Skip to main content

File Virtualization: NetApp's VFM does DoD Migration

The Defense Contract Management Agency (DCMA) is the Department of Defense's contract manager, its 10,000 employees overseeing 300,000 prime contracts worth a total of $850 billion. It is responsible for seeing that those contracts meet the performance requirements and deadlines, while coming within budget. But it also has to make sure it is spending its own budget wisely, which led to the data center consolidation.

The project involved several actions. One was to reduce the number of servers by using VMware's Infrastructure. The DCMA began looking at virtualization in mid-2005. At that point, the agency had about 625 servers, and was replacing 200 of them annually. In November of that year, it started using VMware virtualization technology, buying 60 new servers instead of the usual 200. In subsequent years, it only needs to buy 20, saving the agency nearly half a million dollars annually, not counting power, cooling and labor costs. Earlier this year, the DCMA upgraded to the latest version – VMware Infrastructure 3 – which virtualizes servers, storage and networking.

In addition to consolidating the servers, the DCMA also needed to set up a common file system that would work across the enterprise. For this it created a File Area Network (FAN) using software and storage appliances from Network Appliance. The DCMA has over 300TB of storage.

When it consolidated its data centers, the agency went from 56 file and print servers down to two clustered NetApp Filers – the FAS3020C and FAS6070C – at each site: the DCMA's primary data center in Carson and another in Boston. The 3020Cs are used for file sharing and the 6070Cs are in a SAN. NetApp’s VFM was used to migrate the files from the file servers to the NetApp appliances.


Link

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!