Feeds

Is Trevor Pott-y? Nope – he's bang on about VSAN performance

Big Iron? Pah. Bare metal's nearer the mark

Internet Security Threat Report 2014

Storagebod I don’t always agree with fellow Reg storage man Trevor Pott but this piece on Server SAN, VSAN and storage acceleration is spot on with its questions about VSAN running in the kernel and the advantages that brings to performance.

Indeed, I’ve also heard comments about reliability, support and the likes over competing products. These are very much ones which have left me scratching my head and feeling very irritated.

If running VSAN in the kernel is so much better – and it almost feels that it should be – that in turn asks another question: would I be better off running all my workloads on bare metal, or as close to it as I can?

Perhaps VMware need to be allowing a lot more access to the kernel, or a pluggable architecture that allows various infrastructure services to run at that level. There are a number of vendors that would welcome that move and it might actually hasten the adoption of VMware yet further – or, at least, take out some of the more entrenched resistance around it.

I do hope more competition in the virtualisation space will bring more openness to the VMware hypervisor stack.

It does seem that we are beginning to move towards data-centres which host competing virtualisation technologies; so it would be good if, at a certain level, these became more infrastructure-agnostic. From a purely selfish point of view it would be good to have the same technology to present storage space to VMware, Hyper-V, KVM and anything else.

I would like to easily share data between systems that run on different technologies and hypervisors; if I use VSAN, I can’t do this without putting in some other technology on top.

Perhaps VMware don’t really want me to have more than one hypervisor in my data-centre, in the same way that EMC would prefer that all my storage was from them … but they have begun learning to live with reality and perhaps they need to encourage VMware to live in the real world as well. I certainly have use-cases that utilise bare metal for some specific tasks but that data does find its way into virtualised environments.

Speedy Storage

There are many products that promise to speed-up your centralised storage and they work very well, especially in simple use-cases. Trevor calls this Centralised Storage Acceleration (CSA); some are software products, some come with hardware devices and some are a mixture of both.

They can have some significant impact on the performance of your workloads; databases especially can benefit from them, although most databases benefit more with decent DBAs and developers; they are a quick fix for many performance issues and remove the bottleneck which is spinning rust.

But as soon as you start to add complexity, clustering, availability and move beyond a basic write-cache functionality they stop being a quick fix and become yet another system that needs managing and can go wrong at any moment.

Fairly soon that CSA becomes something a lot closer to a ServerSAN and you are sticking that in front of your expensive SAN infrastructure.

The one place that a CSA becomes interesting is as Cloud Storage Acceleration; a small amount of flash storage on server but with the bulk of data sitting in a cloud of some sort.

So what is going on?

It is unusual to have such a number of competing deployment models for infrastructure. Yet in storage, we do have an increasing number of deployment models.

  • Centralised Storage – the traditional NAS and SAN devices
  • Direct Attached Storage – Local disk with the application layer doing all the replication and other data management services
  • Distributed Storage – Server-SAN; think VSAN and competitors

And we can layer an acceleration infrastructure on top of those; this acceleration infrastructure could be local to the server, or perhaps an appliance sitting in the “network”.

All of these have use-cases. The answer may well be that to run a “large” infrastructure, you need a mixture of them all.

Storage was supposed to get simpler and we were supposed to be focusing on the data and providing data services. I think people forgot that just calling something a service doesn't make it simple; nor does it make the associated problems go away.

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
Oracle hires former SAP exec for cloudy push
'We know Larry said cloud was gibberish, and insane, and idiotic, but...'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.