+ All Categories
Home > Technology > Desktop Virtualization with RHEV

Desktop Virtualization with RHEV

Date post: 02-Jul-2015
Category:
Upload: kangaroot
View: 472 times
Download: 2 times
Share this document with a friend
Description:
RHEV is Red Hats virtualization platform based on the KVM hypervisor. In this talk, Bart Janssens will focus on using RHEV as a platform for on-demand provisioning of desktops, providing a migration path for companies moving away from the traditional desktop environment.
28
Transcript
Page 1: Desktop Virtualization with RHEV
Page 2: Desktop Virtualization with RHEV

DESKTOP VIRTUALIZATION WITH RHEV

Page 3: Desktop Virtualization with RHEV

Bart Janssens

37 years old

Live in Antwerp

Work at Kangaroot

→ Linux & Open Source Solutions

WHO AM I

Page 4: Desktop Virtualization with RHEV

What and why

Introducing RHEV

Desktop Virtualization

User and Permission Management

AGENDA

Page 5: Desktop Virtualization with RHEV

WHAT AND WHY

Page 6: Desktop Virtualization with RHEV

Desktop Virtualization using Red Hat Enterprise

Virtualization as a platform for on-demand

provisioning of desktops

WHAT

Page 7: Desktop Virtualization with RHEV

Traditional desktop is losing importance

On demand services & Platform independent

Flexible workplace

Central management

Easy upgrade path

WHY

Page 8: Desktop Virtualization with RHEV

workspaces that have a large amount of typical office desktop users:

office

mail

web-based apps

schools

migrating off Windows XP

FOR WHO

Page 9: Desktop Virtualization with RHEV

What solutions do we have available for desktop virtualization?

VMware Horizon

Citrix XenDesktop

linux

oVirt

Red Hat Enterprise Virtualization

OPTIONS

Page 10: Desktop Virtualization with RHEV

Open Source

No Vendor lock-in

Easy expansion

Red Hat Support

Easy to use interface

User Portal

Powerful permission managment

SPICE

Cost

WHY RHEV?

Page 11: Desktop Virtualization with RHEV

INTRODUCING RHEV

Page 12: Desktop Virtualization with RHEV

Red Hat Enterprise Virtualization consists of:

One RHEV manager machine

One or more Virtualization hosts

RHEV Hypervisor image

RHEL + rhev

RHEV

Page 13: Desktop Virtualization with RHEV

A CLOSER LOOK

Page 14: Desktop Virtualization with RHEV

Heart of RHEV

centralized management platform

registers & controls the state and events

view, manage and provision resources

graphical interface

cli shell

THE RHEV MANAGER

Page 15: Desktop Virtualization with RHEV

GRAPHICAL INTERFACE

Page 16: Desktop Virtualization with RHEV

A Data Center contains

Clusters contain

Hosts

Logical Networks

Storage Pools

LOGICAL RESOURCES

Page 17: Desktop Virtualization with RHEV

DESKTOP VIRTUALIZATION

Page 18: Desktop Virtualization with RHEV

CREATE A VM

Page 19: Desktop Virtualization with RHEV

SPICE

Simple Protocol for Independent Computing Environments allows:

video at more than 30 frames per second

bidirectional audio (for softphones/IP phones)

bidirectional video (for video telephony/video conferencing)

connection to multiple monitors with a single virtual machine

USB redirection from the client's USB port into the virtual machine

Page 20: Desktop Virtualization with RHEV

Templatescreate read-only copy of the vms disk

this base disk image is shared by the template and every vm created from it

VM TEMPLATES AND POOLS

Poolscontain multiple virtual machines based on a common template

provide generic virtual machines to end users on demand

set a number of prestarted vms

Page 21: Desktop Virtualization with RHEV

USER AND PERMISSION MANAGEMENT

Page 22: Desktop Virtualization with RHEV

Let's put those vms to use

there is only one internal user: admin

other users and groups are added from directory services:

Active Directory

Identity Management (IdM)

Red Hat Directory Server 9 (RHDS 9)

OpenLDAP

ADD USERS

Page 23: Desktop Virtualization with RHEV

USER MANAGEMENT

Page 24: Desktop Virtualization with RHEV

RHEV applies authorization controls based on the combination of the three components:

The user performing the action

The type of action being performed

The object on which the action is being performed

PERMISSIONS

Page 25: Desktop Virtualization with RHEV

Permissions are inherited by objects

lower on the hierarchy

PERMISSION HIERARCHY

Permissions can be grouped in

roles

Page 26: Desktop Virtualization with RHEV

USER PORTAL

Page 27: Desktop Virtualization with RHEV

POWER USER PORTAL

Page 28: Desktop Virtualization with RHEV

THANK YOU


Recommended