Feeds

Storage upstart tells El Reg: Our software's NOT a VSA

It's an accelerator. So there

Application security programs and practises

Brouhaha Satyam Vaghani, the co-founder and chief technology officer of PernixData took exception to El Reg's characterisation of the startup's FVP software, which virtualises flash storage attached to virtualised servers and creates a single pool of block-addressable flash capacity across those servers.

From the small amount of information provided by the company about the new product, El Reg speculated that it would be like a disk drive-based Virtual Storage Appliance (VSA) such as HP's StoreVirtual (Lefthand) VSA. Vaghani said it is not. We had a discussion, and this is El Reg storage desk's understanding of PernixData's viewpoint.

According to its CTO, FVP is not a replacement for any other primary storage system but rather accelerates the execution of virtual machines - so if these VMs run VSAs then it will accelerate the VSA.

The company explains that any VSA networked storage provided through virtual machines (VMs), be it HP's StoreVirtual, a NetApp VSA or ScaleIO exports its capacity to applications with the vendor's ID and chosen protocol - iSCSI, NFS, etc. But if the VSA fails, then - in the same way it would if a storage array failed - you'd lose access to your data, which is, in a way, a definition of primary storage.

FVP is transparent to the primary storage, says PernixData. An EMC LUN still remains an EMC LUN, ditto HP or NetApp LUNs. The protocol remains the same - iSCSI, NFS, Fibre Channel, whatever. But if FVP fails or is closed, the primary storage stays in place, unlike in a situation where a VSA stops running.

From this explanation, it would appear FVP holds a copy of the primary storage data and is, effectively, a cache rather than a storage tier. "Cache" is my term and not PernixData's. With FVP pooling flash storage across servers, this would make it a distributed, virtualised cache.

But let's suppose a VSA doesn't fail and that it uses flash as well as disk. How would it compare to PernixData's SVP?

Again, this is my understanding of what happens. When an app in a VM using the VSA makes a data request it goes up into the hypervisor layer, down into the VSA, and then the reply, the data or acknowledgement, goes from the VSA up into the hypervisor again and down to the originating VM, making two hypervisor traversals. With FVP there is only one hypervisor to traverse, since it is in the hypervisor, which makes it faster.

Secondly, the more VMs using a VSA, the more likely there will be scheduling difficulties with the VSA scheduled less often, meaning the VMs are waiting for the VSA to run their IO requests and the VM is waiting to get scheduled.

My understanding now is that PernixData's FVP is not a VSA, rather it is a hypervisor-resident virtualised and distributed cache to accelerate apps in VMs by accelerating primary storage access transparently.

That said, how does it relate to VMWare's Virsto acquisition? Virsto's vDisk software is a VSA. Going by what PernixData has told us, FVP should accelerate it. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.