News
4/1/2011
10:20 AM
George Crump
George Crump
Commentary
50%
50%

Dealing With Peak Storage I/O

A peak in storage I/O occurs when an application suddenly has a spike of I/O requests to and from the storage device. Prior to virtualization we sized servers that applications ran on and the storage infrastructure that those servers used specifically for those peak times. This means that most of the time those servers sat idle. Thanks to virtualization, we can't size hosts to handle the load if all its VMs peaked.

A peak in storage I/O occurs when an application suddenly has a spike of I/O requests to and from the storage device. Prior to virtualization we sized servers that applications ran on and the storage infrastructure that those servers used specifically for those peak times. This means that most of the time those servers sat idle. Thanks to virtualization, we can't size hosts to handle the load if all its VMs peaked.Performance tuning and dealing with peaks in storage I/O demands has now become a top concern for storage administrators. In fact in a recent survey conducted by Storage Switzerland over 50% of the respondents listed performance tuning and troubleshooting as the biggest storage challenge caused by server virtualization. It is also the primary reason often given for virtualization stall because the organization struggles with how to maintain performance service levels with the business units.

Peak storage I/O can come from an increase in batch processing like at the end of a quarter or it can come from a sudden spike in the number of online users. The impact in a virtual environment may be that the application may never be able to service the peak load because the resources are not there. If it does it may mean that other virtual machines on the physical host become starved for resources and their performance suffers severely. That's the challenge with virtualization, everything impacts everything. In either case the result is not good and applications become so slow that they actually feel like they have stopped to the user. This is just as bad as an application crash so avoiding that situation is critical.

One solution is to build, as we discussed in our recent webinar, "Stopping The Storage Roadblock To Server Virtualization", a much faster storage infrastructure. Storage networks built on 10GbE are affordable and deliver a significant performance boost to the environment especially those that do not have to deal with IP overhead. The other option is to understand your environment and make better use of the current resources. The reality is you will probably need to build both a faster network and now how to fine tune that network.

Monitoring the virtual environment requires real-time or near real-time information to be able to assess how resources like storage I/O are being consumed. It also means seeing that consumption at both the virtual machine level and the physical host level. You need to know which virtual machines are chewing up resources and you need to know which physical hosts have resources available if you decide to move virtual machines around to balance out the load.

When a peak storage I/O load occurs, if you can identify the virtual machine causing the problem via a monitoring tool you have several choices. One choice is to move the other VMs on the physical host to other physical hosts. This frees up most of the resources of the host for that particular task. You could also move the VM causing the I/O peak to a host that has plenty of free resources. In extreme situations you may want to actually move the peak VM out of the virtual environment. As we discussed in our article "Virtual To Physical Machine Conversion To Mitigate Risk" some migration tools are enabling those capabilities and it is a good one to have on your IT utility belt.

The good news is that server virtualization provides the flexibility to deal with peak storage I/O loads. The critical component however is knowing which of those options is going to best help you get through the peak load. The only way to know that is through the use of a monitoring tool that can give you the analytics to make the right decision.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3580
Published: 2014-12-18
The mod_dav_svn Apache HTTPD server module in Apache Subversion 1.x before 1.7.19 and 1.8.x before 1.8.11 allows remote attackers to cause a denial of service (NULL pointer dereference and server crash) via a REPORT request for a resource that does not exist.

CVE-2014-6076
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allow remote attackers to conduct clickjacking attacks via a crafted web site.

CVE-2014-6077
Published: 2014-12-18
Cross-site request forgery (CSRF) vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences.

CVE-2014-6078
Published: 2014-12-18
IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 do not have a lockout period after invalid login attempts, which makes it easier for remote attackers to obtain admin access via a brute-force attack.

CVE-2014-6080
Published: 2014-12-18
SQL injection vulnerability in IBM Security Access Manager for Mobile 8.x before 8.0.1 and Security Access Manager for Web 7.x before 7.0.0 FP10 and 8.x before 8.0.1 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.