Virtual Tarzan - Transformation Architect
  • Home
  • About
  • Contact me

Recent Comments

  • Pane on Cloud Chaos to Cloud Control: The Governance Playbook You Need Now
  • TJ on Cloud Chaos to Cloud Control: The Governance Playbook You Need Now
  • Mike A on Cloud Chaos to Cloud Control: The Governance Playbook You Need Now
  • Virtual Tarzan on Crafting an Effective Enterprise Multicloud Strategy
  • James on Crafting an Effective Enterprise Multicloud Strategy

Categories

  • AI-ML
  • Azure Architecture
  • Citrix
  • Cloud
  • Cloud Architecture
  • Cloud Security
  • Cloud Strategy
  • Compliance
  • Digital Transformation
  • EUC
  • General
  • Infrastructure Design & Architecture
  • IT Strategy
  • Networking
  • Storage
  • Troubleshooting
  • vCloud
  • VMware
  • vSphere

Archives

  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • January 2024
  • October 2023
  • August 2023
  • July 2023
  • April 2023
  • February 2023
  • January 2023
  • September 2021
  • June 2021
  • January 2021
  • November 2020
  • July 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • July 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • January 2017
  • October 2016
  • April 2016
  • March 2015
  • January 2015
  • November 2014
  • October 2014
  • September 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • August 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012

Follow me

Virtual Tarzan - Transformation Architect
  • Home
  • About
  • Contact me
Infrastructure Design & Architecture, Storage,

iSCSI Requirments to Design

As they say behind every great implementation there is a great design! Unfortunately many of the poor implementations are due to a poor or even lack of planning. Storage is a key component that is the heart of a virtual data center. So in this post I will share a use case scenario based on a real life project focusing on translating storage requirements into the design.

Company ABC just adopted virtualization (greenfield implementation) and are looking to invest in a new storage array to replace their older SAN.The IT Director wants to go with a storage that will utilize their current Ethernet network to keep cost of infrastructure down.

The Director also asked for a block based storage for some of their mission critical workloads. Also data metrics collected showed heavy traffic at certain peak times. The client also need high availability built in. Finally, the security officer has concerns about security of this new virtual infrastructure and wants assurance it will be as secure as possible.

The above scenario is fairly typical so lets look for the requirements within those words!

– “Block based storage that will utilize their current Ethernet infrastructure”. This is more of constraint than a requirement as it restricts your choice as an Architect in the type of storage you adopt in your design. The choice here is iSCSI storage (or FCoE but for cost reasons we are going ahead with iSCSI).
– “High availability built in”. From a storage aspect that means multiple paths built into the design to mitigate the risk of a path failure from host server to SAN. Also alarms need to be set up to be triggered when the Storage Path Redundancy or storage connectivity is lost.
– “Heavy storage traffic”. I often see vLANs used to address heavy traffic. This will not help. Instead you need to explore a few options:
a) Enable Jumbo frames for iSCSI traffic to increase storage traffic efficiency.
b) 10Gb Ethernet is another option in dealing with heavy iSCSI traffic.
c) Use switches with a better backplane I/O capacity is another possibility.

As an Architect, you want to discuss these options with the client to get their buy-in. Some clients might resist jumbo frames use. Others might pause at the cost of upgrading infrastructure (costly switches, NICs, and upgraded cabling) to support 10Gb network.Also buying more capable switches will require a bigger investment Getting the buy-in from stakeholders is a key to avoid “misunderstandings” down the road.
– “As Secure as possible”. iSCSI traffic is not encrypted so it is vital to secure it to avoid a bad day at the office! There are different ways to secure it:
i) Virtual isolation through a separate vLAN for the iSCSI traffic. This way the traffic will be isolated and not get routed.
ii) Use CHAP Authentication. Use Challenge Handshake Authentication Protocol “CHAP” for authentication between iSCSI initiators and targets. However although CHAP is secure, it is subject to offline dictionary attacks using brute force.This leads to the next option IPSec.
iii) IPSec. When we say IPsec we could be refering to two possible areas: AUthentication and Encryption. On the authentication side, IPsec is another option for securing iSCSI traffic. This is done by authentication using per-shared keys (similar to CHAP). The major difference between IPsec and CHAP is IPsec provides the advantage of support of stronger authentications such Kerberos and certificate-based authentications. The downside of IPSec is it is not as widely supported by storage vendors as CHAP is. However, in this case IPsec Authentication will be used once the support by storage vendor has been confirmed to provide the highest level of security requested by client. IPsec authentication authenticates the integrity for data communication but does not provide any type of encryption.
IPsec encryption, although it does encrypt the traffic it does come with an overhead that could lead to degradation in performance.It is needed if your iSCSI traffic is going through unsecured networks but in our scenario, this is not the case, therefore encryption is not needed.
iv) Use dedicated storage switches that exclusively handle iSCSI traffic to secure storage transport.

This was just a quick high level view of translating business requirements into technical requirements in the design.

Thank you for reading.

Nick

Sharing is Caring!

Something went wrong with the twitter. Please check your credentials and twitter username in the twitter settings.

Previous

Sizing up the VMware Horizon View Infrastructure

March 16, 2014
Next

Not all I/Os are created equal

April 27, 2014

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Related posts

General, Storage,

Storage Performance Demystified: A Comprehensive Guide to IOPS, Latency, Throughput, and Beyond

Blackboard
Storage, VMware, vSphere,

SIMPLE calculation for sizing your VMware Datastore

Citrix, EUC, Infrastructure Design & Architecture,

What tools to use to collect data in EUC/VDI project

EUC, Infrastructure Design & Architecture, VMware,

VMware Horizon’s View Graphics Rendering Types

Storage,

Not all I/Os are created equal

Citrix, Infrastructure Design & Architecture,

High level view of Citrix XenDesktop 7 components

Recent Comments

  • Pane on Cloud Chaos to Cloud Control: The Governance Playbook You Need Now
  • TJ on Cloud Chaos to Cloud Control: The Governance Playbook You Need Now
  • Mike A on Cloud Chaos to Cloud Control: The Governance Playbook You Need Now
  • Virtual Tarzan on Crafting an Effective Enterprise Multicloud Strategy
  • James on Crafting an Effective Enterprise Multicloud Strategy

Categories

  • AI-ML
  • Azure Architecture
  • Citrix
  • Cloud
  • Cloud Architecture
  • Cloud Security
  • Cloud Strategy
  • Compliance
  • Digital Transformation
  • EUC
  • General
  • Infrastructure Design & Architecture
  • IT Strategy
  • Networking
  • Storage
  • Troubleshooting
  • vCloud
  • VMware
  • vSphere

Archives

  • September 2024
  • July 2024
  • June 2024
  • March 2024
  • January 2024
  • October 2023
  • August 2023
  • July 2023
  • April 2023
  • February 2023
  • January 2023
  • September 2021
  • June 2021
  • January 2021
  • November 2020
  • July 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • July 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • January 2017
  • October 2016
  • April 2016
  • March 2015
  • January 2015
  • November 2014
  • October 2014
  • September 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • August 2013
  • March 2013
  • January 2013
  • December 2012
  • November 2012
  • October 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012

Follow me

  • Home
  • About
  • Contact me

© 2019 http://virtualtarzan.com. All rights reserved.