Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

6/29/2009
02:11 PM
George Crump
George Crump
Commentary
50%
50%

Maximizing Block I/O Dollars With Thin Provisioning

Getting the most out of every storage dollar is critical in this economy and as we discussed in our last entry, viable options for optimizing file based primary storage are available now but as of yet solutions that can compress and deduplicate block I/O storage are not yet readily available. But all is not lost, there are things you can do to lower your primary storage block I/O costs.

Getting the most out of every storage dollar is critical in this economy and as we discussed in our last entry, viable options for optimizing file based primary storage are available now but as of yet solutions that can compress and deduplicate block I/O storage are not yet readily available. But all is not lost, there are things you can do to lower your primary storage block I/O costs.The first step of course relates to our last entry, file based data that is on block I/O storage could and should be migrated off to a secondary tier of storage. Beyond moving old data off of primary storage and without the ability to compress or deduplicate block I/O storage, further cost maximization has to come from one of three areas; either reducing the physical drive count, applying the right amount of storage compute power or using more power efficient components, especially drives. The challenge with primary block I/O storage is that you have to maintain performance to the user or customer which may minimize some of the power saving measures you can take.

A potential first step is to be more efficient with how storage is allocated on block I/O by reducing the number of drives and capacity that you need in the first place. The first candidate to help address this is thin provisioning. The idea behind thin provisioning is to only allocate storage as it is needed by the application. Depending on which study you read 25 to 35% of storage is allocated to specific servers but not in use. This is essentially free space that is held hostage by the application and server that the storage is assigned to. It is important to note that this storage area can't be optimized via compression or deduplication, there is not data there to optimize.

Thin provisioning gives you all this wasted capacity back and puts it into a global pool that other servers, with thin provisioned volumes, have access to as they need additional capacity. Before you race out and buy a new storage system that does thin provisioning however, you need to give some thought to the conversion. If you use one of the typical SAN copy utilities to move the data to the new array, you will essentially copy the free space also, eliminating the value of thin provisioning on migrated volumes. As we discuss in our article "Converting from Fat Volumes To Thin Provisioning" there are certain steps to take or capabilities to look for as you move to a thinly provisioned world and so make sure you understand those before you make the jump.

The next area to explore in maximizing primary block I/O storage is to reduce drive count by considering Solid State Disk, which will be the subject of our next entry.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Stop Defending Everything
Kevin Kurzawa, Senior Information Security Auditor,  2/12/2020
Small Business Security: 5 Tips on How and Where to Start
Mike Puglia, Chief Strategy Officer at Kaseya,  2/13/2020
Architectural Analysis IDs 78 Specific Risks in Machine-Learning Systems
Jai Vijayan, Contributing Writer,  2/13/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-5531
PUBLISHED: 2020-02-17
Mitsubishi Electric MELSEC C Controller Module and MELIPC Series MI5000 MELSEC-Q Series C Controller Module(Q24DHCCPU-V, Q24DHCCPU-VG User Ethernet port (CH1, CH2): First 5 digits of serial number 21121 or before), MELSEC iQ-R Series C Controller Module / C Intelligent Function Module(R12CCPU-V Ethe...
CVE-2020-7252
PUBLISHED: 2020-02-17
Unquoted service executable path in DXL Broker in McAfee Data eXchange Layer (DXL) Framework 6.0.0 and earlier allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files.
CVE-2020-9024
PUBLISHED: 2020-02-17
Iteris Vantage Velocity Field Unit 2.3.1 and 2.4.2 devices have world-writable permissions for the /root/cleardata.pl (executed as root by crond) and /root/loadperl.sh (executed as root at boot time) scripts.
CVE-2020-9025
PUBLISHED: 2020-02-17
Iteris Vantage Velocity Field Unit 2.4.2 devices have multiple stored XSS issues in all parameters of the Start Data Viewer feature of the /cgi-bin/loaddata.py script.
CVE-2020-9026
PUBLISHED: 2020-02-17
ELTEX NTP-RG-1402G 1v10 3.25.3.32 devices allow OS command injection via the PING field of the resource ping.cmd. The NTP-2 device is also affected.