tiero - Fotolia
What are VMware Virtual Volumes and how do they work?
Virtual Volumes (vVols) are something new that VMware is working on to improve storage provisioning. Storage currently tends to be provisioned according to a gold, silver and bronze type of model that forces a virtualization administrator to pick the storage tier that most closely matches their needs.
VMware vVols are an attempt to solve this problem by more closely matching the requirements of a virtual machine (VM) to the underlying storage. In other words, storage can be provisioned dynamically according to the needs of the VM. VVol creation can even be tied to application provisioning. This is a much more granular model than what we have today.
To use vVols, the storage hardware has to support the vStorage APIs for Storage Awareness (VASA). VASA will then allow a dialog to occur between the storage hardware and storage consumer. VMware will send a "Here's what I need" request to the storage hardware, which will either accommodate the request or respond with a "Your request can't be accommodated, but here is what I can give you" type of message.
You can think of VMware vVols as storage containers that align with individual VMs. The container includes a data store, a set of data services, and metadata.
There are a number of different storage providers that will support vVols such as EMC, Hewlett-Packard, NetApp, Nimble and SolidFire.
VMware has recently launched a public beta for its vVols program.
VMware vSphere vVols data protection
Experts make predictions about VMware products
Dig Deeper on Storage architecture and strategy
Related Q&A from Brien Posey
Cloud-based video surveillance storage can help organizations with compliance and retention. Be mindful, though, as high storage volume can quickly ... Continue Reading
Microsoft Teams storage limits can be complex for organizations to track. Learn the details and how to add Microsoft 365 storage to avoid capacity ... Continue Reading
Consider the fine print of encrypting data at rest. For example, access control permissions can make or break a storage encryption plan. Continue Reading