Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:30 AM
George Crump
George Crump

What Storage Is Best For Server Virtualization, Part II

In my last entry and the first part of this series we discussed some of the key capabilities to look for when selecting a server virtualization strategy, but as a friend of mine pointed out I never really declared one storage type the best. In this entry we will start to give you some steps to follow in making that selection.

In my last entry and the first part of this series we discussed some of the key capabilities to look for when selecting a server virtualization strategy, but as a friend of mine pointed out I never really declared one storage type the best. In this entry we will start to give you some steps to follow in making that selection.The reality is that there are so many variables in the selection process, many particular to your environment, that I'm not sure that anyone can tell you conclusively without knowing those details which solution is best. The truth is that almost any shared storage platform can be made to work for your server virtualization project. How much effort you put into making it work, how much time you have to spend keeping it working and how adaptable it is to change are really the key issues.

The first is to get as good a grasp as possible on the scope of your server virtualization project's storage needs. This is not just the amount of capacity required but also the number of physical servers that will be connected to that storage as well as how many virtual servers will those physical servers be supporting. From a virtual aspect I suggest doubling or even tripling what you think will be the most virtual machines that will be needed. Almost every virtualization project that I have been involved with ends up supporting far more virtual machines than it originally intended.

The number of hosts and the ensuing number of virtual machines has a direct impact on the next step; developing and understanding how much storage I/O you are going to need. The challenge with calculating storage I/O needs in a virtualized server environment is that the I/O demand is completely random. There are also two points of storage I/O contention. The storage bandwidth itself to connect the hosts to the storage and the I/O capability of the storage. The simplest solution, assuming you can afford it, is buying more network and storage I/O performance than you calculate you will need. For network I/O that may not be as far fetched as it sounds. For smaller organizations, often the performance of 1Gb iSCSI provides more than enough bandwidth. Up from 1GbE you don't have to be a big enterprise to justify as 10Gb Ethernet becomes increasingly affordable.

Getting I/O at the storage controller itself gets a little more challenging. The key to keeping storage simple in any environment but a server virtualization one in particular, is to limit the amount of discrete storage systems you have to manage. One system that can do it all is ideal, two is manageable, three or more can turn into a nightmare. I/O, or lack there of, is one of the issues that will drive you to an additional storage system quicker than others. To prevent this look for systems that affordably can give you more I/O performance than your environment will ever need or systems that can have I/O performance added to them without replacing the storage system.

In our next entry in this series we will look at more steps to take in narrowing down what storage is best for server virtualization in your environment.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).
PUBLISHED: 2021-06-16
Cross Site Scripting (XSS) in Moodle 3.10.3 allows remote attackers to execute arbitrary web script or HTML via the "Description" field.
PUBLISHED: 2021-06-16
In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" t...
PUBLISHED: 2021-06-16
D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the process crashes or changes.
PUBLISHED: 2021-06-16
D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify ...