Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

4/21/2009
09:13 AM
George Crump
George Crump
Commentary
50%
50%

Disappointed In Thin?

In a recent review of Symantec's 2009 Stop Buying Storage Survey, an odd result on thin provisioning might get overlooked. 42% of users are essentially disappointed in their thin provisioning investment, and another 37% only indicated seeing moderate improvement. If you aren't in the small group that saw significant improvement, you may have invested in the wrong thin provisioning technology.

In a recent review of Symantec's 2009 Stop Buying Storage Survey, an odd result on thin provisioning might get overlooked. 42% of users are essentially disappointed in their thin provisioning investment, and another 37% only indicated seeing moderate improvement. If you aren't in the small group that saw significant improvement, you may have invested in the wrong thin provisioning technology.Symantec commissioned this survey through Applied Research in March 2009 with a total of 400 IT professional respondents from the United States with direct responsibility over or within their organization's storage infrastructure and operations. The 2009 Stop Buying Storage survey highlights storage utilization trends and other storage-related habits related to the optimization of current storage capacity.

Based on experience the 22% that saw significant improvement should be closer to 100%. What keeps many organizations from seeing significant improvement generally centers on two areas that have plagued some thin provisioning implementations; conversion to thin and reclamation.

Conversion to thin provisioning as we detail in our article "Converting from Fat Volumes to Thin Provisioning" is one of the first challenges that a company will face when implementing a storage system that can perform thin provisioning. The problem is that if you use a standard migration utility, which you almost have to do to get the conversion done quickly, it copies data over via the SAN with a block by block copy. While the performance of this type of migration is excellent it is not exactly very smart. Free space and data that has been deleted but not removed from disk get copied over as well.

The second issue that has plagued thin provisioning is that during use, deleted items do not properly get reclaimed. This is because most file systems do not really delete data when you give the delete command, they just set the data as eligible to over write. If you go through a big house cleaning operation on a volume, that freed up space is not reallocated to the global storage pool that thin provisioning storage systems count on. It stays with the volume.

The result of these two factors is that thin provisioned systems put on a little weight both initially and over time. While some thin provisioning is better than no thin provisioning these challenges lead to the poor results on the survey. Companies like Symantec, 3PAR, HDS and DataCore have all announced technologies that can address both the conversion to thin issues as well as the ongoing space reclamation issues.

With these technologies companies can intelligently convert to thin to see immediate storage savings and can keep their volumes thin over time. Thin provisioning is more than a check mark feature, it is a serious technology that when all the challenges are properly addressed can save significant storage costs in the enterprise.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27905
PUBLISHED: 2021-04-13
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To...
CVE-2021-29262
PUBLISHED: 2021-04-13
When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be rea...
CVE-2021-29425
PUBLISHED: 2021-04-13
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "...
CVE-2021-29943
PUBLISHED: 2021-04-13
When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts.
CVE-2021-28938
PUBLISHED: 2021-04-13
Siren Federate before 6.8.14-10.3.9, 6.9.x through 7.6.x before 7.6.2-20.2, 7.7.x through 7.9.x before 7.9.3-21.6, 7.10.x before 7.10.2-22.2, and 7.11.x before 7.11.2-23.0 can leak user information across thread contexts. This occurs in opportunistic circumstances when there is concurrent query exec...