Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

11/16/2009
02:15 PM
George Crump
George Crump
Commentary
50%
50%

Storage As A Virtual Machine Part Two - Details

As we dive deeper into the storage as a virtual machine concept we went back and re-interviewed some of the players in the storage as a virtual machine market, focusing specifically on what they provide. The first two conversations were with DataCore and HP. We will cover more suppliers as the series unfolds.

As we dive deeper into the storage as a virtual machine concept we went back and re-interviewed some of the players in the storage as a virtual machine market, focusing specifically on what they provide. The first two conversations were with DataCore and HP. We will cover more suppliers as the series unfolds.DataCore provides a virtual SAN appliance in a prepackaged download. It is important to note that this is not a special version of the software; their current storage virtualization software solutions can run as a virtual appliance unchanged. What they have done however is prepackaged the solution in a Virtual Hard Disk (VHD) format to simplify the loading of the software. This makes it simple for a storage manager to try out the product without having to acquire additional hardware. An example installation might be a two node virtual server environment. The VHD would be installed as a virtual machine on both. The available capacity on the two systems would then be cross mirrored between the two virtual machines. As additional traditional virtual machines are added they can be assigned storage from newly created virtual storage appliances.

Sharing is done via iSCSI across the network that connects to two physical hosts. Additional virtual hosts would have access to this shared storage by that iSCSI interconnection. Assuming there is excess capacity, this allows the virtual environment to quickly see how shared storage can benefit them without needing to purchase additional servers or storage. Most environments will move to a stand alone set of systems to serve up storage, although some work just fine in this configuration. Since there is no change to the software, migration from the virtual version to a standalone version it relatively straight forward.

HP's LeftHand Networks is known for its clustered approach to storage, so bringing that concept to the virtual environment seems natural. Similar to DataCore, HP uses the same software in the virtual environment as it does in the stand alone environment, unlike the DataCore solution, the HP solution clusters storage across all the available server hosts in the virtual cluster. In this implementation a virtual machine is created on each physical host. Each virtual machine is assigned a specific amount of capacity, ideally the size of that capacity is consistent, and that capacity is then pooled into one logical partition. Then as regular virtual machines are created they are assigned capacity from that pool and data is striped across the virtual machines.

Similar to the DataCore example this is most often used to evaluate the LeftHand's storage software, but a growing number of users are using it as a production storage solution. HP also provides a product called Cluster Swap that can move the data from the virtual servers to a stand alone storage configuration.

While both of these solutions are most commonly deployed in evaluation scenarios, as the processing capabilities of the virtual hosts becomes more and more powerful there will be continued excess processing capacity. Why not use that capacity to manage the storage requirements of environments with modest storage I/O demands? With each iteration of the Intel processor, that performance capability will continue to increase and tempt more users to this type of solution.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27235
PUBLISHED: 2021-04-13
An exploitable SQL injection vulnerability exists in ‘getAssets.jsp’ page of OpenClinic GA 5.173.3 in the description parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2020-27236
PUBLISHED: 2021-04-13
An exploitable SQL injection vulnerability exists in ‘getAssets.jsp’ page of OpenClinic GA 5.173.3 in the compnomenclature parameter. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2020-13566
PUBLISHED: 2021-04-13
SQL injection vulnerabilities exist in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability In admin/edit_group.php, when the POST parameter action is “Delete�, the POST ...
CVE-2020-13568
PUBLISHED: 2021-04-13
SQL injection vulnerability exists in phpGACL 3.3.7. A specially crafted HTTP request can lead to a SQL injection. An attacker can send an HTTP request to trigger this vulnerability in admin/edit_group.php, when the POST parameter action is “Submit�, the POST p...
CVE-2020-27227
PUBLISHED: 2021-04-13
An exploitable unatuhenticated command injection exists in the OpenClinic GA 5.173.3. Specially crafted web requests can cause commands to be executed on the server. An attacker can send a web request with parameters containing specific parameter to trigger this vulnerability, potentially allowing e...