News
4/1/2011
10:20 AM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Dealing With Peak Storage I/O

A peak in storage I/O occurs when an application suddenly has a spike of I/O requests to and from the storage device. Prior to virtualization we sized servers that applications ran on and the storage infrastructure that those servers used specifically for those peak times. This means that most of the time those servers sat idle. Thanks to virtualization, we can't size hosts to handle the load if all its VMs peaked.

A peak in storage I/O occurs when an application suddenly has a spike of I/O requests to and from the storage device. Prior to virtualization we sized servers that applications ran on and the storage infrastructure that those servers used specifically for those peak times. This means that most of the time those servers sat idle. Thanks to virtualization, we can't size hosts to handle the load if all its VMs peaked.Performance tuning and dealing with peaks in storage I/O demands has now become a top concern for storage administrators. In fact in a recent survey conducted by Storage Switzerland over 50% of the respondents listed performance tuning and troubleshooting as the biggest storage challenge caused by server virtualization. It is also the primary reason often given for virtualization stall because the organization struggles with how to maintain performance service levels with the business units.

Peak storage I/O can come from an increase in batch processing like at the end of a quarter or it can come from a sudden spike in the number of online users. The impact in a virtual environment may be that the application may never be able to service the peak load because the resources are not there. If it does it may mean that other virtual machines on the physical host become starved for resources and their performance suffers severely. That's the challenge with virtualization, everything impacts everything. In either case the result is not good and applications become so slow that they actually feel like they have stopped to the user. This is just as bad as an application crash so avoiding that situation is critical.

One solution is to build, as we discussed in our recent webinar, "Stopping The Storage Roadblock To Server Virtualization", a much faster storage infrastructure. Storage networks built on 10GbE are affordable and deliver a significant performance boost to the environment especially those that do not have to deal with IP overhead. The other option is to understand your environment and make better use of the current resources. The reality is you will probably need to build both a faster network and now how to fine tune that network.

Monitoring the virtual environment requires real-time or near real-time information to be able to assess how resources like storage I/O are being consumed. It also means seeing that consumption at both the virtual machine level and the physical host level. You need to know which virtual machines are chewing up resources and you need to know which physical hosts have resources available if you decide to move virtual machines around to balance out the load.

When a peak storage I/O load occurs, if you can identify the virtual machine causing the problem via a monitoring tool you have several choices. One choice is to move the other VMs on the physical host to other physical hosts. This frees up most of the resources of the host for that particular task. You could also move the VM causing the I/O peak to a host that has plenty of free resources. In extreme situations you may want to actually move the peak VM out of the virtual environment. As we discussed in our article "Virtual To Physical Machine Conversion To Mitigate Risk" some migration tools are enabling those capabilities and it is a good one to have on your IT utility belt.

The good news is that server virtualization provides the flexibility to deal with peak storage I/O loads. The critical component however is knowing which of those options is going to best help you get through the peak load. The only way to know that is through the use of a monitoring tool that can give you the analytics to make the right decision.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7877
Published: 2014-10-30
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.

CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.