Plan the data protection mechanism for the virtual infrastructure

Source: Internet
Author: User

As an IT manager for a small and medium-sized enterprise, you may have heard of the advantages of virtualization technology. The next step is to easily handle the work of migrating to a virtual infrastructure and ensure that the virtual infrastructure is protected effectively.

First, it's important to know what you're going to do to plan your virtual infrastructure and then choose the right data protection mechanism. One of the most important tasks is to identify and select the capabilities and limitations of the data protection mechanism in your virtual infrastructure.

In order to simplify, this paper gives the virtualization platform to VMware ESX as an example. In addition to the last step: determining the right deployment method, the following procedures are the same for Microsoft Hyper-V, virtual iron, and other virtualization platforms.

What applications should I virtualize?

With the current virtualization technology, almost all applications can be virtualized. You simply select a reasonable set of applications and then assemble the following information:

1. Verify the characteristics of the selected application in the load state.

It is absolutely important to describe the characteristics of these applications under the maximum expected load, or you will start to experience a sudden run out of resources after you deploy your virtual infrastructure.

• Total Memory footprint

How much memory does an application consume under peak load? If the application "leaks" memory (even under a constant load, memory footprint becomes larger), you need to make room for that.

• Total CPU occupancy rate

How many CPUs are used and what percentage is the peak load? When you are measuring, don't forget to write down the type of CPU you are using.

• Total disk space, including the disk space required for growth before the next budget cycle

• Network bandwidth occupancy rate

The network bandwidth that an application occupies under a peak load. Remember to take into account the network traffic in and out of two directions.

• Storage network throughput as input and output (SCSI, Fibre Channel, iSCSI, and network-attached storage)

For messaging networks, you should also consider this.

• Read and write disk

The disk activity that an application requires in a load state. You may also want to describe the characteristics of other disk load parameters, depending on your application.

• Memory bus occupancy estimate, that is, the available bandwidth of the memory bus-(total I/O bandwidth) x 4

Years of empirical data have confirmed this practical rule of thumb. Because it is not always easy to verify the memory bus speed of a system, it may be difficult to get this number.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.