News
6/25/2008
12:50 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

3 Ways That Storage Virtualization Can Save You Money

Storage virtualization is often billed as what I call a "Time To" product, meaning that it reduces the time it takes IT to respond to demands on the business. Virtualization shortens the amount of time that it takes to respond to a provisioning request, allowing for more rapid deployment of storage assets. IT departments also should consider storage virtualization if they need to flatten or shrink their budget.

Storage virtualization is often billed as what I call a "Time To" product, meaning that it reduces the time it takes IT to respond to demands on the business. Virtualization shortens the amount of time that it takes to respond to a provisioning request, allowing for more rapid deployment of storage assets. IT departments also should consider storage virtualization if they need to flatten or shrink their budget.How can adding a new system actually decrease your expenditures? There are many areas, but the top three are thin provisioning, wide striping, and intelligent data movement.

Thin provisioning allows you to partition a volume to the size that the application or user requests, but only consume the actual disk space that is in use at that moment in time. For example, if you have the need to deploy a 750 GB Oracle environment, we all know that on Day One it will not need anything near that amount of storage space. In fact, often the applications never grow to their projected size. Having to deploy this upfront can be costly not only because you have to actually buy the storage, but also because you have to power and cool that storage.

The few remaining thin provisioning naysayers will warn you about over-allocating and running out of actual disk space. I have never really seen that happen as today's systems provide you with so many early warnings that it makes it almost impossible to run out of disk space and not be aware that it is happening. Thin provisioning reduces the total drive count that you have to purchase to service your application, reducing capital expenditures as well as power and cooling costs.

Performance also is a cost-related issue that storage virtualization can help curtail by using wide striping. With traditional storage systems, you define your RAID groups to a finite number of drives. To get performance to a given application, you need to create a high-drive-count RAID group. This causes further capacity allocation issues, as well as increasing the likelihood of a double drive failure and potential data loss. Virtualization storage systems use wide striping to scatter data across all the available drives in a system. Typically, the virtualization engine will group the drives by type and then stripe across all of those resources. This delivers maximum performance to all applications, lowering the amount of drive spindles that need to be dedicated to one task in particular.

Intelligent data migration is a feature unique to a few storage virtualization products, delivering near perfect, tiered storage. Data movement in a tiered storage strategy always is a challenge. Intelligent data migration solves most of the issues and expands the use beyond just file data. Even databases can be tiered. This capability allows you to move data at a block level as that data ages. This means you can start your database on high performance Fibre Channel and then as parts of it age, move those parts to lower speed and lower cost disk technology. You can easily start with active data residing on 15K fibre, as blocks of data age, migrate those to 10K Fibre and then to SATA, for example. With the coming surge of SSD-based products, this type of movement could be the killer app for SSD storage.

Since this movement is transparent and seamless, with minimal performance degradation as it moves between tiers, a very aggressive migration strategy is possible, lowering the expenditure in expensive high-speed fibre drives. We will do a deeper dive on Intelligent Data Movement in a future entry.

A virtualized storage system is a very wise investment given the market right now. It is one of the few purchases that you can make in the data center that will increase productivity and user satisfaction, while at the same time significantly reduce budget expenditures as well as power and cooling costs.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

CVE-2014-4511
Published: 2014-07-22
Gitlist before 0.5.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the file name in the URI of a request for a (1) blame, (2) file, or (3) stats page, as demonstrated by requests to blame/master/, master/, and stats/master/.

CVE-2014-4911
Published: 2014-07-22
The ssl_decrypt_buf function in library/ssl_tls.c in PolarSSL before 1.2.11 and 1.3.x before 1.3.8 allows remote attackers to cause a denial of service (crash) via vectors related to the GCM ciphersuites, as demonstrated using the Codenomicon Defensics toolkit.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.