VAAI – is it a Mirage?

VMware vSphere® Storage APIs – Array Integration (VAAI), also known as hardware acceleration or hardware offload APIs, are a set of APIs enabling interaction between VMware vSphere ESXi™ hosts and storage devices. The APIs in VAAI are supported by a block or NAS array (e.g. storage system) and can offload different functions from the vSphere hypervisor and virtual machine (VM).
VAAI has been established to handle issues industry faces while trying to expand Virtual Machines mainly during sizing storage, rapid VM provisioning and maintaining application performance. It has the ability offload specific storage operations to compliant storage hardware, which results in less CPU, memory and storage fabric bandwidth consumption. In other words, VAAI removes blocks, and offloads tasks that are “expensive” and place a heavy load on ESX resources to storage arrays. This enables improved performance, scale and efficiency to a very large extend
VAAI can be used in the following functions:
  • Atomic Test and Set (ATS)
  • Full Copy / XCOPY / Clone Blocks
  • Data Deduplication and Full Copy
  • Block Zeroing / Write Same / Zero Blocks
  • Block Delete / Unmap
  • Thin Provisioning Stun / TP Stun
  • The below table summarizes the impact of VAAI and deduplication on a clone operation for a VM of size 10GB

 

Source: Qadstor
Source LUN
Destination LUN
Remarks
Without VAAI
10 GB read
10 GB written
Utilizes both network and server
resources
With VAAI (no dedupe/post-process
dedupe)
10 GB read
10 GB written
Network and server resources
minimal.
Array resources used for read and write operations
With VAAI (Inline dedupe)
10 GB read
0 GB written
Network and server resources
minimal.
Array resources spent in reads and deduplication
With VAAI (QUADStor)
0 GB read
0 GB written
Network and server resources
minimal.
Array resources spent only in deduplication
To conclude, the main advantage of VAAI is definitely excellent performance followed by facts like enabling VMware and it’s hypervisor to scale out.The VMware community is on a spree of continuous improvement of the APIs with its every release. Many more API integrations, snapshot offload and array management can be expected in the near future.
To know more email: marketing@calsoftinc.com

 

 
Share:

Related Posts

Role of Cyber Security in Business Continuity

Cyber security plays a critical role in business continuity by mitigating risks, cyber-attacks, and by maintaining trust with customers and partners. Explore the crucial role of cybersecurity in ensuring business continuity!

Share:
Navigating Big Data Storage Challenges

Navigating Big Data Storage Challenges

The last decade or so has seen a big leap in technological advancements. One of the technologies to come up at this time and see a rapid…

Share:

A Deep Dive into 5G Service-Based Architecture (SBA)

5G technology roll out signifies an immense revenue opportunity for telecom industry.

Share:
cloud storage vs. on Premises storage

Cloud Storage vs. On-Premises Storage: A Comparative Analysis

Enterprises in today’s digital landscape, be they Large/ Small Medium Enterprises (L/SMEs) or startups, face a perpetual dilemma – how to manage their data, applications, and technology…

Share:
Technical Documentation

Technical Documentation Review and Tips

Technical reviews are vital for effective and quality documentation. To make this happen, have documentation and its reviews listed as one of the deliverables – just like development or testing. This will place priority on the process, and ensure everyone involved understands the importance of proper and thorough reviews.

Share:
Understanding the Potential of Storage and Security in IoT

Understanding the Potential of Storage and Security in IoT

The potential of storage and security in IoT plays a significant role in transforming industries and the lives of people. However, tackling challenges such as data isolation, interoperability, and scalability will be essential in underpinning this potential. To embrace the full potential of storage and security in IoT involves a holistic method, incorporating technological advancements with comprehensive tactics. Read the blog to understand the potential of security and storage in the IoT ecosystem, its challenges, and keyways to overcome them.

Share: