Scotland's Digital Future: Scottish Public Sector Data Centre Virtualisation Guidance
Guidance and principles on virtualisation. Explains how virtualisation fits with wider strategic principles of moving to cloud computing. Explains what virtualisation is, how it works, types of virtualisation and the benefits. Includes case studies in
Virtualisation considerations
What and when to virtualise a service or application is not a simple answer and will depend as much on the environment it is being used in as the service itself.
A good example of this is SQL which VMware have advised on being virtualised for a number of years and although Microsoft supports SQL in a virtual environment they are considerably more caution when it comes to actually recommending it be virtualised.
The table below gives some advice on what should be virtualised on your journey through virtualisation on the way to the "Cloud".
Ease of Virtualisation | ||
---|---|---|
Easy | Will require additional work | Stay Physical for now at least |
DNS | Exchange | Oracle (3) |
DHCP | SQL (2) | Backup Media servers |
Active Directory Domain server (1) | Servers in DMZ (5) | Servers with dongles |
Management server ( e.g. System Centre) | Legacy App servers | Dynamics |
Monitoring servers | IBM software Applications (4) | |
Cisco management servers | Any servers not running X86 chipset will require specialist hypervisor | |
Web Servers | Video streaming | |
File and print services |
NB This list is by no means exhaustive and individual requirements maybe different
1. Active Directory servers can and should be virtualised, with the caveat of leaving one physical or at a minimum two DC's on different hosts. Microsoft Hyper-V actually provides a method of cloning DC's
2. SQL Will depend on size and profile of databases
3. Oracle can cost more unless virtualised on Oracle VM
4. IBM. A number of IBM back office products have a licensing model tied to physical CPU's and may be cost prohibitive when moving to a virtual environment
5. DMZ servers can be placed on hosts that also reside in the core network but use separate physical network connection. More of a concern is certain security models and certifications require total physical separation meaning dedicated hosts may be required in the DMZ.
Contact
There is a problem
Thanks for your feedback