red hat ceph storage 4people.redhat.com/mskinner/rhug/q1.2020/rhcs4-the_story_continues.pdf · at...

21
CONFIDENTIAL Designator 1 Red Hat Ceph Storage 4 The Story Continues Red Hat Ceph Storage 4 The Story Continues Shawn Houston Cloud Storage Solutions Architect

Upload: others

Post on 29-May-2020

13 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL Designator

1

Red Hat Ceph Storage 4

The Story Continues

Red Hat Ceph Storage 4The Story ContinuesShawn HoustonCloud Storage Solutions Architect

Page 2: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL Designator

Red Hat Ceph Storage

Red Hat Ceph Storage 4

2

The Story Continues

Page 3: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph StorageThe Good Stuff Remains

3

Red Hat Ceph Storage 4

Page 4: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Ceph Core Features

Red Hat Ceph Storage 4

4

● Containerized

deployment to reduce

hardware requirements

● Erasure coding for

reduced footprint

● Thin provisioning

● In-line compression

● Snapshots, cloning and

CoW

Efficiency

● Integrated monitoring

dashboard

● Ansible automation

● Full CLI interface

Manageability

● BlueStore backend

● First to be able to handle

one billion objects

● Beast.ASIO front-end

Performance

● At rest and end-to-end

encryption

● Pool-level authentication

● Active directory, LDAP

and Keystone v3

● At-rest encryption—keys

held on separate hosts

● Security guide

Security

● S3, Swift and Apache

Hadoop S3A

● OpenStack Cinder,

Glance and Manila

● NFS v3 and v4

● iSCSI

● Librados

APIs and protocols

The Story Continues

Page 5: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Why Red Hat for your Ceph storage needs

Red Hat Ceph Storage 4

5

The Story Continues

Red Hat is a leader and trusted

advisor in the open source

space. We help advocate your

needs and identify emerging

technologies.

Years of experience helping

top brands revolutionize their

storage, backed by an

extensive portfolio of

partners.

Proven track record Open source advocate

Access to ongoing support

and expertise including

best-practice documentation

and security information.

Ongoing support

With a Red Hat subscription

you get access to automation,

management and integration

benefits from the entire Red

Hat portfolio.

Comprehensive portfolio

Page 6: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Worker

Compute

Storage

Worker

Compute

Storage

Hadoop Cluster 3

Worker

Compute

Storage

Worker

Compute

Storage

Worker

Compute

Storage

Hadoop Cluster 2

Worker

Compute

Storage

Red Hat Ceph Storage 4

6

The Story Continues

Object storage—Red Hat data analytics infrastructureMulti-tenant workload isolation with shared data context

Worker

Compute

Storage

Worker

Compute

Storage

Cluster 1

Worker

Compute

Storage

Bare-metal RHEL

S3A/S3S3AS3A

Page 7: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Object storage as a service

Red Hat Ceph Storage 4

7

User

Ceph object gateway

User

Ceph object gateway

Storage clusterUS-East

Storage clusterUS-West

Multi-site active-active clusters w/ single namespace

NFS gateway for bulk import and export of object data

RGW, Ceph’s object storage interface

Capable of handling audio, visual and any other documentation

The Story Continues

Page 8: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Complete and unified storage for OpenStack

Red Hat Ceph Storage 4

8

Red Hat Ceph Storage

OpenStack

Keystone API Swift API Glance API Nova API

Hypervisor (LibRBD)Ceph object gateway

Manila API

CephFS

Cinder API

The Story Continues

Page 9: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph Storage 4

Object storage: Data backup infrastructure

9

Partner certifications for S3/cloud backup

The Story Continues

Page 10: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph StorageThe New Feature Laundry List

10

Red Hat Ceph Storage 4

Page 11: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph Storage 4

11

The Story Continues

Scalable:You need to store more and improve performance while getting value for money

Simple:You want to keep the admin burden down, be able to delegate tasks and enable self-service

Secure:You need to not just secure your data from cyberattacks, but also manage data protection and resiliency

Red Hat Ceph Storage 4 delivers:● Smaller starting point—from just 3 nodes

● Scalable to exabytes plus billions of

objects

● Increased performance

● Easier installation

● Better monitoring and management

● Improved automation

● More granular permissions and delegation

● Protection against hardware failure

● Improved encryption

Page 12: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Worker

Compute

Storage

Worker

Compute

Storage

Hadoop Cluster 3

Worker

Compute

Storage

Worker

Compute

Storage

Worker

Compute

Storage

Hadoop Cluster 2

Worker

Compute

Storage

Red Hat Ceph Storage 4

12

The Story Continues

Object storage—Red Hat data analytics infrastructureBetter out-of-the-box Multi-tenant workload isolation with shared data context

Worker

Compute

Storage

Worker

Compute

Storage

Cluster 1

Worker

Compute

Storage

Bare-metal RHEL

S3A/S3S3AS3A

Page 13: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph StorageWhat I came here to talk about

13

Red Hat Ceph Storage 4

Page 14: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph StorageManagement

14

Red Hat Ceph Storage 4

Page 15: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph Storage 4

15

The Story Continues

Management1. Installation

2. Configuration

3. Monitoring

4. Expansion*

5. Delegation

* Expansion is still CLI driven

Page 16: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Installation is easier than ever

Red Hat Ceph Storage 4

16

Even I can do it

The Story Continues

● New wizard to guide you through the process

● Minimal Ceph experience required● Can be started in less than 5 minutes

Page 17: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

New dashboard

Red Hat Ceph Storage 4

17

For better monitoring and management

The Story Continues

● New monitoring functionality● Helps improve useability● Operators can delegate junior

administrators with replacement of failed drives, users, and quota management through RBAC system

Page 18: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

More granular permissions

Red Hat Ceph Storage 4

18

For greater efficiency while maintaining control

The Story Continues

● Power users can delegate tasks to junior administrators or developers

● This will give them the confidence to do what they need to do and you the reassurance that they won’t do things they shouldn’t be doing

● Monitoring interface pinpoints IOPS, throughput and latency outliers to preemptively identify issues

Page 19: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph Storage 4

New Dashboard

19

Feature Overview

The Story Continues

● Multi-User and Role Management: The dashboard supports multiple user accounts with different permissions

(roles). The user accounts and roles can be modified on both the command line and via the WebUI.

● Single Sign-On (SSO): the dashboard supports authentication via an external identity provider using the SAML

2.0 protocol.

● SSL/TLS support: All HTTP communication between the web browser and the dashboard is secured via SSL. A

self-signed certificate can be created with a built-in command, but it’s also possible to import custom certificates

signed and issued by a CA.

● Auditing: the dashboard backend can be configured to log all PUT, POST and DELETE API requests in the Ceph

audit log.

● Internationalization (I18N): the dashboard can be used in different languages that can be selected at run-time.

Page 20: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

Red Hat Ceph Storage 4

New Dashboard

20

Management Features

The Story Continues

● Embedded Grafana Dashboards

● Cluster logs

● Performance counters

● Monitors

● Configuration Editor

● Pools

● OSDs

● iSCSI

● RBD

● RBD mirroring

● CephFS

● Object Gateway

● NFS

● Ceph Manager Modules

Page 21: Red Hat Ceph Storage 4people.redhat.com/mskinner/rhug/q1.2020/RHCS4-The_Story_Continues.pdf · At rest and end-to-end encryption Pool-level authentication Active directory, LDAP and

CONFIDENTIAL designator

V0000000

linkedin.com/company/red-hat

youtube.com/user/RedHatVideos

facebook.com/redhatinc

twitter.com/RedHat

Red Hat is the world’s leading provider of enterprise

open source software solutions. Award-winning

support, training, and consulting services make

Red Hat a trusted adviser to the Fortune 500.

Thank you

21