Solved

Thick VM with thin SAN?

Posted on 2016-09-09
5
58 Views
Last Modified: 2016-10-14
Hello,

We are currently running a thin provisioned SAN back-end with a thick provisioned VM environment.  I'm trying to understand how this works / the logic behind it.  Is the SAN essentially saying "I'm going to give VM a logical block, but I will only account for what is used" and then the VM env is saying "oh I have this whole block of storage, I'm going to take it all"?

That is the scenario that I laid out in my mind, but I'm looking for confirmation as to what is actually happening here.

Thanks in advance!
0
Comment
Question by:blinkme323
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 10

Accepted Solution

by:
Richardson Porto earned 250 total points (awarded by participants)
ID: 41792145
Since thick provision lazy zeroed only allocate the space but don't zero it out (like thick eager zeroed does), from SAN it will behave in the same way of a thin provision VM. But from VMware, you will have the space allocated and without risk of over provision the datastore space.

The following blog post explain with some additional examples: http://theithollow.com/2013/03/26/are-you-thin-or-thick-where-at/
0
 
LVL 55

Assisted Solution

by:andyalder
andyalder earned 250 total points (awarded by participants)
ID: 41793462
As far as VMware is concerned it has all the space you gave it, but the SAN will only allocate physical disk space as and when needed. Create a few VMs with data on them and delete them again and you'll soon use up all the physical disk space in the SAN.

Whether the SAN grabs back zeroed out blocks is down to the SAN manufacturer, it probably does but it may only reclaim unused blocks periodically.
0
 
LVL 10

Expert Comment

by:Richardson Porto
ID: 41815135
Do you need any additional explanation or we can close the question?
0
 

Author Comment

by:blinkme323
ID: 41836275
Yes, this can be closed.  Please award full points to each of the commenters as it will not allow me to.

Thanks
0
 
LVL 10

Expert Comment

by:Richardson Porto
ID: 41843327
Enough information provided.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
The question appears often enough, how do I transfer my data from my old server to the new server while preserving file shares, share permissions, and NTFS permisions.  Here are my tips for handling such a transfer.
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

687 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question