Nutanix announces all flash model and NOS 4.1 with Metro Availability

Nutanix made two new announcements today: 

  • a new hardware model: NX-9240 with only flash capacity. No spinning disks 
  • release of Nutanix OS 4.1 with Metro Availabiliy 

 

The NX-9240 is the first All Flash appliance of Nutanix. It has a raw Flash storage of 20 TB.

The main purpose of the NX-9240 is running Tier 1 applications like Oracle and SQL Server

Unlike the other models of Nutanix which can be mixed, the NX-9240 cannot be member of a cluster having non NX-9240 members.

The NX-9240  all-flash hyper-converged system is available today with list prices beginning at $110,000 per node.

The Nutanix press release is here.

Nutanix also announced the release of Nutanix Operating System (NOS) 4.1

New features in 4.1 are:

  • Metro Availability
  • Cloud connect
  • On-click hypervisor upgrade
  • Microsoft System Center integration
  • Data at rest encryption
  • SMI-S support for System Center

 

Metro Availability enables Nutanix clusters to stretch over two sites. The functionality is very similar to for example NetApp MetroCluster or EMC VPLEX.

Metro Availability allows for a seamless failover of virtual machines when the Nutanix cluster of complete site is unavailable. The solution has a Recovery Point Objective of zero (0). The recovery time objective is very low. In case of a unplanned failover the time to recovet will basically be the time required to boot the virtual machines.

Metro availability is very simply to setup unlike other solutions. It requires a latency of 5 ms and a fiber network. This limits distance between two sites to something like 100-150 km.

Mixing models in both sites is supported.

Metro Availability will be part of the Ultimate software edition. The primary site and the secondary site will need to have Ultimate license.

Details in this Nutanix blog.

Cloud Connect was announced in August. It will create a hybrid cloud infrastructure with many future features. In NOS 4.1 cloud connect is still limited to storing backup data in the public cloud. Initially Amazon Web Services is supported. Azure and Google Compute are on the roadmap.

Other future use cases are disaster recovery and cloud bursting.

http://www.nutanix.com/blog/2014/08/19/announcing-nutanix-cloud-connect/

 

One click hypervisor upgrade allows for a simple upgrade of any Nutanix supported hypervisor: ESXi, Hyper-V and KVM.

System Center integration enables Virtual Machine Manager and Operation Manager to detect Nutanix nodes and report on performance and health.

Data at rest encryption enables self encrypting of drives. Initially this feature is supported on the 3000 and 6000 series. This is a often requested feature in finance, healthcare and government environments.

More information here 

Nutanix 4.1 Features Overview (Beyond Marketing) – Part 1

Nutanix 4.1 Features Overview (Beyond Marketing) – Part 2

Nutanix 4.1 Features Overview (Beyond Marketing) – Part 3

VMware Mirage 5.1 released

At September 16 VMware released VMware Mirage 5.1 

Mirage enables central image management of physical desktops and laptops. It supports VMware View as well. It will be interesting what happens to VDI image management now VMware acquired CloudVolumes and is working on Project Fargo.

Mirage uses layering. It disconnects drivers, applications, device and user profiles from the operating system.

The advantage from a management perspective is the ability to have local, offline execution of applications with central management.

What’s New in Mirage 5.1?

Mirage 5.1 introduces more than 20 new features, enabling you to extend the management of remote and mobile-user devices. Included are the following new features and improvements:

  • IT managers can control the Mirage clients’ bandwidth consumption from the Mirage Management console. You can limit bandwidth by subnet or by Active Directory site.
  • Mirage now has an API that currently supports centralization and OS migration use cases. You can use the API to integrate Mirage with third-party systems, such as ticketing or help desk applications. Partners and customers can access and integrate with Mirage data and services.
  • You can now install and configure the Mirage Gateway server by using a self-installed Web configuration portal.
  • IT managers can generate a variety of reports from the Mirage Web Manager console. The reports provide analytics for Mirage operations. You can generate reports on demand, or save report parameters as a template and generate the report according to a specified schedule.
  • You can provision a device with a base layer and app layers using a single wizard.
  • Mirage now includes the VMware Customer Experience Improvement Program (CEIP). When you join CEIP, the CEIP tool collects technical data from the Mirage database and log files, and sends the data to VMware on a daily basis. Before the data is sent to VMware, it is made anonymous and is encrypted in your systems or servers.
  • You can now protect all fixed drives by using the Mirage upload policy.

The release notes are here

More information on Mirage here.

Download here.

VMware NSX for vSphere 6.1 released

At September 11 VMware released NSX for vSphere 6.1

Release notes are here 

Download here . This is not a public download. Only user accouts on myvmware.com  entitled for download of NSX for vSphere will actually be able to download the bits.

Some more info on Network Inferno & Vladan Seget his website

What is new

NSX vSphere 6.1 includes multiple new features as well as operations, consumption, and hardening enhancements.

  • Highly available NSX Edge clusters with faster uplink speeds
    Equal Cost Multi-Path (ECMP)
    NSX enables you to create highly available and distributed NSX Edge clusters, provides high-bandwidth uplink connection to physical networks, and also ensures active-active redundancy at network virtualization edge – all in software. ECMP on NSX Edge allows up to 80 GBps of aggregate North-South bandwidth and enables a scaleout edge.
  • Enhanced micro-segmentation and firewall operations
    NSX 6.1 improves micro-segmentation capabilities by providing improved provisioning, troubleshooting, and monitoring with NSX Distributed and Edge Firewalls. There is a new unified interface for configuring both Distributed and Edge firewalls. Integration of NSX with vCAC 6.1 allows for security automation workflows to be integrated with compute automation. In addition, NSX 6.1 enables traffic redirection to network and security partner products like Next Generation Firewalls and Intrusion Prevention Services.
  • Connect multiple data centers or offer hybrid cloud services in Software Defined Datacenter (SDDC)
    Layer 2 VPN on NSX Edge
    With Layer 2 VPN, enterprises can migrate workloads, consolidate datacenters, or create stretched application tiers across multiple datacenters. Service providers can offer tenant on-boarding and cloud bursting services where tenant application networks are preserved across datacenters without the need for NSX on customer premises.
  • Unified IP Address management across entire data center
    DHCP Relay With DHCP Relay, you can integrate existing DHCP services available in physical data centers into SDDC. This ensuring a consistent IP addressing policy and easy IP management across the entire data center. NSX vSphere 6.1 supports multiple DHCP servers on a single logical router and allows multiple existing DHCP servers to be integrated.
  • NSX Load Balancer Enhancement
    To allow the load balancing and high availability of more applications hosted in NSX, UDP and FTP load balancing is now available on NSX. This allows the load balancing of applications such as syslog, NTP, DNS.
  • Protect Application Delivery Controller (ADC) investments and seamlessly leverage them in SDDC
    Tight integrations with partners to enable ADCaaS
    NSX 6.1 allows customers using NSX partner ADCs to protect their investment and leverage advanced ADC services from best-of-breed vendors. This out-of-the-box solution brings operational simplicity, integrated workflows, auto deployment of resources, and a central pane for troubleshooting and monitoring both virtual and physical ADCs.
  • Advanced host or network security services within SDDC
    Enhanced partner integration with Service Composer supports multiple security services including suite solutions that comprise host versus network based services in a single policy.
  • Dynamic and secure self-service in SDDC
    NSX 6.1 with vCloud Automation Center ® helps you optimize resource utilization and scale by dynamically connecting self-service applications to NSX logical networks while ensuring that infrastructure security policies are automatically applied to isolate and protect the applications.
    Refer to the VMware vCloud Automation Center Release Notes for feature list.