News
1/10/2011
12:55 PM
George Crump
George Crump
Commentary
50%
50%

Desktop Virtualization And Local Storage - Just Say No

There is an ongoing debate about what type of storage is best to use to support desktop virtualization solutions, especially in small to medium sized implementations. Storage is one of the most expensive parts of a desktop virtualization project and as a result anything you can do to drive cost out of the storage purchase is going to make desktop virtualization economics work better. This leads some to advocate local storage.

There is an ongoing debate about what type of storage is best to use to support desktop virtualization solutions, especially in small to medium sized implementations. Storage is one of the most expensive parts of a desktop virtualization project and as a result anything you can do to drive cost out of the storage purchase is going to make desktop virtualization economics work better. This leads some to advocate local storage.The theory goes that local storage is going to be a less expensive and an easier to implement solution for the virtual desktop project. At the surface those are valid points but when you weigh what you give up by not going to shared storage and how you have to configure local storage to provide users with a respectable desktop experience I'm not sure if local storage is quite the deal it sounds like.

First let's look at what you have to do to local storage to get it ready for desktop virtualization. From a performance perspective you are going to need enough drives to generate enough IOPs to provide adequate performance to those now virtualized desktops. While the typical working IOPs requirement of a virtual desktop is relatively light, typically less than 5 IOPs. However the per virtual desktop IOP during boot up, logon/logoff, software update operations that number can increase substantially, as much as 5X. As we discuss in our recent article "Solving Boot Storms With High Performance NAS" these activities are the real challenge in the environment and something that needs to be planned for when designing the storage system.

Providing your virtual desktop environment with high performance and highly reliable storage is not as simple as running down to your local computer store and picking up that $99 2TB hard drive. You're going to want something a little more enterprise class with a 15K RPM speed. Most environments will either use RAID 1 or RAID 5 for data protection so that will require a more expensive controller to be purchased and the protection overhead will eat into performance. The need for performance and reliability is typically going to require an eight to ten drive RAID configuration. This drive count is going to be beyond the internal drive capability of most servers, which means an external storage system.

The combination of faster drives and an external chassis erodes some of the price advantage compared to mid-range storage systems but not all of it. Its the limits of locally attached systems in this type of configuration that become the real challenge. Most price competitive external systems can only be expanded so far. As you add virtual desktops you may need additional external systems, which adds to the cost and to complexity.

As we discussed in our webinar "Making Sure Desktop Virtualization Won't Break Storage" there is some planning required vs local storage. That planning though is often worth what you gain from shared storage. The big give up with local storage is that you loose much of what desktop virtualization brings like virtual machine migration and server balancing. You need shared storage to be able to migrate machines and balance load. You also give up the ability to offload from the hypervisor all the things that shared storage does well like scalability, snapshots, cloning, deduplication and replication. While its true that some of these functions can be performed via software all of those come at an added cost of not only dollars but also server resources. Finally shared storage can be leveraged for other storage uses, like server virtualization, as well so the cost of the shared storage investment can be allocated across several projects.

Local storage may have a roll to play in desktop virtualization but you have to weigh all the odds. Is desktop virtualization without shared storage really going to give you a return on the investment? If you factor everything in, you may be better off getting shared storage first and then deploying virtual desktop later than you would be to live with an virtual desktop project that under achieves due to poor storage performance. One thing we have seen consistently is once users get a bad taste for virtual desktop, they rarely will give it a second chance.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2037
Published: 2014-11-26
Openswan 2.6.40 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon restart) via IKEv2 packets that lack expected payloads. NOTE: this vulnerability exists because of an incomplete fix for CVE 2013-6466.

CVE-2014-6609
Published: 2014-11-26
The res_pjsip_pubsub module in Asterisk Open Source 12.x before 12.5.1 allows remote authenticated users to cause a denial of service (crash) via crafted headers in a SIP SUBSCRIBE request for an event package.

CVE-2014-6610
Published: 2014-11-26
Asterisk Open Source 11.x before 11.12.1 and 12.x before 12.5.1 and Certified Asterisk 11.6 before 11.6-cert6, when using the res_fax_spandsp module, allows remote authenticated users to cause a denial of service (crash) via an out of call message, which is not properly handled in the ReceiveFax dia...

CVE-2014-7141
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and crash) via a crafted type in an (1) ICMP or (2) ICMP6 packet.

CVE-2014-7142
Published: 2014-11-26
The pinger in Squid 3.x before 3.4.8 allows remote attackers to obtain sensitive information or cause a denial of service (crash) via a crafted (1) ICMP or (2) ICMP6 packet size.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?