News
1/10/2011
12:55 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Desktop Virtualization And Local Storage - Just Say No

There is an ongoing debate about what type of storage is best to use to support desktop virtualization solutions, especially in small to medium sized implementations. Storage is one of the most expensive parts of a desktop virtualization project and as a result anything you can do to drive cost out of the storage purchase is going to make desktop virtualization economics work better. This leads some to advocate local storage.

There is an ongoing debate about what type of storage is best to use to support desktop virtualization solutions, especially in small to medium sized implementations. Storage is one of the most expensive parts of a desktop virtualization project and as a result anything you can do to drive cost out of the storage purchase is going to make desktop virtualization economics work better. This leads some to advocate local storage.The theory goes that local storage is going to be a less expensive and an easier to implement solution for the virtual desktop project. At the surface those are valid points but when you weigh what you give up by not going to shared storage and how you have to configure local storage to provide users with a respectable desktop experience I'm not sure if local storage is quite the deal it sounds like.

First let's look at what you have to do to local storage to get it ready for desktop virtualization. From a performance perspective you are going to need enough drives to generate enough IOPs to provide adequate performance to those now virtualized desktops. While the typical working IOPs requirement of a virtual desktop is relatively light, typically less than 5 IOPs. However the per virtual desktop IOP during boot up, logon/logoff, software update operations that number can increase substantially, as much as 5X. As we discuss in our recent article "Solving Boot Storms With High Performance NAS" these activities are the real challenge in the environment and something that needs to be planned for when designing the storage system.

Providing your virtual desktop environment with high performance and highly reliable storage is not as simple as running down to your local computer store and picking up that $99 2TB hard drive. You're going to want something a little more enterprise class with a 15K RPM speed. Most environments will either use RAID 1 or RAID 5 for data protection so that will require a more expensive controller to be purchased and the protection overhead will eat into performance. The need for performance and reliability is typically going to require an eight to ten drive RAID configuration. This drive count is going to be beyond the internal drive capability of most servers, which means an external storage system.

The combination of faster drives and an external chassis erodes some of the price advantage compared to mid-range storage systems but not all of it. Its the limits of locally attached systems in this type of configuration that become the real challenge. Most price competitive external systems can only be expanded so far. As you add virtual desktops you may need additional external systems, which adds to the cost and to complexity.

As we discussed in our webinar "Making Sure Desktop Virtualization Won't Break Storage" there is some planning required vs local storage. That planning though is often worth what you gain from shared storage. The big give up with local storage is that you loose much of what desktop virtualization brings like virtual machine migration and server balancing. You need shared storage to be able to migrate machines and balance load. You also give up the ability to offload from the hypervisor all the things that shared storage does well like scalability, snapshots, cloning, deduplication and replication. While its true that some of these functions can be performed via software all of those come at an added cost of not only dollars but also server resources. Finally shared storage can be leveraged for other storage uses, like server virtualization, as well so the cost of the shared storage investment can be allocated across several projects.

Local storage may have a roll to play in desktop virtualization but you have to weigh all the odds. Is desktop virtualization without shared storage really going to give you a return on the investment? If you factor everything in, you may be better off getting shared storage first and then deploying virtual desktop later than you would be to live with an virtual desktop project that under achieves due to poor storage performance. One thing we have seen consistently is once users get a bad taste for virtual desktop, they rarely will give it a second chance.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3409
Published: 2014-10-25
The Ethernet Connectivity Fault Management (CFM) handling feature in Cisco IOS 12.2(33)SRE9a and earlier and IOS XE 3.13S and earlier allows remote attackers to cause a denial of service (device reload) via malformed CFM packets, aka Bug ID CSCuq93406.

CVE-2014-4620
Published: 2014-10-25
The EMC NetWorker Module for MEDITECH (aka NMMEDI) 3.0 build 87 through 90, when EMC RecoverPoint and Plink are used, stores cleartext RecoverPoint Appliance credentials in nsrmedisv.raw log files, which allows local users to obtain sensitive information by reading these files.

CVE-2014-4623
Published: 2014-10-25
EMC Avamar 6.0.x, 6.1.x, and 7.0.x in Avamar Data Store (ADS) GEN4(S) and Avamar Virtual Edition (AVE), when Password Hardening before 2.0.0.4 is enabled, uses UNIX DES crypt for password hashing, which makes it easier for context-dependent attackers to obtain cleartext passwords via a brute-force a...

CVE-2014-4624
Published: 2014-10-25
EMC Avamar Data Store (ADS) and Avamar Virtual Edition (AVE) 6.x and 7.0.x through 7.0.2-43 do not require authentication for Java API calls, which allows remote attackers to discover grid MCUser and GSAN passwords via a crafted call.

CVE-2014-6151
Published: 2014-10-25
CRLF injection vulnerability in IBM Tivoli Integrated Portal (TIP) 2.2.x allows remote authenticated users to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.