
Cloud Foundry Anniversary: Technical Slides
 
Cloud Foundry Bootcamp
Cloud Foundry BootcampCloud Foundry Bootcamp
Cloud Foundry Bootcamp
 
Cloud Foundry Technical Overview at IBM Interconnect 2016
Cloud Foundry Technical Overview at IBM Interconnect 2016Cloud Foundry Technical Overview at IBM Interconnect 2016
Cloud Foundry Technical Overview at IBM Interconnect 2016
 
Cloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveCloud Foundry a Developer's Perspective
Cloud Foundry a Developer's Perspective
 
Cloud Foundry and Microservices: A Mutualistic Symbiotic Relationship
Cloud Foundry and Microservices: A Mutualistic Symbiotic RelationshipCloud Foundry and Microservices: A Mutualistic Symbiotic Relationship
Cloud Foundry and Microservices: A Mutualistic Symbiotic Relationship
 
What's new in Pivotal Cloud Foundry 1.6
What's new in Pivotal Cloud Foundry 1.6What's new in Pivotal Cloud Foundry 1.6
What's new in Pivotal Cloud Foundry 1.6
 
Part 1: The Developer Experience (Pivotal Cloud Platform Roadshow)
Part 1: The Developer Experience (Pivotal Cloud Platform Roadshow)Part 1: The Developer Experience (Pivotal Cloud Platform Roadshow)
Part 1: The Developer Experience (Pivotal Cloud Platform Roadshow)
 
Migrate Heroku & OpenShift Applications to IBM BlueMix
Migrate Heroku & OpenShift Applications to IBM BlueMixMigrate Heroku & OpenShift Applications to IBM BlueMix
Migrate Heroku & OpenShift Applications to IBM BlueMix
 
Run your Java apps on Cloud Foundry
Run your Java apps on Cloud FoundryRun your Java apps on Cloud Foundry
Run your Java apps on Cloud Foundry
 
Dissecting The PaaS Landscape
Dissecting The PaaS LandscapeDissecting The PaaS Landscape
Dissecting The PaaS Landscape
 
Cloud Foundry Overview
Cloud Foundry OverviewCloud Foundry Overview
Cloud Foundry Overview
 
Pivotal cloud foundry introduction
Pivotal cloud foundry introductionPivotal cloud foundry introduction
Pivotal cloud foundry introduction
 
Cloud Foundry Introduction (w Demo) at Silicon Valley Code Camp
Cloud Foundry Introduction (w Demo) at Silicon Valley Code CampCloud Foundry Introduction (w Demo) at Silicon Valley Code Camp
Cloud Foundry Introduction (w Demo) at Silicon Valley Code Camp
 
Cloud Foundry for PHP developers
Cloud Foundry for PHP developersCloud Foundry for PHP developers
Cloud Foundry for PHP developers
 
Architecture & Operations
Architecture & OperationsArchitecture & Operations
Architecture & Operations
 
Successful Patterns for running platforms
Successful Patterns for running platformsSuccessful Patterns for running platforms
Successful Patterns for running platforms
 
Cloud Foundry Introduction and Overview
Cloud Foundry Introduction and OverviewCloud Foundry Introduction and Overview
Cloud Foundry Introduction and Overview
 

Semelhante a V mware white paper virtualizing business-critical applications with confidence

Symnatec ha in virtualization
Symnatec ha in virtualizationSymnatec ha in virtualization
Symnatec ha in virtualizationAtif Malik
 
Protecting Mission Critical Bus App
Protecting Mission Critical Bus AppProtecting Mission Critical Bus App
Protecting Mission Critical Bus AppJeremy Bigler
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual envsolarisyourep
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual envxKinAnx
 
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware CloudTudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware CloudITSpark Community
 
Automating Application Virtualization with AdminStudio Suite from Flexera Sof...
Automating Application Virtualization with AdminStudio Suite from Flexera Sof...Automating Application Virtualization with AdminStudio Suite from Flexera Sof...
Automating Application Virtualization with AdminStudio Suite from Flexera Sof...Flexera
 
Sap solutions-on-v mware-best-practices-guide
Sap solutions-on-v mware-best-practices-guideSap solutions-on-v mware-best-practices-guide
Sap solutions-on-v mware-best-practices-guidenarendar99
 
sp_p_wp_2013_v1_vmware_technology_stack___opportunities_for_isv_s_final
sp_p_wp_2013_v1_vmware_technology_stack___opportunities_for_isv_s_finalsp_p_wp_2013_v1_vmware_technology_stack___opportunities_for_isv_s_final
sp_p_wp_2013_v1_vmware_technology_stack___opportunities_for_isv_s_finalKunal Khairnar
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec
 
Virtualization 360 - Westcoast
Virtualization 360 - WestcoastVirtualization 360 - Westcoast
Virtualization 360 - Westcoastbutest
 
Temperfield vSphere Executive Presentation
Temperfield vSphere Executive PresentationTemperfield vSphere Executive Presentation
Temperfield vSphere Executive PresentationCalin Damian Tanase
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery ManagerJürgen Ambrosi
 
Virtualize Business Critical Applications with VMware
Virtualize Business Critical Applications with VMwareVirtualize Business Critical Applications with VMware
Virtualize Business Critical Applications with VMwareCaldwellC
 
System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 OverviewAmit Gatenyo
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centersHarshitTaneja13
 
VMworld 2015: What's New in vSphere?
VMworld 2015: What's New in vSphere?VMworld 2015: What's New in vSphere?
VMworld 2015: What's New in vSphere?VMworld
 
Axiom Virtualization Overview
Axiom Virtualization OverviewAxiom Virtualization Overview
Axiom Virtualization Overviewsmoots
 
VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld
 
Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex Networks
 

Semelhante a V mware white paper virtualizing business-critical applications with confidence (20)

Symnatec ha in virtualization
Symnatec ha in virtualizationSymnatec ha in virtualization
Symnatec ha in virtualization
 
Protecting Mission Critical Bus App
Protecting Mission Critical Bus AppProtecting Mission Critical Bus App
Protecting Mission Critical Bus App
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual env
 
Presentation business critical applications in a virtual env
Presentation   business critical applications in a virtual envPresentation   business critical applications in a virtual env
Presentation business critical applications in a virtual env
 
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware CloudTudor Damian - Comparing Microsoft Cloud with VMware Cloud
Tudor Damian - Comparing Microsoft Cloud with VMware Cloud
 
Automating Application Virtualization with AdminStudio Suite from Flexera Sof...
Automating Application Virtualization with AdminStudio Suite from Flexera Sof...Automating Application Virtualization with AdminStudio Suite from Flexera Sof...
Automating Application Virtualization with AdminStudio Suite from Flexera Sof...
 
Sap solutions-on-v mware-best-practices-guide
Sap solutions-on-v mware-best-practices-guideSap solutions-on-v mware-best-practices-guide
Sap solutions-on-v mware-best-practices-guide
 
sp_p_wp_2013_v1_vmware_technology_stack___opportunities_for_isv_s_final
sp_p_wp_2013_v1_vmware_technology_stack___opportunities_for_isv_s_finalsp_p_wp_2013_v1_vmware_technology_stack___opportunities_for_isv_s_final
sp_p_wp_2013_v1_vmware_technology_stack___opportunities_for_isv_s_final
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011
 
Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011Symantec ApplicationHA June 2011
Symantec ApplicationHA June 2011
 
Virtualization 360 - Westcoast
Virtualization 360 - WestcoastVirtualization 360 - Westcoast
Virtualization 360 - Westcoast
 
Temperfield vSphere Executive Presentation
Temperfield vSphere Executive PresentationTemperfield vSphere Executive Presentation
Temperfield vSphere Executive Presentation
 
VMware Site Recovery Manager
VMware Site Recovery ManagerVMware Site Recovery Manager
VMware Site Recovery Manager
 
Virtualize Business Critical Applications with VMware
Virtualize Business Critical Applications with VMwareVirtualize Business Critical Applications with VMware
Virtualize Business Critical Applications with VMware
 
System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 Overview
 
Vmware virtualization in data centers
Vmware virtualization in data centersVmware virtualization in data centers
Vmware virtualization in data centers
 
VMworld 2015: What's New in vSphere?
VMworld 2015: What's New in vSphere?VMworld 2015: What's New in vSphere?
VMworld 2015: What's New in vSphere?
 
Axiom Virtualization Overview
Axiom Virtualization OverviewAxiom Virtualization Overview
Axiom Virtualization Overview
 
VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101 VMworld 2013: Virtualization 101
VMworld 2013: Virtualization 101
 
Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...Techarex networks introduces disaster recovery as a service (draas) in united...
Techarex networks introduces disaster recovery as a service (draas) in united...
 

Mais de ReadWrite

Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkReadWrite
 
IoT Standards: The Next Generation
IoT Standards: The Next GenerationIoT Standards: The Next Generation
IoT Standards: The Next GenerationReadWrite
 
Designing For Smarties
Designing For SmartiesDesigning For Smarties
Designing For SmartiesReadWrite
 
Dude, Where's My Product?
Dude, Where's My Product?Dude, Where's My Product?
Dude, Where's My Product?ReadWrite
 
Senator Al Franken's Letter To Uber CEO Travis Kalanick
Senator Al Franken's Letter To Uber CEO Travis KalanickSenator Al Franken's Letter To Uber CEO Travis Kalanick
Senator Al Franken's Letter To Uber CEO Travis KalanickReadWrite
 
Where In The World Is The Fastest Broadband?
Where In The World Is The Fastest Broadband?Where In The World Is The Fastest Broadband?
Where In The World Is The Fastest Broadband?ReadWrite
 
Our Bodies, Disconnected: The Future Of Fitness APIs
Our Bodies, Disconnected: The Future Of Fitness APIsOur Bodies, Disconnected: The Future Of Fitness APIs
Our Bodies, Disconnected: The Future Of Fitness APIsReadWrite
 
White paper why they chose integrated hr outsourcing- a look at three small ...
White paper  why they chose integrated hr outsourcing- a look at three small ...White paper  why they chose integrated hr outsourcing- a look at three small ...
White paper why they chose integrated hr outsourcing- a look at three small ...ReadWrite
 
White paper what is a peo-
White paper  what is a peo-White paper  what is a peo-
White paper what is a peo-ReadWrite
 
White paper options for handling your hr function[1]
White paper  options for handling your hr function[1]White paper  options for handling your hr function[1]
White paper options for handling your hr function[1]ReadWrite
 
Tri net wp_buildsuccess
Tri net wp_buildsuccessTri net wp_buildsuccess
Tri net wp_buildsuccessReadWrite
 
Tri net wp_10_principles_hc_plan
Tri net wp_10_principles_hc_planTri net wp_10_principles_hc_plan
Tri net wp_10_principles_hc_planReadWrite
 
Tri net eguide_hiring_2012
Tri net eguide_hiring_2012Tri net eguide_hiring_2012
Tri net eguide_hiring_2012ReadWrite
 
White paper top 5 hr compliance concerns for small business
White paper  top 5 hr compliance concerns for small businessWhite paper  top 5 hr compliance concerns for small business
White paper top 5 hr compliance concerns for small businessReadWrite
 
Augmented Reality for Marketers and Developers: Analysis of the Leaders, the ...
Augmented Reality for Marketers and Developers: Analysis of the Leaders, the ...Augmented Reality for Marketers and Developers: Analysis of the Leaders, the ...
Augmented Reality for Marketers and Developers: Analysis of the Leaders, the ...ReadWrite
 
The Real-Time Web and its Future
The Real-Time Web and its FutureThe Real-Time Web and its Future
The Real-Time Web and its FutureReadWrite
 
Guide to Online Community Management
Guide to Online Community ManagementGuide to Online Community Management
Guide to Online Community ManagementReadWrite
 
Security for v mware
Security for v mwareSecurity for v mware
Security for v mwareReadWrite
 
Wp 7108 - 50000 seat vmware view deployment
Wp 7108 - 50000 seat vmware view deploymentWp 7108 - 50000 seat vmware view deployment
Wp 7108 - 50000 seat vmware view deploymentReadWrite
 

Mais de ReadWrite (20)

Networks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To DrinkNetworks, Networks Everywhere, And Not A Packet To Drink
Networks, Networks Everywhere, And Not A Packet To Drink
 
IoT Standards: The Next Generation
IoT Standards: The Next GenerationIoT Standards: The Next Generation
IoT Standards: The Next Generation
 
Designing For Smarties
Designing For SmartiesDesigning For Smarties
Designing For Smarties
 
Dude, Where's My Product?
Dude, Where's My Product?Dude, Where's My Product?
Dude, Where's My Product?
 
Senator Al Franken's Letter To Uber CEO Travis Kalanick
Senator Al Franken's Letter To Uber CEO Travis KalanickSenator Al Franken's Letter To Uber CEO Travis Kalanick
Senator Al Franken's Letter To Uber CEO Travis Kalanick
 
Where In The World Is The Fastest Broadband?
Where In The World Is The Fastest Broadband?Where In The World Is The Fastest Broadband?
Where In The World Is The Fastest Broadband?
 
Our Bodies, Disconnected: The Future Of Fitness APIs
Our Bodies, Disconnected: The Future Of Fitness APIsOur Bodies, Disconnected: The Future Of Fitness APIs
Our Bodies, Disconnected: The Future Of Fitness APIs
 
White paper why they chose integrated hr outsourcing- a look at three small ...
White paper  why they chose integrated hr outsourcing- a look at three small ...White paper  why they chose integrated hr outsourcing- a look at three small ...
White paper why they chose integrated hr outsourcing- a look at three small ...
 
White paper what is a peo-
White paper  what is a peo-White paper  what is a peo-
White paper what is a peo-
 
White paper options for handling your hr function[1]
White paper  options for handling your hr function[1]White paper  options for handling your hr function[1]
White paper options for handling your hr function[1]
 
Tri net wp_buildsuccess
Tri net wp_buildsuccessTri net wp_buildsuccess
Tri net wp_buildsuccess
 
Tri net wp_10_principles_hc_plan
Tri net wp_10_principles_hc_planTri net wp_10_principles_hc_plan
Tri net wp_10_principles_hc_plan
 
Tri net eguide_hiring_2012
Tri net eguide_hiring_2012Tri net eguide_hiring_2012
Tri net eguide_hiring_2012
 
Peo study
Peo studyPeo study
Peo study
 
White paper top 5 hr compliance concerns for small business
White paper  top 5 hr compliance concerns for small businessWhite paper  top 5 hr compliance concerns for small business
White paper top 5 hr compliance concerns for small business
 
Augmented Reality for Marketers and Developers: Analysis of the Leaders, the ...
Augmented Reality for Marketers and Developers: Analysis of the Leaders, the ...Augmented Reality for Marketers and Developers: Analysis of the Leaders, the ...
Augmented Reality for Marketers and Developers: Analysis of the Leaders, the ...
 
The Real-Time Web and its Future
The Real-Time Web and its FutureThe Real-Time Web and its Future
The Real-Time Web and its Future
 
Guide to Online Community Management
Guide to Online Community ManagementGuide to Online Community Management
Guide to Online Community Management
 
Security for v mware
Security for v mwareSecurity for v mware
Security for v mware
 
Wp 7108 - 50000 seat vmware view deployment
Wp 7108 - 50000 seat vmware view deploymentWp 7108 - 50000 seat vmware view deployment
Wp 7108 - 50000 seat vmware view deployment
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

V mware white paper virtualizing business-critical applications with confidence

  • 2. Virtualizing Business-Critical Applications with Confidence Challenges Using Traditional High-Availability Solutions Within any business, there are a number of applications that are critical to its success. As a result, these applications and the systems they run on require a higher level of availability. One of the most common methods used to increase the availability of a business-critical application in a physical environment is to deploy a traditional high-availability clustering solution such as Veritas Cluster Server (VCS) or Microsoft Cluster Services (MSCS). These solutions protect against an unplanned failure of a component by providing the ability to restart an application or set of applications on additional servers in the cluster. While typically associated with protection against unplanned server failures, these solutions can also be utilized to decrease the effects of a planned outage by shifting applications to redundant servers, allowing for maintenance of the original server. The trade-off with increasing application availability through traditional high-availability clustering is an additional cost in terms of redundant hardware, clustering software/support, and additional complexity. Management costs also increase due to the need to maintain multiple systems that are identical in configuration and patch levels. Operationally, it is extremely difficult to deploy a limited number of spare servers to provide redundancy for a larger set of applications due to difficulties with application compatibility, server patch levels, and so on. This typically results in the use of small two-node clusters deployed for only the most critical applications, leaving the majority of applications not clustered at all. High Availability in VMware Environments As customers move forward with VMware® virtualization solutions, they recognize an immediate set of benefits far beyond a simple reduction in servers. VMware includes proven and widely deployed business-continuity solutions in VMware vSphere™ 4.1 (“vSphere”) in the form of VMware vMotion™, VMware High Availability (VMware HA) and VMware Fault Tolerance (VMware FT). Utilizing VMware’s revolutionary vMotion technology, IT administrators are able to move applications for server maintenance with zero downtime and data loss. Coupled with the operating system isolation natively provided by VMware virtualization, it is very simple to provide a small set of highly consolidated servers capable of providing very high uptime with reduced administrative cost. VMware HA provides a simple, reliable way to increase the availability of virtual machines hosting critical applications. VMware HA is a virtualization-based distributed infrastructure service of VMware vSphere 4.1, which monitors the health of virtual machines and the VMware ESX® hosts upon which they reside. If a fault is detected, the virtual machine is automatically restarted on another ESX host with adequate capacity to host it. VMware HA is included in all vSphere editions and can be enabled on a VMware cluster with a single check box. As VMware HA utilizes the storage and network connectivity already in place to support vMotion, enabling high availability is as simple as ensuring you have adequate server capacity to handle failure of one or more ESX hosts. VMware FT extends the capabilities of VMware HA to provide even higher levels of availability for mission-critical applications by allowing instantaneous transfer of services to a secondary image of VMware FT–enabled virtual machines. This allows virtual machines to continue operations, even when a server failure occurs, with zero downtime and user interruption. Challenges in Virtualizing Tier 1 and Tier 2 Applications VMware HA and VMware FT technology provide increased availability for a large percentage of customers. In fact, more than 80 percent of VMware customers leverage one or both of these technologies to protect most or all of their virtual machines. However, a method to increase the availability at the application layer is often desired, especially for business-critical Tier 1 and Tier 2 applications. Without this protection at the application level, organizations are exposed to application failures that might happen inside the virtual machine. In many cases, organizations have attempted to deploy a traditional application-clustering solution into the virtual machine’s guest operating system for this purpose. Tech n i c al Wh iTe PaPe R / 2
  • 3. Virtualizing Business-Critical Applications with Confidence While deploying a traditional application-clustering solution into the virtual machine addresses failures at the application layer, it also creates significant issues with the day-to-day operations of a virtualized environment, as these solutions were designed for physical environments. These issues include the added complexity of maintaining multiple identical virtual machines to properly host failover, additional capacity needed to host spare servers, and difficulty in mapping application location to a specific virtual machine within the VMware management solution. More important, the addition of in-guest clustering significantly impacts the ability to make use of advanced VMware features such as vMotion, VMware HA, VMware Distributed Resource Scheduler (VMware DRS), and VMware Distributed Power Management (VMware DPM). Extending Application High Availability in vSphere 4.1 With the release of vSphere 4.1, VMware is introducing an application programming interface (API) to allow third-party software vendors to deploy application monitoring components inside a VMware guest OS and inform VMware HA when problems arise. This API will allow application-clustering vendors to develop application monitoring and control solutions that fully complement the virtual machine high availability and management provided by vSphere. The joint solution will include two layers of protection. The first is the in-guest protection provided by the application HA vendor. This application-layer protection can include application-specific capabilities such as component-level monitoring, restarting of failed services, performance monitoring, and so forth. The second layer is VMware HA, which can restart the virtual machine in cases where the in-guest solution cannot resolve the issue. The user can enable application monitoring as a part of the VM Monitoring Status section of the VMware HA settings. Enabling application monitoring allows the application-monitoring solution to register with the VMware application awareness API and communicate application status with VMware HA. Inside vCenter Server, the user will be able to determine which virtual machines are monitored on the application level and which ones are only monitored for basic virtual machine health. In Figure 1 we see how the user can control the monitoring level in the cluster and per virtual machine. Figure 1. Configuring the VM Monitoring Level to Include Application Monitoring. Tech n i c al Wh iTe PaPe R / 3
  • 4. Virtualizing Business-Critical Applications with Confidence Introducing the VMware HA and Symantec ApplicationHA Solution VMware is pleased to work jointly with Symantec to provide Symantec ApplicationHA for VMware. This solution marries the best-in-class virtualization infrastructure from VMware with the industry-leading application high availability package from Symantec. ApplicationHA leverages more than 12 years of development of Veritas Cluster Server to provide an application-monitoring package that runs inside a VMware guest operating system and fully integrates with VMware HA to provide virtual machine restart as needed to react to any application issue. Combined together, this solution: • Enhances the availability of Tier 1 virtualized applications by providing a mechanism to detect and recover from application failures • Improves the manageability of virtualized applications by providing visibility of the application’s status and application control (that is, starting or stopping the application) through a single pane of glass — VMware vSphere Client, the user interface for vCenter Server • Reduces operational complexity and TCO by eliminating the need for different operating system–based clustering products • Allows customers to enhance the availability of their applications without sacrificing the use of advanced VMware features such as vMotion and DRS Symantec ApplicationHA Overview Symantec ApplicationHA leverages the VMware HA application awareness API to provide comprehensive application availability in VMware environments. It is comprised of two main sets of components, as shown in Figure 2: • The guest component, which is installed in each ApplicationHA–enabled virtual machine • A vCenter Server plug-in that provides visibility and management of the applications VM1 VM2 SQL SQL Application Application HA HA OS OS VMware HA VMware HA VMware ESX VMware ESX Figure 2. Symantec ApplicationHA Overview. Tech n i c al Wh iTe PaPe R / 4
  • 5. Virtualizing Business-Critical Applications with Confidence The guest component encompasses an application agent framework and various application agents. The application agent framework provides the infrastructure that is utilized by the application agents in their execution. The application agents are responsible for the starting, stopping, and monitoring of a given application resource or instance. By defining the resources that comprise an application, the application agents are able to monitor, start, and stop the application instance and any related resources. For example, if a Microsoft SQL database were to be put under ApplicationHA control, several resources may be required in order to support the database. These might include mount points to make the storage available, the Microsoft SQL instance, a Microsoft SQL Agent to perform scheduled administrative tasks, and a Microsoft SQL Online Analytical Processing (OLAP) service for multidimensional analysis. These all would be individual resources that would need to be monitored to ensure proper operation of the Microsoft SQL database application. Additionally, in order to bring the Microsoft SQL application online or offline, these resources would require a specific order of operations. To support this, resources can be made dependent on each other, similar to the depiction in Figure 3. SQL Server 2008 OLAP_SQLSERVER1 Agent_SQLSERVER1 SQLSERVER1 F:Database Figure 3. Microsoft SQL 2008 Application Resource Dependency. Through the use of this dependency model, when an administrator starts or stops the application they can be assured that the application resources are handled by the guest component in the correct sequence. The resources that comprise an application are continuously monitored at a given interval to ensure proper operation. If the monitoring of a resource detects a failure, the guest component takes action: 1. The guest components attempt to restart the application within the virtual machine. The number of attempts that will be made to restart an application is configurable by the user. 2. If the application does not restart successfully, the guest components communicate to VMware HA through VMware’s application awareness API in order to trigger a reboot of the virtual machine by VMware HA. The application is restarted as part of this reboot process. The Symantec ApplicationHA vCenter Server plug-in displays the status of the application (Offline/Online/ Faulted/Partial), as well as the status of the individual resources comprising the application. ApplicationHA state changes are also reflected under the vSphere Alarms tab, enabling administrators to configure notifications as desired. Tech n i c al Wh iTe PaPe R / 5
  • 6. Virtualizing Business-Critical Applications with Confidence In addition to providing visibility of an application’s state, the Symantec ApplicationHA vCenter Server plug-in also allows for the management of the application and ApplicationHA features. This includes the ability to start and stop the application, the ability to enable or disable ApplicationHA functionality and the ability to disable the communication to VMware vCenter Server in order to allow a user to troubleshoot a problem application without triggering a restart of the virtual machine. Application and Platform Support Symantec ApplicationHA provides application availability in Windows and Linux VMware guests. It provides extensive support to common off-the-shelf Tier 1 applications such as Microsoft Exchange, Microsoft SQL, IIS, WebLogic, Oracle, and SAP, as well as the ability to monitor and manage custom applications. Please refer to the Symantec ApplicationHA documentation for the latest information about the supported applications and platforms. Installation and Configuration Symantec ApplicationHA provides users with a simplified wizard-based installation and configuration process. The installation wizard allows for the installation and registration of the VMware vCenter Server plug-in as well as the installation of the guest components into a virtual machine. The installation of the guest components can be remotely pushed out to one or more virtual machines at a time. A view similar to a VMware datacenter tree view in vCenter Server is provided in the installation wizard, in which an administrator can select a group of virtual machines as a target for installation. This view provides several levels of granularity of selection, including that of a VMware datacenter, VMware HA cluster, or an individual virtual machine. For example, if an administrator wants to provide ApplicationHA to all virtual machines in a Microsoft SQL cluster, they can select those virtual machines, as shown in Figure 4. Figure 4. Symantec ApplicationHA Installation Wizard. Tech n i c al Wh iTe PaPe R / 6
  • 7. Virtualizing Business-Critical Applications with Confidence A simple wizard-driven process is also provided by Symantec ApplicationHA to assist in configuring and monitoring an application. Off-the-shelf applications, such as Microsoft SQL or Microsoft Exchange, can be configured by this wizard using default parameters common to these applications. Administrators can also protect non off-the-shelf, or custom, applications. The configuration process for custom applications is also wizard based, as shown in Figure 5, making it easy for users to deploy both packaged and custom applications. By selecting different services, processes and resources that need to be monitored, an administrator can provide enhanced availability to a practically limitless set of applications. Figure 5. Symantec ApplicationHA Custom Application Configuration Wizard. Management of Symantec ApplicationHA Symantec ApplicationHA is managed through VMware vCenter Server through its provided plug-in. Using an already familiar interface, VMware administrators can view the status of an application and the resources that are associated with it. Additionally, it provides the ability to perform operations specific to Symantec ApplicationHA, such as: • Start or stop an application • Enable or disable the communication between VMware HA and Symantec ApplicationHA • Configure or unconfigure Symantec ApplicationHA For example, Figure 6 shows the view of a Microsoft SQL virtual machine that has been enabled for ApplicationHA. The plug-in appears in the context of the virtual machine in vCenter Server’s Datacenter view on the left. Tech n i c al Wh iTe PaPe R / 7
  • 8. Virtualizing Business-Critical Applications with Confidence Figure 6. SQL Application Status in Symantec ApplicationHA Tab in vSphere Client. User access control is provided through the role-based access control mechanism provided by VMware vCenter. This allows for three types of privileges that can be assigned to the vCenter Server user roles in order to provide the appropriate level of access. These three privileges are defined as: • Guest: Has visibility into status of the application • Operator: Has visibility into the status of the application and the ability to start or stop the application • Administrator: Has visibility into the status of the application, the ability to start or stop the application, and the ability to configure ApplicationHA Figure 7. Privilege Model with Symantec ApplicationHA. Tech n i c al Wh iTe PaPe R / 8
  • 9. Virtualizing Business-Critical Applications with Confidence ApplicationHA Best Practices As with any solution, the key to a successful ApplicationHA deployment is to follow best practices. The following list highlights common ApplicationHA best practices: • Prior to installing ApplicationHA, read the release notes and check the Symantec Veritas Operation Services (VOS) Web site (vos.symantec.com) for any software updates and late-breaking news. • Configure the VMware HA clusters in vCenter Server prior to installing ApplicationHA. As ApplicationHA leverages the VMware HA cluster configuration details to help simplify deployments, doing this first will simplify the installation process. • Install the ApplicationHA client inside all virtual machines configured in a VMware HA cluster. Enable “VM and Application Monitoring” for all virtual machines in a VMware HA cluster. Monitoring all applications in the cluster ensures the highest levels of HA. • When running vCenter Server inside a virtual machine, install the ApplicationHA client components inside the virtual machine and use ApplicationHA to monitor the database and vCenter Server services. • Prior to configuring application monitoring, ensure the applications are fully installed, configured, and running. ApplicationHA discovery is able to detect installed applications and automatically set up application monitoring. • Use Veritas Operations Manager (VOM) for managing applications across physical and virtual environments from a single pane of glass or to visualize and protect multi-tier applications or for enabling users who do not have access to vCenter Server but need to visualize and control applications in VMware virtual machines. Conclusion VMware’s application awareness API provides a foundation that third-party vendors can build upon in order to provide application awareness within a virtualized environment. Symantec ApplicationHA utilizes this API to develop a robust solution that allows for increased levels of availability for critical applications, avoiding many of the issues encountered when implementing a traditional clustering solution in a virtualized environment. VMware administrators will also appreciate the VMware vSphere interface that they are familiar with to visualize and administer the solution. Overall, this solution represents another leap forward in providing support for the most critical applications within a VMware virtualized environment. VMware, inc. 3401 Hillview Avenue Palo Alto CA 94304 USA Tel 877-486-9273 Fax 650-427-5001 www.vmware.com Copyright © 2011 Symantec Corporation. All rights reserved. Copyright © 2011 VMware, Inc. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. VMware and the VMware Logo are trademarks are trademarks or registered trademarks of VMware or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and VMware, Inc. Item No: 10Q4_WP_ApplicationHA_p9_A_R2