News
10/7/2009
02:50 PM
George Crump
George Crump
Commentary
50%
50%

Understanding Storage Performance

For most storage managers improving storage performance is an endless loop of upgrades that are taken until the problem goes away. Understanding where to look and how to configure the environment is often a series of "best guesses" instead of a thorough understanding of it. In today's economy best guesses are not allowed. Making the right move, the first time, is critical.

For most storage managers improving storage performance is an endless loop of upgrades that are taken until the problem goes away. Understanding where to look and how to configure the environment is often a series of "best guesses" instead of a thorough understanding of it. In today's economy best guesses are not allowed. Making the right move, the first time, is critical.The first step, as always, is to understand the nature of the problem. Do you really have a storage performance issue or do you have a bad application? Nearly everything you do to the storage infrastructure to improve performance is going to cost money and in some cases a lot of money. Before you spend that money you want to make sure you will see a difference. Unfortunately confirming that an application really could take advantage of more storage performance is sometimes hard to prove. You can start with some of the steps we discuss in our "Visual SSD Readiness" guide where we talk about using utilities like PerfMon to determine if the application is building up enough storage I/O requests to validate a higher drive count or if the performance issue is more of a response time issue and needs to be addressed by adding faster drives or solid state disk technology.

Beyond these basic system utilities there are tools available from companies like Confio and Tek-Tools that can analyze storage performance from the application itself, through the server, through the network and on to the storage. Creating a complete picture has great value when trying to prove that the application is truly in need of greater storage performance or if better programming can be applied.

Once it is determined that the application could take advantage of improved storage performance there are several areas to look at; wider storage bandwidth, faster storage controllers and of course faster and higher speed drives. While there is no correct order to follow in bandwidth upgrades, in most cases the first attempt is to add more and higher speed drives. This can have unpredictable results. Instead performance has to be examined holistically.

In most cases storage bandwidth is not the problem, most SANs today are at 4GB and will slowly be migrating to 8GB or 10GB FCoE over the next few years. As we discuss in "What's Causing the Storage IO Bottleneck?" the storage controllers themselves can also be the performance bottleneck either through too much processor load managing the array or through bandwidth into and out of the controller head. Finally of course there are the drive mechanics themselves. As mentioned earlier, based on queue depth or response time, adding more or faster drives can solve the problem.

Over the next few entries we will take a deeper dive into each of these issues. For now know that understanding storage performance is more than just throwing drives at the problem and that evaluating the whole storage infrastructure is required to address storage performance without breaking the budget.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.