Virtualization's Dirty Little Secret: The Other 30 Percent

By

Few technologies have garnered more attention over the past decade than server virtualization and for good reason.  Flash back 10 years ago, the average organization was suffering from some serious server sprawl issues.  “One app, one server,” was the battle cry in IT shops back then.  Security and predictable performance took precedence over efficiency and server utilization.

Hypervisors and virtual machines have helped tame that mess.  By enabling multiple applications to share memory, processing power and other resources on the same physical host server, virtualization has reduced costs and made IT shops more agile.  Need computing power for a new business application? Just provision a virtual machine on your host server and voila!  You’re in business.

However, there’s a dark side to virtualization.  It’s a secret that large IT shops know well but hardly ever gets mentioned in the trade press and certainly not by the vendors that peddle virtualization wares. 

The dirty little secret is this: traditional virtualization technologies are great for handling commodity work, but they are fundamentally unsuited for applications that organizations depend on to run their most important, sensitive, business-critical processes – such as those that drive customer relationships, financial transactions and supply chains – or mission-critical applications.

The reasons have largely to do with performance and security.  Virtualization works on the principle of resource sharing.  The computing and memory resources of physical servers are pooled together in a virtual environment.  Different applications then go out to that pool to compete for resources when needed.

That principle works fine for lower-level applications that don’t require a lot of resources.  Larger, more mission-critical applications don’t play so nicely.  Enterprise resource planning applications, for example, are known to be resource-intensive.  Put them into a shared environment, and suddenly you have a Darwinian scenario where the biggest applications are taking all the resources and creating performance bottlenecks for everyone.

Security and compliance are the second big area of concern when it comes to putting mission-critical applications into virtualized environments.  Because virtual servers share resources, it’s more difficult, if not impossible, to isolate or harden specific applications and workloads for security.  Auditing such applications for compliance therefore becomes an issue.

For all these reasons, virtualization has hit a ceiling when it comes to the world of mission-critical applications.  Gartner estimates that about 70 percent of server environments have been virtualized as of 2013.  The remaining 30 percent, which largely represents complex, transaction-intensive, mission-critical workloads, remains untouched by virtualization.

Containerization or secure partitioning: a third choice

Until recently, CIOs looking to reduce the costs and increase the flexibility of their mission-critical applications have faced a Hobson’s choice: either take the risk of virtualizing these workloads and hope they don’t run into resource contention or keep their mission-critical apps locked away on dedicated, expensive, underutilized proprietary servers, which isn’t much of a choice at all.

But with the advent of fabric computing, which uses high-speed interconnects to link loosely coupled computing resources into elastic IT environments, organizations are seeing a new alternative to virtualization, one that delivers the cost savings and flexibility of virtualized servers without sacrificing performance and security. 

That option, colloquially called “containerization” or “secure partitioning,” involves creating secure, dedicated containers within a fabric environment based on standard Intel x86 processors. These containers are dedicated to serving a specific mission-critical application, providing all the memory, computing power, storage and other resources needed by those workloads to operate securely and at mission-critical levels of performance and reliability. This approach eliminates competition for resources.

In essence, these containers act like hard-wired partitions on a physical server, but because they are software-based and reside in a high-speed fabric environment, they gain the advantage of extreme flexibility.  Containers of resources can be put together and provisioned within minutes, and then quickly taken down when no longer needed.  A secure container can also serve geographically dispersed end users and locations. The results are fewer physical servers and significant cost savings.

All this comes without sacrificing security.  Containers can be isolated or hardened for highly-sensitive workloads. And again, all this can be done via software, not hardware.

For the other 30 percent of IT environments that haven’t been virtualized, this is good news.  CIOs no longer need to compromise when it comes to their mission-critical applications.  They can get the benefits of virtualization at low cost without sacrificing security and performance.    

Compare three platforms for mission-critical applications

Operational requirements

Dedicated Host

One application per host

Virtualized Host

Multiple applications per host as virtual servers

Secure-Partitioned Host

Multiple applications per host in secure partitions

Deploy in minutes

No  

Yes

Yes

Move workloads in minutes

No   

Yes

Yes

Consolidate servers, reducing sprawl

No

Yes

Yes

Save on power, cooling, licensing

No

Yes

Yes

Performance: predictable

Yes

No

Yes

Security: easy to harden/isolate

Yes

No

Yes

Compliance: easily auditable

Yes

No

Yes




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]


SHARE THIS ARTICLE
Related Articles

ChatGPT Isn't Really AI: Here's Why

By: Contributing Writer    4/17/2024

ChatGPT is the biggest talking point in the world of AI, but is it actually artificial intelligence? Click here to find out the truth behind ChatGPT.

Read More

Revolutionizing Home Energy Management: The Partnership of Hub Controls and Four Square/TRE

By: Reece Loftus    4/16/2024

Through a recently announced partnership with manufacturer Four Square/TRE, Hub Controls is set to redefine the landscape of home energy management in…

Read More

4 Benefits of Time Tracking Software for Small Businesses

By: Contributing Writer    4/16/2024

Time tracking is invaluable for every business's success. It ensures teams and time are well managed. While you can do manual time tracking, it's time…

Read More

How the Terraform Registry Helps DevOps Teams Increase Efficiency

By: Contributing Writer    4/16/2024

A key component to HashiCorp's Terraform infrastructure-as-code (IaC) ecosystem, the Terraform Registry made it to the news in late 2023 when changes …

Read More

Nightmares, No More: New CanineAlert Device for Service Dogs Helps Reduce PTSD for Owners, Particularly Veterans

By: Alex Passett    4/11/2024

Canine Companions, a nonprofit organization that transforms the lives of veterans (and others) suffering PTSD with vigilant service dogs, has debuted …

Read More