How To Share Local Storage
By George Crump
InformationWeek
In this column we will discuss how those vendors are creating a SAN-less environment that still can provide capabilities like virtual machine migration while at the same time benefiting from the simplicity and performance of local storage. There are two common approaches to accomplish this feat: mirroring/replication and something we call the SAN-less SAN. In this column we will cover the mirroring/replication technique; we will discuss the SAN-less SAN in our next.
Mirroring/Replication
The simplest approach is a technique that leverages a mirroring or replication model. Basically an alternative host is designated and data from the first host is replicated to that host. A mirroring approach means that the data on the target host is 100% in sync with the data on the source host. A replication model means that the target host may be slightly out of sync with the source.
If the source host or a VM on the source fails or needs maintenance, the target host or VM can be moved into production. With the replication technique, the VM on the source has to be gracefully shut down for a clean startup on the target. The mirroring technique should be able to be started up instantly and should not need a graceful shutdown.
Initially, the mirroring or replication technique was popular in smaller data centers that simply needed availability more than they needed all the benefits of virtual machine migration. In fact, as we discuss in our article "For the Small to Medium-sized Company Backup is All About Recovery TIME" some backup applications now provide this functionality. They backup physical and virtual servers to a backup appliance and then in the case of failure or maintenance can host the virtual machine directly on the backup appliance. Essentially this solves two problems at the same time; providing virtual machine flexibility and data protection.
The mirroring concept, as we describe in our article "The Benefits of a Flash Only, SAN-less Virtual Architecture" is becoming more appealing to enterprises because it leverages PCIe SSDs installed inside of hosts and integrates with the fault tolerance software that comes with the hypervisors. This is a particularly interesting approach. It takes full advantage of the performance capabilities of PCIe SSD while at the same time provides automated, 30 second failover of failed VMs or hosts.
The downside of the mirroring/replication techniques is you need another copy of the virtual machine image for each physical server that you want to have the potential to host a particular virtual machine. In the smaller enterprise this may not be problem since capacity is inexpensive and they often get more than they need. Also remember that, as we discussed in our last column, local storage should be less expensive than shared storage.
Another downside is that the target VMs are consuming some level of CPU and memory resource on the target hosts on which they reside. Again, especially in the small enterprise and even in the large enterprise, there is often plenty of excess CPU.
Finally, there is the downside of loss of flexibility. With shared storage any server connected to it can typically host any VM. With the mirroring/replication technique you are limited to just the designated target. This shortcoming is overcome by the second technique, The SAN-less SAN which we will cover in an upcoming column. George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Storage Switzerland's disclosure statement.
Federal agencies must eliminate 800 data centers over the next five years. Find how they plan to do it in the new all-digital issue of InformationWeek Government. Download it now (registration required).
In-memory analytics offers subsecond response times and hundreds of thousands of transactions per second. Now falling costs put it in reach of more enterprises. Also in the Analytics Speed Demon special issue of InformationWeek: Louisiana State University hopes to align business and IT more closely through a master's program focused on analytics. (Free registration required.)
| To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy. |
Virtual Infrastructure Reports
Informed CIO: VDI Snake Oil Check
You won't lose your shirt on a desktop virtualization initiative, but don't expect it to be simple to build or free of complications. This report examines the three biggest problems when developing a business case for VDI: storage costs, ongoing licensing, and the wisdom of prolonging the investment in PC infrastructure.
Fundamentals: Next-Generation VM Security
Server virtualization creates new security threats while turning the hypervisor into a network black hole, hiding traffic from traditional hardware defenses -- problems a new breed of virtualization-aware security software tackles head-on.
Delegation Delivers Virtualization Savings
IT can't-and shouldn't-maintain absolute control over highly virtualized infrastructures. Instituting a smart role-based control strategy to decentralize management can empower business units to prioritize their own data assets while freeing IT to focus on the next big project.
The Zen of Virtual Maintenance
Server virtualization has many advantages, but it can also lead to chaos. Many organizations have unused or test VMs running on production systems that consume memory, disk and power. This means critical resources may not be available in an emergency: say, when VMs on a failed machine try to move to another server. This can contribute to unplanned downtime and raise maintenance costs. Easy deployment also means business units may come knocking with more demands for applications and services. This report offers five steps to help IT get a handle on their virtual infrastructure.
Pervasive Virtualization: Time to Expand the Paradigm
Extending core virtualization concepts to storage, networking, I/O and application delivery is changing the face of the modern data center. In this Fundamentals report, we'll discuss all these areas in the context of four main precepts of virtualization.
Virtually Protected: Key Steps To Safeguarding Your VM Disk Files
We provide best practices for backing up VM disk files and building a resilient infrastructure that can tolerate hardware and software failures. After all, what's the point of constructing a virtualized infrastructure without a plan to keep systems up and running in case of a glitch--or outright disaster.



Subscribe to RSS