News
1/4/2011
02:37 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Mixing Tiers And Mixing Vendors In A Virtualized Environment

VMware's Storage VMotion is a tool that brings the capabilities of virtual server migration to storage. Without interrupting users virtual machine data can be moved from one storage platform to another. It allows you to mix storage tiers and vendors more easily than in a non-virtualized environment. The missing link with this capability is all it can do is move data you need to know where to put that virtual machine.

VMware's Storage VMotion is a tool that brings the capabilities of virtual server migration to storage. Without interrupting users virtual machine data can be moved from one storage platform to another. It allows you to mix storage tiers and vendors more easily than in a non-virtualized environment. The missing link with this capability is all it can do is move data you need to know where to put that virtual machine.Storage VMotion movement can be across different storage tiers from Solid State Disk to SATA, for example it can even be across different manufacturer's storage systems. This is ideal as there are some manufacturers that you may feel are better for high performance storage and others that are better for high capacity storage. A Storage VMotion like capability allows for load balancing and right sizing the storage I/O of your environment, but you need a tool to help diagnose where those virtual machines should move to.

You may also want to use this type of capability to mitigate impact from a failing storage system. For example if one of your redundant power supplies has failed you may want to move some critical virtual machines to another storage system until it can be repaired. Another example may be if a drive has failed and a rebuild is occurring, in many systems the rebuild process will dramatically reduce the storage performance of the attached servers. While you could de-prioritize the rebuild job to minimize the impact to application performance but you do this with the risk that the rebuild will take too long to complete and another drive fails. With tools like Storage VMotion you can move all your virtual machines data or at least your critical ones and let the rebuild job have all of the storage processor to complete the rebuild much faster.

As we discussed in our article "Server Virtualization Monitoring Requires Objective Storage Visibility" the real key with taking full advantage of features like Storage VMotion is having a tool that will help you figure out where is the best location to move the virtual machine. This becomes especially complex if you have multiple types of storage and those types of storage are from multiple vendors. While some storage systems have relatively strong storage management software included with them most do not understand the relationship between their storage systems and the virtual machines. They may give you a view as to how the virtual host is using that storage but not the virtual machines on the host. Since that is the level of granularity that you will be working with that is really the view you need.

You also need to be able to see from the storage up to the virtual machine or from the virtual machine down to the storage. You'll want to be able to measure storage I/O utilization over a span of time to see what virtual machines are really able to take advantage of faster storage or would work just as well on slower, more cost effective storage. This way when the need to move a virtual machine's storage occurs you can quickly analyze what other storage platform is the best candidate.

Finally, if you are going to select a best of breed storage hardware approach, then you are going to need a tool that will can perform the above analysis across multiple vendor hardware platforms. A tool that can provide this in a single consolidated view but then also allow drill down to detail the specific storage systems. Storage VMotion is an amazing capability adding a tool that completes its missing link provides the storage manager the ability to better respond to the dynamic nature of the virtual infrastructure.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-0334
Published: 2014-10-31
Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.

CVE-2014-2334
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2335
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2336.

CVE-2014-2336
Published: 2014-10-31
Multiple cross-site scripting (XSS) vulnerabilities in the Web User Interface in Fortinet FortiManager before 5.0.7 and FortiAnalyzer before 5.0.7 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2014-2334 and CVE-2014-2335.

CVE-2014-3366
Published: 2014-10-31
SQL injection vulnerability in the administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to execute arbitrary SQL commands via a crafted response, aka Bug ID CSCup88089.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.