Feeds

Physical vs virtual: What's your poison?

Power management and VDI

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

Worse yet is load balancing your virtual machines across your hosts. The major virtualization players offer some neat software that can do this automatically for you, but I might as well ask the magic budget fairy for a Toughbook. It isn’t going to happen, and thus, I load-balance my VMs by hand. This creates interesting conflicts when trying to weigh load balancing against power management and even critical VM distribution.

As much I want to power down all non-essential systems when not in use, I also don’t want a single hardware failure taking out all of the production VMs responsible for the manufacturing equipment in a single go. I must also ensure that critical VMs have full LOM capabilities in case there is a problem with the host, and it needs to be repaired remotely. As not all of my servers have full LOM capabilities, this means being choosy about which hosts they live on.

Virtualization has its power management bonuses too. Overall, even with leaving the servers running 24/7, I am consuming less electricity than if all VMs were physical desktops or blade servers. With everything that is required for after-hours work confined to the datacenter, I can actually shut off entire segments of the network at night. Switches, phones, desktops, monitors, printers and all other forms of electronic gadgetry.

Still, it is interesting how much virtualization can complicate the life of a sysadmin. The “eggs in one basket” syndrome common with VDI has power management implications of its very own. Intel would love to come along and tell me that with their ridiculous new shiny servers, I could collapse thirty-two virtual hosts into six. They’d even be right; I’ve run the numbers, and right now I can run my entire network on six ridiculous servers. Eighteen months from now I could run it on three.

If I did that, however, I’d be sitting there praying every night that those three servers don’t blow a stick of RAM or lose a CPU fan, or that rodents of unusual size chose not to have a gnaw on cat6. For this reason, I feel I am actually better off with my older servers; there is a “sweet spot” past which I feel a host simply has too many guests for comfort.

These problems laid bare, my next article will focus on what I’ve done to overcome these issues. Some approaches are technological, while others are matters of policy and procedure. I don’t have access to the really awesome tools used to make virtualization really shine, so it will be an investigation into VDI power management with nothing but the bare basics to help you. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.