News
1/4/2011
02:37 PM
George Crump
George Crump
Commentary
50%
50%

Mixing Tiers And Mixing Vendors In A Virtualized Environment

VMware's Storage VMotion is a tool that brings the capabilities of virtual server migration to storage. Without interrupting users virtual machine data can be moved from one storage platform to another. It allows you to mix storage tiers and vendors more easily than in a non-virtualized environment. The missing link with this capability is all it can do is move data you need to know where to put that virtual machine.

VMware's Storage VMotion is a tool that brings the capabilities of virtual server migration to storage. Without interrupting users virtual machine data can be moved from one storage platform to another. It allows you to mix storage tiers and vendors more easily than in a non-virtualized environment. The missing link with this capability is all it can do is move data you need to know where to put that virtual machine.Storage VMotion movement can be across different storage tiers from Solid State Disk to SATA, for example it can even be across different manufacturer's storage systems. This is ideal as there are some manufacturers that you may feel are better for high performance storage and others that are better for high capacity storage. A Storage VMotion like capability allows for load balancing and right sizing the storage I/O of your environment, but you need a tool to help diagnose where those virtual machines should move to.

You may also want to use this type of capability to mitigate impact from a failing storage system. For example if one of your redundant power supplies has failed you may want to move some critical virtual machines to another storage system until it can be repaired. Another example may be if a drive has failed and a rebuild is occurring, in many systems the rebuild process will dramatically reduce the storage performance of the attached servers. While you could de-prioritize the rebuild job to minimize the impact to application performance but you do this with the risk that the rebuild will take too long to complete and another drive fails. With tools like Storage VMotion you can move all your virtual machines data or at least your critical ones and let the rebuild job have all of the storage processor to complete the rebuild much faster.

As we discussed in our article "Server Virtualization Monitoring Requires Objective Storage Visibility" the real key with taking full advantage of features like Storage VMotion is having a tool that will help you figure out where is the best location to move the virtual machine. This becomes especially complex if you have multiple types of storage and those types of storage are from multiple vendors. While some storage systems have relatively strong storage management software included with them most do not understand the relationship between their storage systems and the virtual machines. They may give you a view as to how the virtual host is using that storage but not the virtual machines on the host. Since that is the level of granularity that you will be working with that is really the view you need.

You also need to be able to see from the storage up to the virtual machine or from the virtual machine down to the storage. You'll want to be able to measure storage I/O utilization over a span of time to see what virtual machines are really able to take advantage of faster storage or would work just as well on slower, more cost effective storage. This way when the need to move a virtual machine's storage occurs you can quickly analyze what other storage platform is the best candidate.

Finally, if you are going to select a best of breed storage hardware approach, then you are going to need a tool that will can perform the above analysis across multiple vendor hardware platforms. A tool that can provide this in a single consolidated view but then also allow drill down to detail the specific storage systems. Storage VMotion is an amazing capability adding a tool that completes its missing link provides the storage manager the ability to better respond to the dynamic nature of the virtual infrastructure.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-1449
Published: 2014-12-25
The Maxthon Cloud Browser application before 4.1.6.2000 for Android allows remote attackers to spoof the address bar via crafted JavaScript code that uses the history API.

CVE-2014-2217
Published: 2014-12-25
Absolute path traversal vulnerability in the RadAsyncUpload control in the RadControls in Telerik UI for ASP.NET AJAX before Q3 2012 SP2 allows remote attackers to write to arbitrary files, and consequently execute arbitrary code, via a full pathname in the UploadID metadata value.

CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2014-7300
Published: 2014-12-25
GNOME Shell 3.14.x before 3.14.1, when the Screen Lock feature is used, does not limit the aggregate memory consumption of all active PrtSc requests, which allows physically proximate attackers to execute arbitrary commands on an unattended workstation by making many PrtSc requests and leveraging a ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.