If you live in the US, I hope you had a good 4th of July holiday last week. It’s already been over a week since a very exciting Cisco live! If you were there in person, or you caught much of it on video, I’m sure you know about the enthusiasm and excitement from an unexpectedly large number of attendees. Crowds in the World of Solutions were amazing, especially trying to learn about our new Cisco Dynamic Fabric Automation (DFA) technology, as well as the new enhancements in our Nexus 1000V virtual networking portfolio, like Citrix NetScaler 1000V.
While on the Nexus 1000V topic, I would like to point out a great blog write-up by the always insightful Jason Edelman, a Solution Architect at a national solution provider, on our Nexus 1000V InterCloud hybrid cloud solution. Nexus 1000V InterCloud received a great deal of interest and attention at Cisco live and may have been the busiest pod in our virtual networking area in the World of Solutions. The concept of hybrid cloud is really gaining traction and organizations appreciate the importance of now seamlessly extending virtual overlays from the on-premises data center to public cloud providers as Nexus 1000V InterCloud now enables. Nexus 1000V InterCloud began shipping last week, as well (with vPath and the Virtual Services Gateway coming soon), so the timing of all this interest couldn’t be better. To download the Nexus 1000V InterCloud GA image for evaluation, go here.
One of the aspects of InterCloud that we were talking about in more detail at Cisco live! was the internal security. The architecture supports complete encryption of all traffic not only between the enterprise or on-premises data center and the service provider cloud, but encrypts all data-in-motion within the provider cloud, to protect traffic from exposure to the service provider and other tenants. This encrypted tunnel includes all traffic going to the virtual services residing in the cloud. And this is on top of the security provided by the virtual services (when supported in InterCloud in Q4 CY 13), such as the virtual firewalls, VSG and ASA 1000V Cloud Firewall.
As you probably know, Cisco started shipping the Nexus 1000V virtual switch for Microsoft Hyper-V this month (and it won a Best of TechEd Show award at Microsoft’s TechEd conference). But open source virtualization and cloud infrastructure platforms continue to be an important strategy for our entire data center portfolio here at Cisco. KVM will be the next hypervisor that we’ll ship our Nexus 1000V virtual switch on, and the rest of the Red Hat open source cloud infrastructure will be an important part of our open strategy, and that includes Red Hat Linux and their Red Hat OpenStack distribution.
If you missed our webcast on the upcoming Nexus 1000V release for Microsoft Hyper-V, you missed the announcement that we are now making available a beta version to the general public, as of March 6. (Note: Everyone asks, so, no, we haven’t announced the availability date for the GA version yet, but it’s coming soon). This should be great news for the large number of folks that we had to turn away that we couldn’t support in our earlier alpha and high-touch beta releases.
In the webcast, Damian Flynn, a 2012 Microsoft MVP for Data Center and Cloud, and IT Architect for Lionbridge Technologies in Ireland, who was one of the early beta-testers for the Nexus 1000V Hyper-V version, gave an outstanding overview of the Nexus 1000V in a Hyper-V and System Center environment. It’s worth listening to the webcast replay if you have the time. Damian had some really exciting things to say about his experiences. The webcast was admirably co-hosted by our own Appaji Malla, product manager for Nexus 1000V for Hyper-V.
The new beta version is available to anyone with a valid email address, and who provide their company name and contact address. Beta users must be willing to test the product and provide constructive feedback. Beta users are also encouraged to participate in the discussion forums and contribute to the Nexus 1000V beta community site.
As described in this week’s webcast (download the slides here; or watch the replay here), the beta process starts with an email to: firstname.lastname@example.org. A link to a beta site will be sent in an email invitation (you must have a userID on Cisco.com to access this site). You will then be prompted to accept the beta agreement, and then get access to the beta code and documentation. Please use the available discussion forums for support, questions and feedback. Read More »
Understanding the true capacity of an application and how it responds under stress is always top of mind for ISV’s as they bring solutions to market. Recently at Microsoft’s Partner Solutions Center (MPSC) in Redmond we and our partners X-IO and Scalability Experts worked with ISV Riversand Technologies to provide the ‘hard proof’ that their SQL Server based retail application could scale to expected demands.
Comprised of UCS servers for compute, Windows Server and SQL Server for the Microsoft stack, and X-IO storage system components we worked with the technical staff of Scalability Experts and our aforementioned partners to execute a comprehensive benchmark test on the Riversand solution MDMCenter.
The joint benchmark test not only confirmed MDMCenter solutions capabilities, but additionally showcased its speed and scalability that exceeded all expectations of the aspects that the benchmark aimed to measure. Read the case study here and learn how Cisco UCS, working with our technology partners, can deliver high-end SQL Server performance.
The demonstration at Synergy showed the consistent deployment architecture for the Nexus 1000V distributed virtual switch, NX-OS feature-set, operational workflows, and port profile based provisioning of virtual Ethernet ports (vEths) via XenCenter. Two virtual workloads – Ubuntu server and Windows Client – were shown to interact with each other as in the diagram below.