Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

11/10/2009
08:36 AM
George Crump
George Crump
Commentary
50%
50%

Storage Services As A Virtual Machine

Traditionally storage systems and other storage related services have been delivered as customized systems. This was done to maintain performance and to reduce support costs to the manufacturers. As server technology continues to increase in performance, the concept of providing storage services as a standalone application installed on your own server hardware is becoming increasingly popular. Now with virtualization the storage as an application concept is being applied to virtual machines.

Traditionally storage systems and other storage related services have been delivered as customized systems. This was done to maintain performance and to reduce support costs to the manufacturers. As server technology continues to increase in performance, the concept of providing storage services as a standalone application installed on your own server hardware is becoming increasingly popular. Now with virtualization the storage as an application concept is being applied to virtual machines.There are many techniques to running storage applications as virtual machines and this series will look at those and provide some information on what is best for your environment. The first decision is of course to decide how you want to apply storage in your environment. The traditional method of a stand alone customized storage system will still have merit for a long time. Certain environments are just going to need the high performance and high reliability of these systems.

For a growing number of environments, off the shelf standard storage hardware is going to offer more than enough performance. As we discuss in our article "Virtual Storage Infrastructure", with more powerful servers storage software can take center stage. In fact some vendors claim that they can out-perform specialized systems with standard hardware. Companies like StarWind Software, DataCore, Nexenta and FalconStor all can convert a group of servers into a highly available storage server. This does still require a storage network to be installed and stand alone servers be used, but it does provide a predictability of performance.

The other option is to leverage the server virtualization environment and use it to provide a virtual appliance to run various storage services. The above companies as well as HP's Lefthand Networks and EMC's Celerra and Avamar products can run as virtual machines. The advantage is that these storage services can be provided without using an additional piece of server hardware and they provide the manufacturer with a somewhat consistent hardware configuration, although virtual, to be able to baseline their support efforts against.

In most cases these virtual appliances will use the locally attached storage of a particular host and in others they will aggregate the storage across multiple hosts within the server virtualization cluster. As we walk through the various offerings we will detail how the storage is utilized and accessed as well as how high availability is achieved.

The consideration with storage as a virtual appliance is what will the impact on the other virtual machines be and what will the impact on storage performance be? Clearly this style of achieving shared storage and advanced storage services is not for everyone. Again however, if you have modest workloads or have a fair amount of excess compute capacity in your server virtualization cluster it is certainly something that should be considered.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30481
PUBLISHED: 2021-04-10
Valve Steam through 2021-04-10, when a Source engine game is installed, allows remote authenticated users to execute arbitrary code because of a buffer overflow that occurs for a Steam invite after one click.
CVE-2021-20020
PUBLISHED: 2021-04-10
A command execution vulnerability in SonicWall GMS 9.3 allows a remote unauthenticated attacker to locally escalate privilege to root.
CVE-2021-30480
PUBLISHED: 2021-04-09
Zoom Chat through 2021-04-09 on Windows and macOS allows certain remote authenticated attackers to execute arbitrary code without user interaction. An attacker must be within the same organization, or an external party who has been accepted as a contact. NOTE: this is specific to the Zoom Chat softw...
CVE-2021-21194
PUBLISHED: 2021-04-09
Use after free in screen sharing in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
CVE-2021-21195
PUBLISHED: 2021-04-09
Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.