12:29 PM
George Crump
George Crump

Server Virtualization's Encapsulation And Its Impact On Storage

To say that server virtualization changes everything is an understatement. In storage though I don't think we understand or give credit to just how much of a game changer storage virtualization really is. For storage managers and backup administrators it has brought new capabilities, new requirements and new problems to solve.

To say that server virtualization changes everything is an understatement. In storage though I don't think we understand or give credit to just how much of a game changer storage virtualization really is. For storage managers and backup administrators it has brought new capabilities, new requirements and new problems to solve.The biggest change is the encapsulation of an entire server into a single file. That file now justifies, more so than ever, the use of shared storage so that the encapsulated server file can be accessed by multiple physical servers at any time. Shared storage is the foundation that server virtualization needs to have the ability to migrate virtual machines between physical servers to increase server up time and load balance performance. This has lead businesses to implement and use shared storage sooner than ever. This early move to shared storage has created a whole new level of storage systems that leverage either iSCSI or Network Attached Storage (NAS) to drive down costs and increase platform simplicity.

This is especially true in the NAS vendor community. The ability to host the encapsulated servers on an NFS share opened NAS systems up to a whole new market. Instead of being just file servers they are now "server" servers. As we discussed in our article "Using NFS for Server Virtualization" using NFS to host the encapsulated server image is becoming much more widely accepted and should be considered along with iSCSI and ATA over Ethernet as a way to leverage the existing network infrastructure for storing and sharing virtual machine images as well as simplifying the storage management component of server virtualization.

As the virtual environment grows it leads to fewer physical servers with many virtual machines running on them. This creates a highly randomized I/O problem in the many data centers that used to only occur in high performance computing environments. The need to solve the storage I/O problems caused by server virtualization has lead to the development of scalable high performing storage systems. They are also driving further SSD adoption to augment existing storage systems as we discussed in our article "Enhancing Server And Desktop Virtualization With SSD". Solid State storage addresses much of the storage I/O problem by adding a zero latent tier of storage that is highly responsive to random workloads.

Faster storage systems can only deliver those improved performance numbers if the network can move that information between the virtual host and the storage subsystem. This is leading to more intelligent networking cards that not only deliver a raw speed improvement via 10Gb Ethernet or 16GB Fibre Channel but also have some intelligence that allows for prioritization of specific virtual machine workloads. Leveraging technologies like N_Port ID Virtualization (NPIV) and providing a card level Quality of Service (QoS) is going to be critical to meet application level server level agreements (SLA). When we can guarantee performance levels it will allow the virtualization of more mission critical applications and denser VM to physical host configurations.

The encapsulation of server images has also changed dramatically the approach to data protection. In our next entry we will look at how the data protection industry is fundamentally changing because of the encapsulation of servers.

Track us on Twitter:

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.