Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

8/2/2010
09:49 AM
George Crump
George Crump
Commentary
50%
50%

Managing The Mixed Storage Environment

In my last entry we covered the value of just having one device to manage. What if that is not realistic for your environment? Either you selected a storage system that won't scale, you have business reasons for multiple units or the environment is just too large, it needs to diverse to put everything on one storage platform. You need tools to allow the different systems to be managed more easily.

In my last entry we covered the value of just having one device to manage. What if that is not realistic for your environment? Either you selected a storage system that won't scale, you have business reasons for multiple units or the environment is just too large, it needs to diverse to put everything on one storage platform. You need tools to allow the different systems to be managed more easily.Tools can come in two flavors. First is the classic storage resource management (SRM) products. If you have not looked at these systems in a while I encourage you to give them another review. Most SRM systems now can effectively manage a diverse array of storage manufacturers and storage environments like VMware or Oracle as well as backup software management and monitoring as well. These systems can answer questions like where is my most available area of storage or which host is taking the least advantage of the available bandwidth and storage I/O resources. Some will even simulate the impact of moving a virtual machine from one host to another.

Second there are the tools that can get different storage systems from different manufacturers to act as one. This often involves some form of storage virtualization. These storage virtualization solutions work at either a file level or block level and can get systems from a variety of vendors to be able to be interacted as one, meaning that actions can be taken universally across different storage manufacturers. In some cases, as we describe in our article "What is File Virtualization?", this can be relatively non-disruptive. File virtualization allows you to set file movement policies based on parameters like age, size, type or owner. This does not require too much change to the infrastructure, although individual NAS data service functions (i.e. not file management) have to be done from the GUI of that manufacturer's NAS appliance.

Block virtualization systems will vary but typically require a deeper commitment to that vendor and the data services they provide. However once that commitment is made the payoff is the storage software and it's services that used to be embedded into the controller of the storage system is now abstracted into software. This allows a mixed hardware vendor environment to be managed as one. It also allows for flexibility on all future purchases since almost anything can be added to the environment and still managed with the same interface. Most storage virtualization products are software based or appliance based and have the ability to scale performance to match capacity by clustering in additional nodes. Some can now run as virtual machines with in a server virtualization environment.

While having one storage platform is ideal, if that simply is not realistic for you then there are options that can provide much of the management simplicity of a single system. They then can also bring some added benefits of reduced vendor lock-in.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.