Feeds

I, for one, welcome our VMware VSAN overlord

Though I wish it would open up a bit...

Securing Web Applications Made Simple and Scalable

Storagebod So VSAN is finally here in a released form. On paper, it looks very impressive.

I spend an awful lot of time looking at scale-out storage systems – looking at ways to do them faster, cheaper and better. And although I welcome VMware and VSAN to the party, I don’t think I’m really the target market: the product’s not really ready or appropriate for media and entertainment or anyone interested in hyperScale.

But even so, I’ve got thoughts that I’d like to share.

Is VSAN better because it runs in the VMware kernel? This seems logical but this has tied VSAN to VMware in a way that some of the competing products have not. For example, if I want to run a Gluster Cluster – which encompasses not just VMware but also XEN, bare metal and anything else – I could. And there might be some excellent reasons why I would want to do so. Perhaps I’d transcode on bare-metal machines but might present out on VM-ed application servers, for example. Of course, it is not only the media and entertainment industry which has such requirements – there are plenty of other places where heavy lifting would be better done on the bare metal.

Open house party?

I think that VMware needs to be much more open about allowing third-party access to the kernel interfaces. It should allow more pluggable options so I could run GPFS, ScaleIO, Gluster, Stornext within the VMWare kernel.

VSAN limits itself by tying itself so closely to the VMware stack; its scalability is limited by the current cluster size. There are plenty of good architectural reasons for doing so, but some of these are enforced by a VMware-only mindset.

And why limit yourself to only 35 disks per server? An HP ProLiant SL4540 takes 60 disks and there are SuperMicro chassis that take 72 disks. Increasing the spindle count not only increases the maximum capacity but the RAW IOps of the solution. Of course, there might be some saturation issues with regards to the inter-server communication.

Yet, I do think it is interesting how the converged IT stacks are progressing. VMware itself is pretty much a converged stack now but it is a software converged stack; VCE and Nutanix, on the other hand, converge onto hardware as well. And yes, VMware is currently the core of all of this.

I actually prefer the VMware-only approach in many ways as I think I could scale computer and storage separately within some boundaries. Additionally, I’m not sure what the impact of having unbalanced clusters will be on VSAN. Would make sense to have some Big Flipping Dense VSAN appliances rather than distributing the storage equally across the nodes?

VSAN is certainly welcome in the market: it certainly validates the approaches being taken by a number of other companies – I just wish it were more flexible and open. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.