Category: News

Just how many Virtual Volumes (VVols) can a VM have?

This is a follow-up to my previous post on VVols commenting on The Register’s VVol article. I’ve seen this question come up often so I wanted to provide some detailed information on the minimum, average and maximum amount of VVols a VM can have. This has a direct impact on the scalability of VVols as the number of VVols that can be supported on a storage array varies by vendor, I’ve seen some as low as 1,000 and other over 100,000. Let’s first start with the number of VVols that can be bound to a single host, right now that number is 64,000, although I’m pretty sure that number was 4,096 initially and has been subsequently increased in vSphere 6.0 updates. VMware doesn’t version control or have update dates on their vSphere 6 max config guide so you can’t see what has changed in vSphere point releases.

Minimum # of VVols per VM:

The minimum number VVols a powered-off VM with one virtual disk will have is 2 (config, data), once a VM is powered on a swap (vswp) VVol is created which increased that number to 3, the swap VVol is then deleted when a VM is powered off. For any additional virtual disks that a VM has there will be another VVol created. So a powered on VM with 3 virtual disks will have a minimum of 5 VVols associated with it (1-config, 3-data, 1-swap). For any VM snapshot that is created it will add at least one additional VVol per virtual disk (plus an additional if memory state is selected).

Average number of VVols per VM:

This one is a hard one to calculate as every environment varies, the big influencer here is the amount of VM snapshots that you normally maintain. You’ll typically have at least one per VM a night when your backup jobs are running, but that is removed after the backup completes. If you’re one that takes a lot of VM snapshots, calculate the average number per VM that are running concurrently then add 3 (min) to approximate your average number. Based on what I’ve seen and heard so far from customers I’d put the average number of VVols per VM at around 7-10. If you multiply that times that number of VMs that you plan to run on an array, this number should be well under the max VVols supported by the array.

Maximum # of VVols per VM.

This one is easy to calculate by simply doing the math. The maximum number of VVols a powered-on VM could have is around 2,000:

  • 1 – config
  • 1 – swap (one memory file per VM)
  • 60 – data (max # of virtual disks per VM)
  • 1,920 – snapshots (60×32 – max # of snapshots a VM can have is 32 times max # of virtual disks)
  • 32 – snapshot memory state (based on max # of snapshots a VM can have, one for each)

Now this is the theoretical maximum, I don’t think you’ll see anyone running VMs with 60 virtual disks and 32 active snapshots.

Again the maximum number of VVols supported by a storage array is up to each vendor to decide what they want to support. The maximum number of VVols that vSphere can support is a pretty high number, the only maximum that VMware has published is the amount of VVols that can be bound to a single host which is 64,000. Hosts can see more than 64,000 VVols on a storage array but they can only bind (powered on VM) to a max of 64,000 of them at any one time. Given that a host has a max limit of 1,024 VMs, 64,000 VVols per host is a pretty high limit.

We can calculate the theoretical maximum of VVols in a vCenter cluster by doing the math:

  • 60 – max # of virtual disks per VM
  • 32 – max number of snapshots per virtual disk
  • 10,000 – max number of VMs per vCenter cluster

This make the theoretical maximum in a vCenter cluster around 19 million total VVols, again I don’t think you will see any environments this size but you can see that very large environments will require an array that can support a large number of VVols. If we used 8 VVols per VM which is in my range of averages above, the numbers would come out to for different size environments around:

  • 250 VMs – 2,000 VVols
  • 500 VMs – 4,000 VVols
  • 1,200 VMs – 9,600 VVols
  • 3,000 VMs – 24,000 VVols
  • 4,800 VMs – 38,400 VVols
  • 6,000 VMs – 48,000 VVols

So when planning your migration to VVols keep these numbers in mind, do the math based on your own requirements and make sure your results are in line with your array vendors supported VVol limits.

Share This:

Analyzing The Register’s latest article on VVols

The Register just published another article on VMware’s new Virtual Volumes (VVols) storage architecture and why I agree with a lot of it I thought I would provide some clarification and analysis of parts of it.

The first part hits on end user adoption of VVols, or rather the lack of, I’ve addressed that before so rather than rehash all those reasons for it you can go read that here, here and here. VVols is barely a year old and frankly I would expect low adoption of any new technology in less than a year, look at where VSAN was a year after it’s one year release.

Next it talks about the complexity of VVols, well of course it’s complex, it’s an entire new storage architecture that was many years in the making and required entire new T-10 specs to support it. You can go read VMware’s patent on VVols if you really want to know more about it or the new T-10 specs they submitted on bind/unbind operations and conglomerate LUNs. There are lots of new components with VVols and I don’t think you will hear any storage vendor say it was easy to implement, we’ve spent over 4 years developing our support at HPE.

In comparison look at just about anything in a VMware environment and you will see design complexity, hypervisor scheduling, virtual switches and memory management certainly aren’t easy to implement. The key distinction though is why it may have been complex for VMware and storage vendors to implement VVOls on the back end, it’s by design made to be less complex for vSphere admins. End users don’t have to look at complex architecture diagrams and component relationships for VVols, all they care about is what they see and do in the vSphere client.

Next it covers the VVol architecture which has a lot of new components, if you want to know more about that check out my VMworld session on VVols. It also talks about the number of VVols that arrays will have to support, I’m not sure all the math is accurate, a VM will always have a minimum of 2 VVols when powered off (config/data) and 3 when powered on (+vswp) and then additional VVols for snapshots as needed, I’ll do a separate post that covers this in more detail, the theoretical max VVols in a vSphere cluster is 19 million and the theoretical max for a single VM is around 2,000. We’ve had feedback from customers that are looking to do large scale implementations of VVols and based on their requirements they estimated about 7 VVols per VM.

On array VVol limits, this is more of a challenge for block arrays that are used to dealing with LUNs in the hundreds instead of sub-LUNs in the thousands. I’ve seen some vendor implementations as low as 1,000, with 3PAR it’s at 128,000. NAS arrays are already used to dealing with large amounts of objects so I have seen some vendors claim support in the millions.

On the array controller side it required changes as well as arrays controller and arrays had to understand protocol endpoints, bindings and special LUNs that have conglomerate status (admin LUN) with bindings to secondary LUN IDs (subLUNs). As far as VASA Providers go they most definitely don’t need to be external and Window’s based, it’s up to vendors to choose how to implement this, most have gone external but some have embedded the VASA Provider in the array. VVols does have it’s own HCL for vendors that are certified to support VVols, I just posted an update on this earlier this week.

The bottom line is, yes VVols is a complex architecture, yes vendor implementations vary, yes many vendors are way behind on support, yes it needs to mature more but I think overall the benefits VVols brings will overcome all this. A year from now I predict you will see much higher adoption of VVols as VASA 3.0 will address some current shortcomings, storage vendors will get caught up with VVols development and customers start to embrace it. Like any new technology it takes time for partners and the entire VMware ecosystem to catch up but once they do you will eventually see VVols as the de facto standard for external storage arrays.

Share This:

Another day, another blog hack – here’s how to scan and protect your WordPress blog

hackedIf you are running a WordPress blog chances are it will be hacked at some point due to the many vulnerabilities that are constantly being uncovered in both WordPress and plug-ins. I’ve had hacks several times over the years to this blog and recently just came across another. There was nothing obvious to this hack and I probably would never have noticed it except for google search results for my site returning the disclaimer “This site may be hacked”. Google can detect hacks when it crawls a site and does a fetch as if it detects anything potentially malicious it will flag that site in search results.

I’ve become pretty WordPress savvy, I know my way around the core files, themes and the database very well and can typically spot anything that looks hacked. This one was a bit tough and took me at least 4-5 hours to uncover. As I mentioned the site looked normal but if you looked in the page code I could see spam text and links in there. So determined to find the cause I went through my usual troubleshooting process.

  1. Get a ftp client like FileZilla and check the obvious files like index.php and .htaccess, I did find a few index.php’s scattered around which looked suspicious so I removed them all except for the one in the root directory but that didn’t fix it.
  2. Look for .php files that don’t belong, I know the core WordPress files well so I know what shouldn’t be there, didn’t really find anything.
  3. Check your wpconfig.php file, this one contains your database and other config info an dis a commonly hacked file, mine was OK.
  4. Check your WordPress tables, I use PHPMyAdmin to browse the db tables, the WP_OPTIONS table is the main config table and is another commonly hacked table. I’ve had malicious rows injected in this table in the past, this time mine was OK. An easy way to look through all your table data is just export it to a .sql file and open it in a text editor.
  5. Check your plug-ins, I disabled most of them and tested my site and the problem was still there. So that eliminated the plug-ins as the cause. One key thing to check though is to look for hidden plug-ins in the Active Plugins row in your WP_OPTIONS table.
  6. Replace WordPress core files, I downloaded a copy of 4.4.2 and manually ftp’d the files in the wpadmin and wpincludes to the server to overwrite them with fresh copies, also the wp*.php files in the root directory. That didn’t help in my case.
  7. Check your theme, I confirmed the theme was the culprit by switching to another theme and the hack disappeared. I didn’t want to replace my theme with a fresh copy as a I did some hacking and customization to it to get it exactly like I wanted it. I did examine all the files looking at date stamps and did notice one way newer then the other, it was a theme-search.php file, when I opened it there was a bunch of obfuscated text in it, definitely looked suspicious. I did have multiple backups so I compared the contents of them and that file was definitely not there before. So I deleted that file but the hack was still there. Next I copied all the theme files from the backup overwriting the current ones and that did the direct. I suspect some of the theme files were altered but in a way that preserved their data/time stamps.

Now that the hack was gone, I went to Google Webmaster Tools and requested a Fetch of my site which basically has the Google bots re-crawl it. A few hours later my hack message in Google search was gone. It’s a good idea to periodically check your blog for vulnerabilities, malicious code and hacks. Here’s some tools to help you with this by checking your site externally:

  • Aw Snap – has a good collection of tools and information to both check your blog for malicious code and recover from hacks. The File Viewer will check a website for malicious redirects, malicious scripts and other bad stuff.
  • Is It Hacked? -checks to see if your site is cloaked to GoogleBot, has spammy links, funny redirects, or otherwise appears to be hacked. They’ll fetch your site and analyze it for signs of an infection by doing multiple checks, from detecting spam links, hidden text, up to sophisticated cloaking.
  • Sucuri SiteCheck – will check the website for known malware, blacklisting status, website errors, and out-of-date software.
  • Google WebMaster Tools – add your site as a property and then you can see any security issues that Google has detected when they crawl your site, you can also request a re-crawl (fetch) of your site.

You should also check your site internally as well, external scanning can’t check your files and database so you need a security plug-in to scan internally. Here’s a couple good ones, I wouldn’t recommend having these all active simultaneously but sometimes one scanner will find something that another doesn’t so it’s good to activate and use them one by one and use the one that works best for you:

  • Wordfence Security – I liked this one the best, has tons of customization option for scanning and real-time protection. It does vulnerability scanning, user monitoring, anti-virus, firewall, high speed cache and much more. It does a deep server-side scan of your source code comparing it to the Official WordPress repository for core, themes and plugins, it also checks your WordPress database.
  • Theme Authenticity Checker (TAC) – searches the source files of every installed theme for signs of malicious code. If such code is found, TAC displays the path to the theme file, the line number, and a small snippet of the suspect code.
  • Exploit Scanner – searches the files on your website, and the posts and comments tables of your database for anything suspicious. It also examines your list of active plugins for unusual filenames.
  • Sucuri Security – a security suite meant to complement your existing security posture. It offers it’s users four key security features for their website, each designed to have a positive affect on their security posture.
  • Anti-Malware Security and Brute-Force Firewall – searches for Malware, Viruses, and other security threats and vulnerabilities on your server and it helps you fix them.
  • All In One WP Security & Firewall – will take your website security to a whole new level. this plugin is designed and written by experts and is easy to use and understand.It reduces security risk by checking for vulnerabilities, and by implementing and enforcing the latest recommended WordPress security practices and techniques.
Share This:

EMC arrives to the VVols party fashionably late

VMware’s new storage architecture, Virtual Volumes (VVols) has been out for almost a year now but vendor support for it has been fairly sluggish. On Day 1 of the vSphere 6 launch only 4 vendors supported it (HPE, IBM, NEC & SanBlaze) with additional vendors slowly starting to support it after that. Most of the other big storage vendors (HDS, Dell, NetApp) supported it within a few months of launch but EMC stood out as the only big storage vendor that has really lagged behind on VVol support. That has changed as EMC finally has limited support for VVols only on their high end VMAX platform. I expect you’ll see it come to the VNX platform next as they already have a virtual appliance (vVNX) that supports VVols. As it stands today the vendors that support VVols are:

  • HPE
  • HDS
  • IBM
  • Dell
  • NetApp
  • EMC
  • NexGen
  • Tintri
  • NEC
  • SANBlaze
  • Huawei
  • Fujitsu
  • DataCore

Note the protocols supported and array family/model support varies by vendor, check the VVol HCL for more information on what exactly is supported by each vendor. Notably absent with VVol Support is:

  • Pure Storage
  • Nexenta
  • SolidFire
  • Simplivity
  • Nimble
  • Tegile
  • Nutanix

You’ll also note that there are no VSA’s that support VVols today, DataCore has support but they are not really a true VSA. Eventually you’ll see all the vendors come on board with VVol support, it certainly is no easy task to engineer this into arrays as evidenced by the slow trickle of supported vendors. If your vendor does not support it today check with them as I’m sure it’s on their roadmap and also ask about the important details such as which capabilities they will support, how they will scale (# of VVols) and how their VASA provider is implemented. For more information on VVol support in general and specific to each vendor check out my big VVol link collection.

Share This:

Last call for blog-o-hol before Top vBlog 2016 begins

last-call-sponsors-300x133I’ve added lots of new blogs to my vLaunchpad but I’m sure there are some that I’ve missed. Every year I get emails from bloggers after the voting starts wanting to be added but once it starts its too late as it messes up the ballot. I’ve also archived a bunch of blogs that have not blogged in over a year in a special section, those archived blogs still have good content so I haven’t removed them but since they are not active they will not be on the Top vBlog ballot. In addition for the first time blogs must have at least 10 posts last year to be included on the ballot.

So if you’re not listed on the vLaunchpad, here’s your last chance to get listed. Please use this form and give me your name, blog name, blog URL, twitter handle & RSS URL. So if you haven’t submitted your blog here’s your last chance to do it so you don’t miss out on the recognition and cool commemorative coin that the top 50 blogs will receive. So hurry on up so the voting can begin, the nominations for voting categories will be opening up very soon.

Share This:

HPE snatches up one of the last remaining small backup companies

There have been a number of small backup companies that were formed years ago to fill the data protection void that was created by virtualization. Over the years many of these companies have been snatched up by larger companies and now one of the last remaining small companies has been bought out. Trilead, the creators of a popular free tool, VM Explorer was recently purchased by Hewlett Packard  Enterprise for an undisclosed amount. Before I go into that let’s take a look at the original players in that SMB backup space and look at where they are at now.

  • Vizioncore vRanger – Founded in 2002 and one of the original big 3 SMB backup products for virtualization, they were acquired by Quest Software in 2008 and then by Dell in 2012.
  • PHD Virtual – Founded in 2005 and another of the original big 3 SMB backup products, they were acquired by Unitrends in 2013.
  • Veeam Backup & Replication – Founded in 2006 and the last member of the big 3 SMB backup products, Veeam was the most successful and has grown so large they rival the big players like Symantec.
  • AppAssure – Founded in 2006 and acquired by Dell in 2012.
  • vSphere Data Protection – VMware’s foray into data protection, started life as vSphere Data Recovery (VDR) in 2009 and was a pretty limited and basic solution. VMware killed it off and replaced it with vSphere Data Protection (VDP) in 2012, VDP is based on EMC Avamar technology to provide a more robust and mature solution then VDR.

And that leaves us with Trilead which was founded in 2007, their VM Explorer product allowed you to do VM file management as well as backup and recovery of VMs. Their product started out fairly basic but has evolved a bit over the years and is very affordable (Pro Edition $790/Enterprise Edition $1460). The licensing cost is per site for use with unlimited hosts and virtual machines. They also offer a limited free edition that has been very popular. Their latest version 6.0 release added automatic backup testing, cloud backup, a new web interface as well as support for Microsoft Hyper-V 3.0.

So why did HPE snatch them up when they already have a backup product in-house, Data Protector. That surprised me at first, but when I thought about it for a while it made sense. while Data Protector is a enterprise level, very robust and highly scalable backup product, it’s a bit too complex and costly for the low-end SMB market. So it seems like rather than trying to bring Data Protector down to the low end they opted to purchase a product that is already there.

As far as I know Trilead was one of the smallest players in the SMB backup space so I’m sure the move was more about getting the Trilead intellectual property than it is about getting their customer base. It will be interesting to see what HPE does with it, I imagine at some point they will roll it into the Data Protector family name. The product should definitely get a development boost which will be good for current customers but I rather doubt that they will keep the price as cheap as it is today. The official word from HPE is below:

[important]As part of our strategic focus and investment in virtualization, HPE has acquired Trilead, a next-generation provider of VM backup software that supports both VMware vSphere and Microsoft Hyper-V. Trilead provides HPE with a virtualized environment backup platform that is highly complementary with HPE’s Data Protector suite. HPE customers can expect the same level of service and support with the enhanced capabilities that Trilead’s technology brings to our portfolio.[/important]

Share This:

Top 12 essential plug-ins every WordPress blog should have

I’ve been using WordPress to host this blog for over 5 years and I’ve found plug-ins to be an invaluable way to enhance and protect my blog. There are literally thousands of plug-ins that you can add to WordPress that cover just about any functionality that you can think of. Trying to sort through them all and find the good ones can be a challenge though. I thought I would share what I use with this blog and get feedback from other bloggers on the plug-ins that they use as well.

  • Wordfence Security – Must have plug-in to secure your WordPress blog and protect it from hackers. A Swiss army knife of plug-ins it does vulnerability scanning, user monitoring, anti-virus, firewall, high speed cache and much more. Wordfence starts by checking if your site is already infected. We do a deep server-side scan of your source code comparing it to the Official WordPress repository for core, themes and plugins. Then Wordfence secures your site and makes it up to 50 times faster
  • UpdraftPlus Backup and Restoration – Another must have plug-in to protect your valuable content via scheduled backups.UpdraftPlus simplifies backups (and restoration). Backup into the cloud (Amazon S3 (or compatible), Dropbox, Google Drive, Rackspace Cloud, DreamObjects, FTP, Openstack Swift, UpdraftPlus Vault and email) and restore with a single click. Backups of files and database can have separate schedules.
  • Ninja Forms – Ninja Forms is the easiest way to build any form you need for your WordPress website. No longer mess with code or worry about made-up limitations. Create the form you want, when you want with a simple drag and drop interface provided by the very powerful Ninja Forms framework.
  • TablePress – TablePress allows you to easily create and manage beautiful tables. You can embed the tables into posts, pages, or text widgets with a simple Shortcode. Table data can be edited in a speadsheet-like interface, so no coding is necessary. Tables can contain any type of data, even formulas that will be evaluated.
  • Page Links To – This plugin allows you to make a WordPress page or post link to a URL of your choosing, instead of its WordPress page or post URL. It also will redirect people who go to the old (or “normal”) URL to the new one you’ve chosen.
  • Contact Form 7 & Contact Form DB – Contact Form 7 can manage multiple contact forms, plus you can customize the form and the mail contents flexibly with simple markup. The form supports Ajax-powered submitting, CAPTCHA, Akismet spam filtering and so on. The “CFDB” plugin saves contact form submissions to your WordPress database and provides and administration page and short codes to view and display the data.
  • Captcha by BestWebSoft – The Captcha plugin adds a captcha form into web pages. This captcha can be used for login, registration, password recovery, comments forms. It protects your website from spammers by means of math logic, easily understandable by human beings. All you need is to do one of the three basic maths actions – add, subtract and multiply.
  • Jetpack by WordPress.com – Jetpack simplifies managing WordPress sites by giving you visitor stats, security services, speeding up images, and helping you get more traffic.
  • WP-Optimize – WP-Optimize is an extensive WordPress database cleanup and optimization tool. It doesn’t require PhpMyAdmin to clean and optimize your database tables.
  • WPTouch – WPtouch is a mobile plugin for WordPress that automatically adds a simple and elegant mobile theme for mobile visitors to your WordPress website. Recommended by Google, it will instantly enable a mobile-friendly version of your website that passes the Google Mobile test, and ensure your SEO rankings do not drop due to not having a mobile-friendly website.
  • W3 Total Cache – W3 Total Cache improves the user experience of your site by increasing server performance, reducing the download times and providing transparent content delivery network (CDN) integration.
  • Yoast SEO – This plugin is written from the ground up to improve your site’s SEO on all needed aspects. While this Yoast SEO plugin goes the extra mile to take care of all the technical optimization, it first and foremost helps you write better content. Yoast SEO forces you to choose a focus keyword when you’re writing your articles, and then makes sure you use that focus keyword everywhere.
Share This:

New VMware White Paper: What’s New with VMware Virtual SAN 6.2

VMware released a new technical white paper to coincide with the announcement of VSAN 6.2, it goes into more detail on some of the new architecture features such as dedepulication, compression, erasure coding and QoS. The paper is written by Jase McCarty and Jeff Hunter from VMware and provides the missing technical details on VSAN 6.2 that you won’t find in the VMware announcements. Be sure and read my complete overview of VSAN 6.2 first and then give the technical paper a read and you’ll know everything you need to know about VSAN 6.2.

Share This: