Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/15/2011
10:56 AM
George Crump
George Crump
Commentary
50%
50%

Storage Performance Challenges In Virtualized Environments

The storage infrastructure that supports a virtualized server environment can quickly become a roadblock to expansion. As the project grows, server virtualization places new performance and scaling demands on storage that many IT professionals have not had to deal with in the past. In this entry we will cover some of the causes of the problems and in upcoming entries we will discuss how to overcome those problems.

The storage infrastructure that supports a virtualized server environment can quickly become a roadblock to expansion. As the project grows, server virtualization places new performance and scaling demands on storage that many IT professionals have not had to deal with in the past. In this entry we will cover some of the causes of the problems and in upcoming entries we will discuss how to overcome those problems.The first problem that server virtualization causes the storage environment is typically an increase in I/O demands per physical server connecting to that storage. Before virtualization most servers ran one application and there was often plenty of processing and storage I/O resources to go around. In server virtualization we are stacking many applications on to a single host, each running in their own virtual server. We are multiplying the potential storage I/O by 10X or more of what it used to be.

The second problem is that this I/O is now heavily randomized. All these applications are acting on their own behalf with little or any knowledge of the applications running in the virtual machines on the physical host that they share. Seldom will one application check to see if another application is busy with storage traffic. It becomes the job of the virtualization software's hypervisor to broker the available bandwidth which for the most part it does on a round robin basis. Fine tuning this brokering is something we will dive into in an upcoming entry. Finally when there was a performance problem, troubleshooting that problem was somewhat simplified in the physical world because we had that performance issue isolated to a single server and it was on its path to storage. Often that server was the only server accessing that area of storage. We didn't want other physical servers accessing the same storage area. With server virtualization, the storage I/O resources are shared across not only multiple virtual machines on a single physical host but also multiple physical hosts are accessing the same storage areas so that features like virtual machine migration can take place.

Beyond performance there is also new demands placed on scalability. Scaling in this context is not only actual storage capacity but also I/O capacity. While various cloning and deduplication technologies help storage capacity efficiency in virtualized server environments, rapid VM adoption and poor template control can still cause storage capacity issues. The bigger storage challenge may be adding that capacity without interrupting service. In the shared everything world of server virtualization any downtime, like one for capacity upgrade, has an exponential impact.

The other aspect of capacity is understanding the I/O capacity available when you want to virtualize another server. This could be a new server or a legacy physical server. In either case you have to know where the best place to put that server might be. Understanding which physical host has the most available CPU and storage I/O resources become critical to confidently placing that next virtual machine.

As you look to increase virtual machine density or look to virtualize more mission critical applications the limitations of storage performance and the complexity of getting around those limitations cause virtualization projects to stall. There are two basic options to solve this problem. You can either make the whole environment go faster or you can fine tune it. In an upcoming webinar and in our next entry we will cover the go faster option.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/27/2020
6 Ways Passwords Fail Basic Security Tests
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/28/2020
'Act of War' Clause Could Nix Cyber Insurance Payouts
Robert Lemos, Contributing Writer,  10/29/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How to Measure and Reduce Cybersecurity Risk in Your Organization
In this Tech Digest, we examine the difficult practice of measuring cyber-risk that has long been an elusive target for enterprises. Download it today!
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27014
PUBLISHED: 2020-10-30
Trend Micro Antivirus for Mac 2020 (Consumer) contains a race condition vulnerability in the Web Threat Protection Blocklist component, that if exploited, could allow an attacker to case a kernel panic or crash. An attacker must first obtain the ability to execute high-privileged code on the targ...
CVE-2020-27015
PUBLISHED: 2020-10-30
Trend Micro Antivirus for Mac 2020 (Consumer) contains an Error Message Information Disclosure vulnerability that if exploited, could allow kernel pointers and debug messages to leak to userland. An attacker must first obtain the ability to execute high-privi...
CVE-2020-27885
PUBLISHED: 2020-10-29
Cross-Site Scripting (XSS) vulnerability on WSO2 API Manager 3.1.0. By exploiting a Cross-site scripting vulnerability the attacker can hijack a logged-in user’s session by stealing cookies which means that a malicious hacker can change the logged-in user’s pass...
CVE-2020-25646
PUBLISHED: 2020-10-29
A flaw was found in Ansible Collection community.crypto. openssl_privatekey_info exposes private key in logs. This directly impacts confidentiality
CVE-2020-26205
PUBLISHED: 2020-10-29
Sal is a multi-tenanted reporting dashboard for Munki with the ability to display information from Facter. In Sal through version 4.1.6 there is an XSS vulnerability on the machine_list view.