I am a little worried that this blog is becoming a constant affirmation of Amazon and their Cloud services 😉 However it doesn’t seem that any other people are innovating like Amazon is. I am probably referring to Infrastructure as a Service (IaaS) vendors rather than the platform guys. With the announcement a couple of days ago of the ability to boot from EBS Amazon made another leap ahead.
This ability to boot from storage gives EC2 instances faster start up and also something that anyone who has used Amazon EC2 wanted – persistence. Now if you want to put a server on ice (elastically contract) you can without losing configuration related data and installed software. This is not much of an issue for open source guys as they have Chef, Capistrano and other ways to automate and maintain configurations. However when it comes to Windows servers on EC2 this is a godsend.
I have used Amazon EC2 for hosting production applications and one of the other requirements you get quite regularly is the requirement to vertically scale. Booting from EBS ensures that you can upgrade a server instance from a Small to Large (or other variations) without the requirement to rebuild from scratch. Again not a big deal for people with a great toolset (Linux/Rails) but again a point of pain for people using Windows.
The ability to boot from snapshots is also welcomed. This aids in configuration management by allowing a snap to be taken of the entire machine, a patch applied and then if not successful the machine can be rebooted from the snap.
Over at the Rightscale blog there were a couple of additional takes on what boot from EBS provides. For example the ability to mount an existing EBS volume on a configuration server and update software etc. In addition they spoke about powering off dev/test environments to pocket some additional cash when they weren’t required.
Either way it is a killer feature and much needed for customers running production systems on Amazon EC2.
I think everyone knew about it or suspected it but the ‘Azure VM Role’ was announced today at PDC. This functionality would allow you to run a full operating system instance and maintain administrative rights on the Azure platform. The scenario provided by Bob Muglia was that of choosing a base operating system instance, installing your software/other tools, snapshot the VM to a VHD and supply back to Azure to run on the fabric. I suspect this will be Windows only for quite a while but it will allow more complex/legacy applications to be hosted within Azure. Lastly as part of this full administrative access you would also be able to initiate a Terminal Services session (RDP) directly to the server.
Bob’s slide broke it down in 4 easy steps.
1. Select Base Window Server Image
2. Customize Virtual Machine Role
3. Snapshot Virtual Machine Image
4. Deploy Application and Target Your New VM Role.
In an earlier post I discussed why Amazon’s IPSEC support was important for Enterprises giving them the ability to treat the cloud provider as an elastic resource yet maintain security of data transfer.
At PDC today Bob Muglia (President of Server and Tools) discussed ‘Project Sydney’ as a way to bridge the gap between the cloud and on-premise equipment. In a demo he showed a web application running in Azure accessing a database that resided within the corporate network. He did state ‘IPSEC’ and in a further session at PDC Yousef Khalidi described that cloud components and on-premise servers exist in a virtual LAN that was secured.
From what I can see at this time it doesn’t sound like network-level IPSEC but rather server to server IPSEC however I could be proven wrong any time now. Regardless of the method it is a pretty powerful theme – allowing organisations to maintain some sensitive, high-performance or high security systems within their own Data Centres or hosting providers but still utilise Cloud providers.
This is also subtly different from the functionality Amazon released. The Amazon Virtual Private Cloud provides an IPSEC tunnel to a private instance of cloud servers that do not have public access. This meant you could use it to extend your data centre and host some components with Amazon BUT you couldn’t utilise this infrastructure for front-end Web services.
What Microsoft is delivering with Project Sydney much more focused on giving Web applications on Azure the ability to tunnel back to Data or other services located within the corporate network.
I will keep digging.
I spent the night on Google Reader catching up on things I haven’t read for awhile and I strayed on a couple of posts related to Private Clouds and elasticity/scalability. One article even discussed that private clouds can aid in reducing OPEX. Check them out here and here.
“Private Clouds provide many of the benefits of the Public Cloud, namely elastic scalability, faster time-to-market and reduced OpEX, all within the Enterprises own perimeter that complies to its governance.” (Source)
HUH? Elastic, scalable and I am saving money? That’s the train I want to get on.
Private clouds are exactly that, funded by a company as part of their normal CAPEX. Eucalyptus is awesome and gives you *potential* to be elastic and *potential* to scale. Expand and contract to your hearts content but when you’re out of raw materials your spending cash – plain and simple. How are they reducing OPEX? Remember that Eucalyptus can’t even run Windows which would still dominate the usage within most Enterprises. Maybe it was related to licensing? Again I can’t see many Enterprises shifting VMWare out and moving Eucalyptus in to reduce licensing – why wouldn’t they just automate KVM builds? At least then they get Windows VM’s.
This is why ‘Private Clouds’ is a dubious term and wreaks of vendors quickly remodelling to sell their same old wares.
Unless your using the ‘cloud’ to abstract the components sitting latent within your Enterprise then it exhibits nothing that is cloud. You can always check my previous post for a definition. What I mean is if you were using Eucalyptus to redeploy commodity hardware, or you put terabytes of SATA drives into old server stock and linked it into Eucalyptus’ S3 compatible storage service (Walrus) then it might be classed as private cloud – otherwise it’s just virtualization.
Abstracting the raw materials within your data centre and achieving some elasticity big task and Eucalyptus can help get you there. Then I suppose your ‘governance’ must be so rigid that you wouldn’t look to Amazon or Rackspace to fulfil your requirements.
Amazon has released their Virtual Private Clouds allowing people to extend their network and services to Amazon’s cloud services. Werner Vogels (Amazon’s CTO) describes VPC in his blog. The Virtual Private Cloud is particularly important because it opens the doors wide open for Enterprises to use cloud services. It gives them the ability to embrace cloud services without requiring the sophistication of abstracting their applications or re-writing them. Let me explain.
It seems the majority of people adopting Amazon’s services up until now have been web companies who saw Amazon’s Elastic, internet-facing infrastructure as a way to achieve scale without redundant internet connections, BGP, HA’d firewalls, load-balancers etc etc. It was internet-facing and this is exactly what they needed. However the Enterprise was left at the door. I believe even the most avant garde IT manager ruled Amazon out for a number of reasons.
- Enterprises have applications that run on private networks. They are not internet facing.
- Security is an issue and having a thin layer of firewall services is operating on the edge.
- Anyone can attack your decision to host Enterprise services in the cloud using the classic FUD.
- Integration of legacy systems or interaction with other Enterprise systems.
Amazon’s VPC addresses these concerns. No Longer are systems sitting on the internet they are sitting on a private network that can only be routed to and from the Enterprise network. Network access can be governed via corporate firewalls, visibility of networks can be governed via Enterprise routing policies. It reflects a paradigm that most IT managers already use for communication between primary and secondary data centres when WAN links fail – Internet VPNs.
You can now carve off some IP address space from your internal network, host it at Amazon and redistribute the route into your Enterprise network so Users and other IT systems can access, replicate, integrate etc. Impressive.
Amazon should have called VPC the ‘floodgate’ as it is now a real no-brainer for an Enterprise to start mass adoption of services from Amazon. I also predict that the early movers will be people replacing disaster recovery environments with DR environments hosted at Amazon. This would allow them to utilise their DR environment as a new production environment (to achieve greater scale) or reduce their operating costs.
Think of something as generic as file servers base on an Open Solaris ZFS file system. Snapshots can be created and replicated from the Enterprise to a system in located on a private network at Amazon. They no longer have to be encrypted and sent to a server located on the ‘public’ internet. They can be copied from a file server deep within the Enterprise to a network that no one has to know is located in the Cloud 😉
Welcome to the 1st post from the Cloud Pimps…
Initially I’d like to start by covering off what we’re all about… and that is T&T. Tits & Technology… yeah it may be a bit sexist, but that was our mantra over a decade ago… and while it still has some element of truth, we lean more towards the technology side these days.
Going back in time, the two of us created a very successful site (girl4ruste.com) about the former topic I mention above which has now gone by the wayside – if you’re interested to see our efforts, check it out via the waybackmachine, most of the links are probably broken now, but anyway — that was the past. This site will be about the later topic, but you might hear about both intermixed in our posts depending on our mood.
We aim to cover many topics, but we are primarily focussed on Cloud computing, Virtualisation and all those sticky grey matter areas in between.
If you’re keen to follow us, you can catch us both on twitter: @cloudpimps & @cloudjunky !
Like a rhino…..