SlideShare uma empresa Scribd logo
1 de 15
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
Len Bellemore – Cloud Product Development
4th July 2013
Securing the CloudStack
Management Domain
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
Agenda
• Who are ControlCircle
• The design goals
• Network design
• Challenges faced
• Example use case testing
• How did we trouble shoot
• Lessons learned
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
• Our focus is delivering mission critical IT
services that are of strategic importance to our
customers - underpinning their business
growth and competitiveness
• We specialize in hybrid capabilities – from
colocation to cloud - aligning our customers’
requirements to the right solution and ensuring
they maintain full visibility and control through
our Max3000™ monitoring and management
platform
Introduction to ControlCircle
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
Design Goals
• Security
– Security in depth, not just at the edge
– Containment of any attack
– Identification of any attack
• Traffic Segmentation
– Reduce size of broadcast domains
– Use of high capacity links for storage
• Scale
– Easy addition of physical sites/locations
– Distribute the controller servers across multiple sites
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
CloudStack Network Design
Standard design
• Single management
network
– CS Management
Servers
– CS MySQL DB
– Hypervisors
– SSVM
– Console Proxy
• Guest
• Public
• Storage
– NFS/iSCSI Device
What we designed
• DMZ
– Load Balancers
– Web Servers
– Internet Proxy
• Control
– CS Management
Servers
– vCenter
– Windows Domain
Controllers
– DNS Servers (non-
Guest)
• Management
– Hypervisors
– SSVM, Console Proxy
• Guest
• Public
• Database
– CS MySQL DB
• Storage
– NFS/iSCSI
Devices
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
High Level Network Diagram
Zone 1
Guest VMs
Guest
Virtual
Routers
Public 1
Secondary
Primary
Storage 1
CS Management vCenterDNS
ProxyWeb Servers
Guest VM Hosts
Management 1
SSVM Console Proxy
MySQL
Guest 1
DMZ
Control
Database
Control VM
Hosts
Control Segment 1
Zone 2
Guest VMs
Guest
Virtual
Routers
Public 2
Secondary
Primary
Storage 2
CS Management vCenterDNS
ProxyWeb Servers
Guest VM Hosts
Management 2
SSVM Console Proxy
MySQL
Guest 2
DMZ
Control
Database
Control VM
Hosts
Control Segment 2
Load Balancers Load Balancers
Control Segment
traffic is routed
between
physical sites
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
Challenges we faced
• Traffic flows difficult to ascertain
• Logging detailed but ambiguous
• Documentation scattered across internet
• CloudStack documents only cover the standard single management
network design
• Testing had to be use case led – what are the use cases?
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
Example use case
ISO Upload
• Copy ISO to a Web Server
• Register ISO and input URL to ISO
• SSVM Downloads ISO
• SSVM copies ISO to Secondary Storage
• Finished!
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
ISO Upload
Test outcome
• Copy ISO to a Web Server
• Register ISO and input URL to ISO
• GUI error
• CS Management Server log file reports name resolution failure
• Troubleshooting is focused on CS Mgmt Server, no luck
• Proxy? DNS Servers? Firewall Rules?
• Confusion…..
• http://www.cloudstack-china.org/wp-content/uploads/downloads/2012/12/ccc-
cloudstacknetworking.pptx
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
ISO Upload
Final resolution
• Focus back to SSVM
• Realised that DNS was not resolving. Why?
• Open firewall rules for DNS to correct IP
• Retry ISO Upload
• Presto!
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
How did we Troubleshoot?
• CS Management Server Logs
• SSVM Logs
• Firewall Logs
• Work closely with the Network team
• users@cloudstack.apache.org mailing list
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
Lessons Learned
Debugging and fault finding
• There is no set way of doing
things in CloudStack world
• Official installation guides are
written for simple networks
• Documentation is scattered,
blogs and unofficial sites are
the best source of info
• Logging is your friend, albeit a
troubled one!
• The community is your best
troubleshooting tool
Designing the solution
• Consider agility when
designing your network
• Firewall rules based on
single IP’s is not achievable
– you need host and object
groups
• Understand the use cases
prior to testing
• Document firewall rules
before you start building
based on use cases
• Document as you go
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
Documentation and Resources
• http://www.slideshare.net/cloudstack/
• http://www.shapeblue.com/
• http://www.buildacloud.org/
• http://markmail.org/
• http://cloudstack.apache.org/
• http://support.citrix.com/
• http://support.citrix.com/servlet/KbServlet/download/2389-
102-654859/CitrixPorts_by_Port_1103.pdf
© Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK
and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries.
Confidential
Any Questions
?

Mais conteúdo relacionado

Mais procurados

KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...ShapeBlue
 
What’s New in CloudStack 4.15 - CloudStack European User Group Virtual, May 2021
What’s New in CloudStack 4.15 - CloudStack European User Group Virtual, May 2021What’s New in CloudStack 4.15 - CloudStack European User Group Virtual, May 2021
What’s New in CloudStack 4.15 - CloudStack European User Group Virtual, May 2021ShapeBlue
 
Hacking apache cloud stack
Hacking apache cloud stackHacking apache cloud stack
Hacking apache cloud stackNitin Mehta
 
Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4Sheng Yang
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinChiradeep Vittal
 
Building clouds with apache cloudstack apache roadshow 2018
Building clouds with apache cloudstack   apache roadshow 2018Building clouds with apache cloudstack   apache roadshow 2018
Building clouds with apache cloudstack apache roadshow 2018ShapeBlue
 
Directions for CloudStack Networking
Directions for CloudStack  NetworkingDirections for CloudStack  Networking
Directions for CloudStack NetworkingChiradeep Vittal
 
Cloud stack troubleshooting
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting AlexTian
 
Hypervisor Selection in Apache CloudStack 4.4
Hypervisor Selection in Apache CloudStack 4.4Hypervisor Selection in Apache CloudStack 4.4
Hypervisor Selection in Apache CloudStack 4.4Tim Mackey
 
Introduction to Apache CloudStack by David Nalley
Introduction to Apache CloudStack by David NalleyIntroduction to Apache CloudStack by David Nalley
Introduction to Apache CloudStack by David Nalleybuildacloud
 
Decisions behind hypervisor selection in CloudStack 4.3
Decisions behind hypervisor selection in CloudStack 4.3Decisions behind hypervisor selection in CloudStack 4.3
Decisions behind hypervisor selection in CloudStack 4.3Tim Mackey
 
Hypervisor selection in CloudStack
Hypervisor selection in CloudStackHypervisor selection in CloudStack
Hypervisor selection in CloudStackTim Mackey
 
Cloud stack overview
Cloud stack overviewCloud stack overview
Cloud stack overviewgavin_lee
 
Cloudstack networking2
Cloudstack networking2Cloudstack networking2
Cloudstack networking2Hiroaki Kawai
 
CloudStack vs OpenStack
CloudStack vs OpenStackCloudStack vs OpenStack
CloudStack vs OpenStackVictor Zhang
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture componentsDavid Pasek
 

Mais procurados (20)

KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
KVM High Availability Regardless of Storage - Gabriel Brascher, VP of Apache ...
 
What’s New in CloudStack 4.15 - CloudStack European User Group Virtual, May 2021
What’s New in CloudStack 4.15 - CloudStack European User Group Virtual, May 2021What’s New in CloudStack 4.15 - CloudStack European User Group Virtual, May 2021
What’s New in CloudStack 4.15 - CloudStack European User Group Virtual, May 2021
 
Hacking apache cloud stack
Hacking apache cloud stackHacking apache cloud stack
Hacking apache cloud stack
 
CloudStack Networking
CloudStack NetworkingCloudStack Networking
CloudStack Networking
 
Cloud stack for_beginners
Cloud stack for_beginnersCloud stack for_beginners
Cloud stack for_beginners
 
CloudStack vs Openstack
CloudStack vs OpenstackCloudStack vs Openstack
CloudStack vs Openstack
 
Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4Virtual Router in CloudStack 4.4
Virtual Router in CloudStack 4.4
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
 
Building clouds with apache cloudstack apache roadshow 2018
Building clouds with apache cloudstack   apache roadshow 2018Building clouds with apache cloudstack   apache roadshow 2018
Building clouds with apache cloudstack apache roadshow 2018
 
Directions for CloudStack Networking
Directions for CloudStack  NetworkingDirections for CloudStack  Networking
Directions for CloudStack Networking
 
Cloud stack troubleshooting
Cloud stack troubleshooting Cloud stack troubleshooting
Cloud stack troubleshooting
 
Hypervisor Selection in Apache CloudStack 4.4
Hypervisor Selection in Apache CloudStack 4.4Hypervisor Selection in Apache CloudStack 4.4
Hypervisor Selection in Apache CloudStack 4.4
 
Introduction to Apache CloudStack by David Nalley
Introduction to Apache CloudStack by David NalleyIntroduction to Apache CloudStack by David Nalley
Introduction to Apache CloudStack by David Nalley
 
Decisions behind hypervisor selection in CloudStack 4.3
Decisions behind hypervisor selection in CloudStack 4.3Decisions behind hypervisor selection in CloudStack 4.3
Decisions behind hypervisor selection in CloudStack 4.3
 
Hypervisor selection in CloudStack
Hypervisor selection in CloudStackHypervisor selection in CloudStack
Hypervisor selection in CloudStack
 
vBACD - Deploying Infrastructure-as-a-Service with CloudStack - 2/28
vBACD - Deploying Infrastructure-as-a-Service with CloudStack - 2/28vBACD - Deploying Infrastructure-as-a-Service with CloudStack - 2/28
vBACD - Deploying Infrastructure-as-a-Service with CloudStack - 2/28
 
Cloud stack overview
Cloud stack overviewCloud stack overview
Cloud stack overview
 
Cloudstack networking2
Cloudstack networking2Cloudstack networking2
Cloudstack networking2
 
CloudStack vs OpenStack
CloudStack vs OpenStackCloudStack vs OpenStack
CloudStack vs OpenStack
 
vSAN architecture components
vSAN architecture componentsvSAN architecture components
vSAN architecture components
 

Semelhante a CloudStack European User Group - controlCircle

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Skytap Cloud
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruMarketingArrowECS_CZ
 
MySQL Manchester TT - MySQL Enterprise Edition
MySQL Manchester TT - MySQL Enterprise EditionMySQL Manchester TT - MySQL Enterprise Edition
MySQL Manchester TT - MySQL Enterprise EditionMark Swarbrick
 
The Changing Role of a DBA in an Autonomous World
The Changing Role of a DBA in an Autonomous WorldThe Changing Role of a DBA in an Autonomous World
The Changing Role of a DBA in an Autonomous WorldMaria Colgan
 
Modern Data Security with MySQL
Modern Data Security with MySQLModern Data Security with MySQL
Modern Data Security with MySQLVittorio Cioe
 
Best Practices for Building an Enterprise SOA Infrastructure on Oracle SOA Suite
Best Practices for Building an Enterprise SOA Infrastructure on Oracle SOA SuiteBest Practices for Building an Enterprise SOA Infrastructure on Oracle SOA Suite
Best Practices for Building an Enterprise SOA Infrastructure on Oracle SOA SuiteMatt Wright
 
Oracle database in cloud, dr in cloud and overview of oracle database 18c
Oracle database in cloud, dr in cloud and overview of oracle database 18cOracle database in cloud, dr in cloud and overview of oracle database 18c
Oracle database in cloud, dr in cloud and overview of oracle database 18cAiougVizagChapter
 
Database as a Service, Collaborate 2016
Database as a Service, Collaborate 2016Database as a Service, Collaborate 2016
Database as a Service, Collaborate 2016Kellyn Pot'Vin-Gorman
 
Nobl9+solarwinds SLOs are a Must-Have for SREs & Cloud-Native Services.pptx
Nobl9+solarwinds SLOs are a Must-Have for SREs & Cloud-Native Services.pptxNobl9+solarwinds SLOs are a Must-Have for SREs & Cloud-Native Services.pptx
Nobl9+solarwinds SLOs are a Must-Have for SREs & Cloud-Native Services.pptxErzaZylfijaj
 
MySQL Enterprise Edition Overview
MySQL Enterprise Edition OverviewMySQL Enterprise Edition Overview
MySQL Enterprise Edition OverviewMario Beck
 
Advanced Monitoring for Amazon RDS - AWS 4D Event Manchester 16th June 2023
Advanced Monitoring for Amazon RDS - AWS 4D Event Manchester 16th June 2023Advanced Monitoring for Amazon RDS - AWS 4D Event Manchester 16th June 2023
Advanced Monitoring for Amazon RDS - AWS 4D Event Manchester 16th June 2023Matt Houghton
 
SDC SR2 2013 - RCP Software Delivery
SDC SR2 2013 - RCP Software Delivery SDC SR2 2013 - RCP Software Delivery
SDC SR2 2013 - RCP Software Delivery Genuitec, LLC
 
MongoDB World 2019: Why NBCUniversal Migrated to MongoDB Atlas
MongoDB World 2019: Why NBCUniversal Migrated to MongoDB AtlasMongoDB World 2019: Why NBCUniversal Migrated to MongoDB Atlas
MongoDB World 2019: Why NBCUniversal Migrated to MongoDB AtlasMongoDB
 
Automating secure server baselines with Chef
Automating secure server baselines with ChefAutomating secure server baselines with Chef
Automating secure server baselines with ChefChef Software, Inc.
 

Semelhante a CloudStack European User Group - controlCircle (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely Webinar: Cloud Data Masking - Tips to Test Software Securely
Webinar: Cloud Data Masking - Tips to Test Software Securely
 
Představení Oracle SPARC Miniclusteru
Představení Oracle SPARC MiniclusteruPředstavení Oracle SPARC Miniclusteru
Představení Oracle SPARC Miniclusteru
 
MySQL Manchester TT - MySQL Enterprise Edition
MySQL Manchester TT - MySQL Enterprise EditionMySQL Manchester TT - MySQL Enterprise Edition
MySQL Manchester TT - MySQL Enterprise Edition
 
The Changing Role of a DBA in an Autonomous World
The Changing Role of a DBA in an Autonomous WorldThe Changing Role of a DBA in an Autonomous World
The Changing Role of a DBA in an Autonomous World
 
Oracle NoSQL
Oracle NoSQLOracle NoSQL
Oracle NoSQL
 
Modern Data Security with MySQL
Modern Data Security with MySQLModern Data Security with MySQL
Modern Data Security with MySQL
 
Best Practices for Building an Enterprise SOA Infrastructure on Oracle SOA Suite
Best Practices for Building an Enterprise SOA Infrastructure on Oracle SOA SuiteBest Practices for Building an Enterprise SOA Infrastructure on Oracle SOA Suite
Best Practices for Building an Enterprise SOA Infrastructure on Oracle SOA Suite
 
Oracle database in cloud, dr in cloud and overview of oracle database 18c
Oracle database in cloud, dr in cloud and overview of oracle database 18cOracle database in cloud, dr in cloud and overview of oracle database 18c
Oracle database in cloud, dr in cloud and overview of oracle database 18c
 
Database as a Service, Collaborate 2016
Database as a Service, Collaborate 2016Database as a Service, Collaborate 2016
Database as a Service, Collaborate 2016
 
Nobl9+solarwinds SLOs are a Must-Have for SREs & Cloud-Native Services.pptx
Nobl9+solarwinds SLOs are a Must-Have for SREs & Cloud-Native Services.pptxNobl9+solarwinds SLOs are a Must-Have for SREs & Cloud-Native Services.pptx
Nobl9+solarwinds SLOs are a Must-Have for SREs & Cloud-Native Services.pptx
 
Cloud based database
Cloud based databaseCloud based database
Cloud based database
 
MySQL Enterprise Edition Overview
MySQL Enterprise Edition OverviewMySQL Enterprise Edition Overview
MySQL Enterprise Edition Overview
 
Advanced Monitoring for Amazon RDS - AWS 4D Event Manchester 16th June 2023
Advanced Monitoring for Amazon RDS - AWS 4D Event Manchester 16th June 2023Advanced Monitoring for Amazon RDS - AWS 4D Event Manchester 16th June 2023
Advanced Monitoring for Amazon RDS - AWS 4D Event Manchester 16th June 2023
 
SDC SR2 2013 - RCP Software Delivery
SDC SR2 2013 - RCP Software Delivery SDC SR2 2013 - RCP Software Delivery
SDC SR2 2013 - RCP Software Delivery
 
The great 8 of ODA
The great 8 of ODAThe great 8 of ODA
The great 8 of ODA
 
OOW-TBE-12c-CON7307-Sharable
OOW-TBE-12c-CON7307-SharableOOW-TBE-12c-CON7307-Sharable
OOW-TBE-12c-CON7307-Sharable
 
Life Outside of TFS
Life Outside of TFSLife Outside of TFS
Life Outside of TFS
 
MongoDB World 2019: Why NBCUniversal Migrated to MongoDB Atlas
MongoDB World 2019: Why NBCUniversal Migrated to MongoDB AtlasMongoDB World 2019: Why NBCUniversal Migrated to MongoDB Atlas
MongoDB World 2019: Why NBCUniversal Migrated to MongoDB Atlas
 
Automating secure server baselines with Chef
Automating secure server baselines with ChefAutomating secure server baselines with Chef
Automating secure server baselines with Chef
 

Mais de ShapeBlue

CloudStack Authentication Methods – Harikrishna Patnala, ShapeBlue
CloudStack Authentication Methods – Harikrishna Patnala, ShapeBlueCloudStack Authentication Methods – Harikrishna Patnala, ShapeBlue
CloudStack Authentication Methods – Harikrishna Patnala, ShapeBlueShapeBlue
 
CloudStack Tooling Ecosystem – Kiran Chavala, ShapeBlue
CloudStack Tooling Ecosystem – Kiran Chavala, ShapeBlueCloudStack Tooling Ecosystem – Kiran Chavala, ShapeBlue
CloudStack Tooling Ecosystem – Kiran Chavala, ShapeBlueShapeBlue
 
Elevating Cloud Infrastructure with Object Storage, DRS, VM Scheduling, and D...
Elevating Cloud Infrastructure with Object Storage, DRS, VM Scheduling, and D...Elevating Cloud Infrastructure with Object Storage, DRS, VM Scheduling, and D...
Elevating Cloud Infrastructure with Object Storage, DRS, VM Scheduling, and D...ShapeBlue
 
VM Migration from VMware to CloudStack and KVM – Suresh Anaparti, ShapeBlue
VM Migration from VMware to CloudStack and KVM – Suresh Anaparti, ShapeBlueVM Migration from VMware to CloudStack and KVM – Suresh Anaparti, ShapeBlue
VM Migration from VMware to CloudStack and KVM – Suresh Anaparti, ShapeBlueShapeBlue
 
How We Grew Up with CloudStack and its Journey – Dilip Singh, DataHub
How We Grew Up with CloudStack and its Journey – Dilip Singh, DataHubHow We Grew Up with CloudStack and its Journey – Dilip Singh, DataHub
How We Grew Up with CloudStack and its Journey – Dilip Singh, DataHubShapeBlue
 
What’s New in CloudStack 4.19, Abhishek Kumar, Release Manager Apache CloudSt...
What’s New in CloudStack 4.19, Abhishek Kumar, Release Manager Apache CloudSt...What’s New in CloudStack 4.19, Abhishek Kumar, Release Manager Apache CloudSt...
What’s New in CloudStack 4.19, Abhishek Kumar, Release Manager Apache CloudSt...ShapeBlue
 
CloudStack 101: The Best Way to Build Your Private Cloud – Rohit Yadav, VP Ap...
CloudStack 101: The Best Way to Build Your Private Cloud – Rohit Yadav, VP Ap...CloudStack 101: The Best Way to Build Your Private Cloud – Rohit Yadav, VP Ap...
CloudStack 101: The Best Way to Build Your Private Cloud – Rohit Yadav, VP Ap...ShapeBlue
 
How We Use CloudStack to Provide Managed Hosting - Swen Brüseke - proIO
How We Use CloudStack to Provide Managed Hosting - Swen Brüseke - proIOHow We Use CloudStack to Provide Managed Hosting - Swen Brüseke - proIO
How We Use CloudStack to Provide Managed Hosting - Swen Brüseke - proIOShapeBlue
 
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...ShapeBlue
 
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...ShapeBlue
 
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
 
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...ShapeBlue
 
Use Existing Assets to Build a Powerful In-house Cloud Solution - Magali Perv...
Use Existing Assets to Build a Powerful In-house Cloud Solution - Magali Perv...Use Existing Assets to Build a Powerful In-house Cloud Solution - Magali Perv...
Use Existing Assets to Build a Powerful In-house Cloud Solution - Magali Perv...ShapeBlue
 
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...ShapeBlue
 
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...ShapeBlue
 
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...ShapeBlue
 
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueShapeBlue
 
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...ShapeBlue
 
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...ShapeBlue
 
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
 

Mais de ShapeBlue (20)

CloudStack Authentication Methods – Harikrishna Patnala, ShapeBlue
CloudStack Authentication Methods – Harikrishna Patnala, ShapeBlueCloudStack Authentication Methods – Harikrishna Patnala, ShapeBlue
CloudStack Authentication Methods – Harikrishna Patnala, ShapeBlue
 
CloudStack Tooling Ecosystem – Kiran Chavala, ShapeBlue
CloudStack Tooling Ecosystem – Kiran Chavala, ShapeBlueCloudStack Tooling Ecosystem – Kiran Chavala, ShapeBlue
CloudStack Tooling Ecosystem – Kiran Chavala, ShapeBlue
 
Elevating Cloud Infrastructure with Object Storage, DRS, VM Scheduling, and D...
Elevating Cloud Infrastructure with Object Storage, DRS, VM Scheduling, and D...Elevating Cloud Infrastructure with Object Storage, DRS, VM Scheduling, and D...
Elevating Cloud Infrastructure with Object Storage, DRS, VM Scheduling, and D...
 
VM Migration from VMware to CloudStack and KVM – Suresh Anaparti, ShapeBlue
VM Migration from VMware to CloudStack and KVM – Suresh Anaparti, ShapeBlueVM Migration from VMware to CloudStack and KVM – Suresh Anaparti, ShapeBlue
VM Migration from VMware to CloudStack and KVM – Suresh Anaparti, ShapeBlue
 
How We Grew Up with CloudStack and its Journey – Dilip Singh, DataHub
How We Grew Up with CloudStack and its Journey – Dilip Singh, DataHubHow We Grew Up with CloudStack and its Journey – Dilip Singh, DataHub
How We Grew Up with CloudStack and its Journey – Dilip Singh, DataHub
 
What’s New in CloudStack 4.19, Abhishek Kumar, Release Manager Apache CloudSt...
What’s New in CloudStack 4.19, Abhishek Kumar, Release Manager Apache CloudSt...What’s New in CloudStack 4.19, Abhishek Kumar, Release Manager Apache CloudSt...
What’s New in CloudStack 4.19, Abhishek Kumar, Release Manager Apache CloudSt...
 
CloudStack 101: The Best Way to Build Your Private Cloud – Rohit Yadav, VP Ap...
CloudStack 101: The Best Way to Build Your Private Cloud – Rohit Yadav, VP Ap...CloudStack 101: The Best Way to Build Your Private Cloud – Rohit Yadav, VP Ap...
CloudStack 101: The Best Way to Build Your Private Cloud – Rohit Yadav, VP Ap...
 
How We Use CloudStack to Provide Managed Hosting - Swen Brüseke - proIO
How We Use CloudStack to Provide Managed Hosting - Swen Brüseke - proIOHow We Use CloudStack to Provide Managed Hosting - Swen Brüseke - proIO
How We Use CloudStack to Provide Managed Hosting - Swen Brüseke - proIO
 
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
 
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
 
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
 
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
 
Use Existing Assets to Build a Powerful In-house Cloud Solution - Magali Perv...
Use Existing Assets to Build a Powerful In-house Cloud Solution - Magali Perv...Use Existing Assets to Build a Powerful In-house Cloud Solution - Magali Perv...
Use Existing Assets to Build a Powerful In-house Cloud Solution - Magali Perv...
 
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
 
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
DRaaS using Snapshot copy and destination selection (DRaaS) - Alexandre Matti...
 
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
 
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
 
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
 
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
 
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
 

Último

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Último (20)

TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

CloudStack European User Group - controlCircle

  • 1. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential Len Bellemore – Cloud Product Development 4th July 2013 Securing the CloudStack Management Domain
  • 2. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential Agenda • Who are ControlCircle • The design goals • Network design • Challenges faced • Example use case testing • How did we trouble shoot • Lessons learned
  • 3. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential • Our focus is delivering mission critical IT services that are of strategic importance to our customers - underpinning their business growth and competitiveness • We specialize in hybrid capabilities – from colocation to cloud - aligning our customers’ requirements to the right solution and ensuring they maintain full visibility and control through our Max3000™ monitoring and management platform Introduction to ControlCircle
  • 4. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential Design Goals • Security – Security in depth, not just at the edge – Containment of any attack – Identification of any attack • Traffic Segmentation – Reduce size of broadcast domains – Use of high capacity links for storage • Scale – Easy addition of physical sites/locations – Distribute the controller servers across multiple sites
  • 5. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential CloudStack Network Design Standard design • Single management network – CS Management Servers – CS MySQL DB – Hypervisors – SSVM – Console Proxy • Guest • Public • Storage – NFS/iSCSI Device What we designed • DMZ – Load Balancers – Web Servers – Internet Proxy • Control – CS Management Servers – vCenter – Windows Domain Controllers – DNS Servers (non- Guest) • Management – Hypervisors – SSVM, Console Proxy • Guest • Public • Database – CS MySQL DB • Storage – NFS/iSCSI Devices
  • 6. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential High Level Network Diagram Zone 1 Guest VMs Guest Virtual Routers Public 1 Secondary Primary Storage 1 CS Management vCenterDNS ProxyWeb Servers Guest VM Hosts Management 1 SSVM Console Proxy MySQL Guest 1 DMZ Control Database Control VM Hosts Control Segment 1 Zone 2 Guest VMs Guest Virtual Routers Public 2 Secondary Primary Storage 2 CS Management vCenterDNS ProxyWeb Servers Guest VM Hosts Management 2 SSVM Console Proxy MySQL Guest 2 DMZ Control Database Control VM Hosts Control Segment 2 Load Balancers Load Balancers Control Segment traffic is routed between physical sites
  • 7. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential Challenges we faced • Traffic flows difficult to ascertain • Logging detailed but ambiguous • Documentation scattered across internet • CloudStack documents only cover the standard single management network design • Testing had to be use case led – what are the use cases?
  • 8. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential Example use case ISO Upload • Copy ISO to a Web Server • Register ISO and input URL to ISO • SSVM Downloads ISO • SSVM copies ISO to Secondary Storage • Finished!
  • 9. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential ISO Upload Test outcome • Copy ISO to a Web Server • Register ISO and input URL to ISO • GUI error • CS Management Server log file reports name resolution failure • Troubleshooting is focused on CS Mgmt Server, no luck • Proxy? DNS Servers? Firewall Rules? • Confusion….. • http://www.cloudstack-china.org/wp-content/uploads/downloads/2012/12/ccc- cloudstacknetworking.pptx
  • 10. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential
  • 11. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential ISO Upload Final resolution • Focus back to SSVM • Realised that DNS was not resolving. Why? • Open firewall rules for DNS to correct IP • Retry ISO Upload • Presto!
  • 12. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential How did we Troubleshoot? • CS Management Server Logs • SSVM Logs • Firewall Logs • Work closely with the Network team • users@cloudstack.apache.org mailing list
  • 13. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential Lessons Learned Debugging and fault finding • There is no set way of doing things in CloudStack world • Official installation guides are written for simple networks • Documentation is scattered, blogs and unofficial sites are the best source of info • Logging is your friend, albeit a troubled one! • The community is your best troubleshooting tool Designing the solution • Consider agility when designing your network • Firewall rules based on single IP’s is not achievable – you need host and object groups • Understand the use cases prior to testing • Document firewall rules before you start building based on use cases • Document as you go
  • 14. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential Documentation and Resources • http://www.slideshare.net/cloudstack/ • http://www.shapeblue.com/ • http://www.buildacloud.org/ • http://markmail.org/ • http://cloudstack.apache.org/ • http://support.citrix.com/ • http://support.citrix.com/servlet/KbServlet/download/2389- 102-654859/CitrixPorts_by_Port_1103.pdf
  • 15. © Copyright ControlCircle 2013. All rights reserved. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the UK and other countries. ControlCircle products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of ControlCircle in the United States and in other countries. Confidential Any Questions ?