OpenStack Swift is a highly available, distributed, eventually consistent object/blob store. Object Storage is ideal for cost effective, scale-out storage. It provides a fully distributed, API-accessible storage platform that can be integrated directly into applications or used for backup, archiving, and data retention. For more information please refer http://docs.openstack.org/developer/swift/.
Openstack* is a highly flexible open source virtualization management and orchestration software solution. Openstack* establishes virtual machine (VM) connectivity based on the many networking options supported by Neutron. Neutron abstracts Linux network configurations using a common
OpenStack employs DevStack for integration testing and development purposes. In previous iterations of DevStack, baremetal provisioning was only simulated via Ironic by having physical machines replaced with virtual machines.
With recent patches supplied by Intel, the ability to test/tryout baremetal provisioning is more simple and easy. Previously DevStack could only support Ironic configuration using the pxe_ssh driver. Patches have now made the agent_ipmitool driver available as well. Rapid baremetal setup is now much easier with this additional DevStack support.
This article explores the internal details of provisioning a physical machine using OpenStack*. Steps for setting up OpenStack are included, and no special hardware is required to begin use. If you already use OpenStack, follow these instructions using the hardware you currently have. If you are new to OpenStack, you will need a commodity access switch and two physical servers with ports connected to a switch that is on the same VLAN or broadcast domain.
As an OpenStack gold member and Top 10 contributor, Intel leads blueprints for:
- CPU Feature Detection
- PCIe SR-IOV Accelerators
- OVF Meta-Data Import
- Intelligent workload scheduling—enhanced usage statistics allow advanced scheduling decisions
- Filter scheduling in Cinder—enables differentiated service with different storage back-ends
Red Hat and Intel collaborate energetically to ensure that binary code compatibility and optimization to deliver greater agility and lower TCO to customers. That includes optimizing platforms for virtualization and secure cloud computing. For example, we’ve enabled Intel® Virtualization Technologies in RHEL6, RHEV and the upcoming RHEL7, and we’ve collaborated on Trusted Compute Pools with Open Attestation Technology (OAT) support in Fedora—we’re now working to make it available in the RHEL-OpenStack platform.
Intel® Trusted Execution Technology (Intel® TXT) is a collection of hardware-based security technologies built into Intel’s silicon. They address the security threats across physical and virtual infrastructure by complementing runtime protections like anti-virus software. Intel TXT is also a hardware-based method of verification in compliance efforts such as trusted computing environment. Intel TXT is designed to harden platforms from the emerging threats of hypervisor attacks, BIOS, or other firmware attacks, malicious root kit installations, or other software-based attacks.