News
1/4/2011
02:37 PM
George Crump
George Crump
Commentary
50%
50%

Mixing Tiers And Mixing Vendors In A Virtualized Environment

VMware's Storage VMotion is a tool that brings the capabilities of virtual server migration to storage. Without interrupting users virtual machine data can be moved from one storage platform to another. It allows you to mix storage tiers and vendors more easily than in a non-virtualized environment. The missing link with this capability is all it can do is move data you need to know where to put that virtual machine.

VMware's Storage VMotion is a tool that brings the capabilities of virtual server migration to storage. Without interrupting users virtual machine data can be moved from one storage platform to another. It allows you to mix storage tiers and vendors more easily than in a non-virtualized environment. The missing link with this capability is all it can do is move data you need to know where to put that virtual machine.Storage VMotion movement can be across different storage tiers from Solid State Disk to SATA, for example it can even be across different manufacturer's storage systems. This is ideal as there are some manufacturers that you may feel are better for high performance storage and others that are better for high capacity storage. A Storage VMotion like capability allows for load balancing and right sizing the storage I/O of your environment, but you need a tool to help diagnose where those virtual machines should move to.

You may also want to use this type of capability to mitigate impact from a failing storage system. For example if one of your redundant power supplies has failed you may want to move some critical virtual machines to another storage system until it can be repaired. Another example may be if a drive has failed and a rebuild is occurring, in many systems the rebuild process will dramatically reduce the storage performance of the attached servers. While you could de-prioritize the rebuild job to minimize the impact to application performance but you do this with the risk that the rebuild will take too long to complete and another drive fails. With tools like Storage VMotion you can move all your virtual machines data or at least your critical ones and let the rebuild job have all of the storage processor to complete the rebuild much faster.

As we discussed in our article "Server Virtualization Monitoring Requires Objective Storage Visibility" the real key with taking full advantage of features like Storage VMotion is having a tool that will help you figure out where is the best location to move the virtual machine. This becomes especially complex if you have multiple types of storage and those types of storage are from multiple vendors. While some storage systems have relatively strong storage management software included with them most do not understand the relationship between their storage systems and the virtual machines. They may give you a view as to how the virtual host is using that storage but not the virtual machines on the host. Since that is the level of granularity that you will be working with that is really the view you need.

You also need to be able to see from the storage up to the virtual machine or from the virtual machine down to the storage. You'll want to be able to measure storage I/O utilization over a span of time to see what virtual machines are really able to take advantage of faster storage or would work just as well on slower, more cost effective storage. This way when the need to move a virtual machine's storage occurs you can quickly analyze what other storage platform is the best candidate.

Finally, if you are going to select a best of breed storage hardware approach, then you are going to need a tool that will can perform the above analysis across multiple vendor hardware platforms. A tool that can provide this in a single consolidated view but then also allow drill down to detail the specific storage systems. Storage VMotion is an amazing capability adding a tool that completes its missing link provides the storage manager the ability to better respond to the dynamic nature of the virtual infrastructure.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Changing Face of Identity Management
Mobility and cloud services are altering the concept of user identity. Here are some ways to keep up.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio

The cybersecurity profession struggles to retain women (figures range from 10 to 20 percent). It's particularly worrisome for an industry with a rapidly growing number of vacant positions.

So why does the shortage of women continue to be worse in security than in other IT sectors? How can men in infosec be better allies for women; and how can women be better allies for one another? What is the industry doing to fix the problem -- what's working, and what isn't?

Is this really a problem at all? Are the low numbers simply an indication that women do not want to be in cybersecurity, and is it possible that more women will never want to be in cybersecurity? How many women would we need to see in the industry to declare success?

Join Dark Reading senior editor Sara Peters and guests Angela Knox of Cloudmark, Barrett Sellers of Arbor Networks, Regina Wallace-Jones of Facebook, Steve Christey Coley of MITRE, and Chris Roosenraad of M3AAWG on Wednesday, July 13 at 1 p.m. Eastern Time to discuss all this and more.