![Page 1: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/1.jpg)
Virtual Volumes Technical Deep Dive
STO1965
Rawlinson Rivera, VMware, Inc Suzy Visvanathan, VMware, Inc
![Page 2: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/2.jpg)
CONFIDENTIAL 2
Disclaimer • This presentation may contain product features that are currently under development. • This overview of new technology represents no commitment from VMware to deliver these
features in any generally available product. • Features are subject to change, and must not be included in contracts, purchase orders, or
sales agreements of any kind.
• Technical feasibility and market demand will affect final delivery. • Pricing and packaging for any new technologies or features discussed or presented have not
been determined.
![Page 3: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/3.jpg)
CONFIDENTIAL 3
Agenda
1 Virtual Volumes: Introduction
2 High level Architecture
3 Data path
4 Managing Storage Capacity
5 Ensuring SLOs through policies
6 VM Objects – Virtual Volumes
7 Data Services
8 Making the transition to Virtual Volumes
9 Learn more
![Page 4: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/4.jpg)
CONFIDENTIAL 4
The Software-Defined Data Center
Transform storage by aligning it with app demands
Management tools give way to automation
Expand virtual compute to all applications
Virtualize the network for speed and efficiency
![Page 5: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/5.jpg)
CONFIDENTIAL 5
The Software-Defined Data Center
Transform storage by aligning it with app demands
![Page 6: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/6.jpg)
CONFIDENTIAL 6
VMware Software-Defined Storage and Virtual Volumes
Policy-driven Control Plane
Virtual Data Plane
Virtual Datastores
Performance Mobility Data Protection
Virtual Data Services
Cloud Object Storage SAN / NAS
x86 Servers
6
• Interface between apps and storage services • Interprets VM-policies and composes service
• Initial placement and on-going optimization
• Abstraction and pooling = Storage container • HW capabilities expressed to control plane
• New storage tiers for data persistency
• Applied to individual VMs • Dynamically invoked by control plane
• Array-based, 3rd party VA
Virtual Volumes
![Page 7: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/7.jpg)
CONFIDENTIAL 7
Today’s Challenges in External Storage Architectures
Today
1. Create fixed-size, uniform LUNs
2. Lack of granular control
3. Complex Provisioning cycles
4. LUN centric storage configurations
û Extensive manual bookkeeping to match VMs to LUNs
û LUN-granularity hinders per-VM SLAs
û Overprovisioning (better safe than sorry!)
û Wasted resources, wasted time, high costs
û Frequent Data Migrations
External Storage
vSphere
Array-a Array-b
LUN
LUN LUN
LUN LUN
![Page 8: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/8.jpg)
CONFIDENTIAL 8
Goals of Virtual Volumes
• Ability to express application (VM/VMDK) granular data services
• Provide easy on-demand Capacity provisioning
• Compliance Monitoring • Ability to get most out of the
storage system
• Easy Capacity management • Meet VM SLOs • Access Control and Security
VI admin
Storage admin
![Page 9: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/9.jpg)
CONFIDENTIAL 9
Replication Snapshots Caching Encryption De-duplication
vSphere
External Storage Architectures with Virtual Volumes
External Storage without VVols External Storage with VVols
Policy based Management
Offloaded Data Services
Eliminates LUN Management
Provides Per-VM Granularity
datastore a
vSphere
Array-a Array-b
LUN
LUN LUN
LUN LUN
AND
![Page 10: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/10.jpg)
CONFIDENTIAL 10
High Level Architecture
Published Capabilities
Snapshot
Replication
Deduplication
Encryption
Overview
• No FileSystem
• ESX manages Array through VASA (vSphere APIs for Storage Awareness) APIs.
• Arrays are logically partitioned into containers, called Storage Containers
• VM disks, called Virtual Volumes, stored natively on the Storage Containers.
• IO from ESX to array is addressed through an access point called, Protocol Endpoint (PE)
• Data Services are offloaded to the array
• Managed through storage policy-based management framework
vSphere Storage Policy-Based Mgmt.
Virtual Volumes
Storage Policy
Capacity
Availability
Performance
Data Protection
Security
PE VASA Provider
PE
![Page 11: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/11.jpg)
CONFIDENTIAL 11
VASA Provider (VP)
• Software component developed by Storage Array Vendors
• ESX and vCenter Server connect to VASA Provider
• Provides Storage awareness services
• Single VASA Provider can manager multiple arrays
• Supports VASA APIs exported by ESX
• VASA Provider can be implemented within the array’s management server or firmware
• Responsible for creating Virtual Volumes
Virtual Volumes
VASA Provider
Characteristics
![Page 12: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/12.jpg)
Data Path
![Page 13: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/13.jpg)
CONFIDENTIAL 13
Protocol Endpoints (PE) Why Protocol Endpoints? • Separate the access points from the storage
itself
• Can have fewer access points
What are Protocol Endpoints? • Access points that enables communication
between ESXi hosts and storage array systems.
• Part of the physical storage fabric
• Created by Storage administrators
Virtual Volumes
VASA Provider PE
![Page 14: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/14.jpg)
CONFIDENTIAL 14
Protocol Endpoints (PE) Scope of Protocol Endpoints • Compatible with all SAN and NAS Protocols:
- iSCSI - NFS v3 - FC - FCoE
• A Protocol Endpoint can support any one of the protocols at a given time
• Existing multi-path policies and NFS topology requirements can be applied to the PE
VASA Provider iSCSI/NFS PE
Virtual Volumes
![Page 15: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/15.jpg)
CONFIDENTIAL 15
Protocol Endpoints (PE) Protocol Endpoint discovery process • SCSI PEs are discovered during an ESX
rescan
• NFS PEs are maintained as IP addresses or file paths
• ESX will identify PE and maintain all discovered PEs in a database.
VASA Provider iSCSI/NFS PE
Virtual Volumes
![Page 16: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/16.jpg)
Managing Storage Capacity
![Page 17: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/17.jpg)
CONFIDENTIAL 17
Storage Container (SC) What are Storage Containers?
• Logical storage constructs for grouping of virtual volumes.
• Setup by Storage administrators
• Capacity is based on physical storage capacity
• Logically partition or isolate VMs with diverse storage needs and requirement
• Minimum one storage container per array
• Maximum depends on the array
• A single Storage Container can be simultaneously accessed via multiple Protocol Endpoints
Virtual Volumes
![Page 18: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/18.jpg)
CONFIDENTIAL 18
Storage Containers (SC)
Virtual Volumes
Snapshot Replication
vCenter
VASA Provider
Storage Container Discovery Process
• Storage admin sets up Storage Container with desired capacity
• Desired Capabilities are applied to the Storage Containers
• VASA Provider discovers Storage Container and reports to vCenter
• Any new VMs that are created will subsequently be provisioned in the Storage Container
![Page 19: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/19.jpg)
CONFIDENTIAL 19
Differences between Storage Containers and LUNs • Size based on array capacity • Max number of SCs depend only on the array
ability • Size of SC can be extended • Can distinguish heterogeneous capabilities
for different VMs (Virtual Volumes) provisioned in that SC
• Managed by VASA APIs
• Fixed size • Fixed size mandates more number of LUNs • Needs a FileSystem • Can only apply homogeneous capability on
all VMs (VMDKs) provisioned in that LUN. • Managed by In-band FileSystem commands
Storage Containers
LUN
![Page 20: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/20.jpg)
CONFIDENTIAL 20
Storage Container (SC)
Do I still need to create Datastores?
Storage Container vSphere Datastore
![Page 21: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/21.jpg)
CONFIDENTIAL 21
Storage Container (SC)
![Page 22: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/22.jpg)
CONFIDENTIAL 22
Storage Container (SC)
Storage capabilities
Storage policies
vSphere Web Client
Storage Management UI
Datastore
Storage Container What do the Admins see?
![Page 23: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/23.jpg)
Ensuring SLOs through Policies
![Page 24: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/24.jpg)
CONFIDENTIAL 24
Storage Policy Based Management (SPBM) – Array Capabilities
Virtual Volumes APIs
Storage Policy-Based Mgmt.
CV
CV
CV
Storage admin
Publish Capabilities
• Array based features and data services
• Defines what an Array can offer
• Advertised to ESX through VASA APIs
Sample Default Profile for (6090a058-cd89-ffe3-87763007db37] - capabilities
Disk Types
Disk Encryption
Dedupe
Replication
Snapshot
![Page 25: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/25.jpg)
CONFIDENTIAL 25
Storage Policy Based Management (SPBM) – VM Policies
![Page 26: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/26.jpg)
CONFIDENTIAL 26
Storage Policy Based Management (SPBM)
![Page 27: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/27.jpg)
VM Objects - Virtual Volumes
![Page 28: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/28.jpg)
CONFIDENTIAL 28
Virtual Volumes – An Introduction • Virtual Volumes
– Virtual machine objects stored natively on the array storage containers.
– No Filesystem on-disk formatting required
• There are five different types of recognized Virtual Volumes: – Config-VVol – Metadata – Data-VVol – VMDKs – Mem-VVol – Snapshots – Swap-VVol – Swap files – Other-VVol – Vendor solution specific
vSphere Web Client View
vvol
CONFIG
DATA
SWAP
MEM
![Page 29: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/29.jpg)
CONFIDENTIAL 29
Virtual Volumes
Storage capabilities
Storage policies
vSphere Web Client
Storage Management UI
Virtual Machines Datastores
Virtual Volumes
Storage Container What do the admins need to get familiar with?
VVol VVol VVol
![Page 30: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/30.jpg)
CONFIDENTIAL 30
Virtual Volumes
VM objects view from a storage container on an array VM objects view from a datastore
vSphere Web Client Storage Management UI vSphere Admin View Storage Admin View
![Page 31: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/31.jpg)
CONFIDENTIAL 31
Virtual Volumes – Bind requests
• IO path is established through a VASA Bind request
• VASA Provider does two things upon receiving a Bind request
• Returns a PE ID to which the VVol is bound • A unique secondary ID to be used for IO
between the bound VVol and PE
• For SCSI, the secondary ID is the secondary LUN ID
• For NAS, the secondary ID is the file path
• M:M Relationship between VVol and PE
Virtual Volumes
VASA Provider
VVol
PE
VVol
Bind
![Page 32: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/32.jpg)
CONFIDENTIAL 32
Virtual Volumes – Other Bind Scenarios
UNBIND
Virtual Volumes
VASA Provider
VVol
PE
VVol
UNBIND
• Delete binding of a VVol to the PE
• VASA Provider may choose to delete a binding for several reasons
REBIND
Virtual Volumes
VASA Provider
VVol
PE
VVol
PE
REBIND
• Move VVols across different PE
• VASA Provider may choose to issue a rebind for several reasons Eg., Load balancing
![Page 33: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/33.jpg)
Data Services
![Page 34: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/34.jpg)
CONFIDENTIAL 34
Snapshots • Offloaded to Array • Copy on write image of a Virtual Volume
• Two type of snapshots supported: – Managed Snapshot – Managed by ESX.
• A maximum of 32 snapshot are supported for fast clones
– Unmanaged Snapshot – Managed by the storage array.
Managed Snapshot - vSphere
Unmanaged Snapshot - Array
![Page 35: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/35.jpg)
Piecing It All Together
![Page 36: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/36.jpg)
CONFIDENTIAL 36
Virtual Volumes – The New De-facto Storage Paradigm
Capabilities
vSphere Storage Policy-Based Mgmt.
Virtual Volumes
VASA Provider PE PE
![Page 37: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/37.jpg)
Making the Transition to Virtual Volumes
![Page 38: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/38.jpg)
CONFIDENTIAL 38
Support by Broad Ecosystem Makes Transition Smooth
More than 20 VVOL
Partners
Partners Announcing
GA
Virtual Volumes in
Beta
And Many More…
![Page 39: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/39.jpg)
CONFIDENTIAL 39
Migration Scenario: VAAI vs Virtual Volumes
VAAI & VASA API Compatible Array
vmkernel data mover use VAAI APIs
XCOPY /WRITE_SAME primitive for cloning
operation
2
vSphere
VMFS VVol
1
vSphere Admins
clone VM from VMFS to VVol container
![Page 40: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/40.jpg)
Learn More…..
![Page 41: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/41.jpg)
CONFIDENTIAL 41
Nimble Storage Array Group
vCenter
ESXi ESXi
VVols and SPBM in Nimble – Architecture Overview
CONFIDENTIAL 41
![Page 42: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/42.jpg)
CONFIDENTIAL 42
![Page 43: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/43.jpg)
CONFIDENTIAL 43
![Page 44: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/44.jpg)
CONFIDENTIAL 44
Learn More…….
STO1963 – Virtual Volumes Business Overview
STO 3163 – Virtual Volumes and Scalable Data Protection in a Software Defined Enterprise
STO3162 – Satisfy requirements of your application at the granularity of VVols (Nimble)
STO3246 – Scalable Virtual Volumes Storage Management with IBM XIV storage
STO3161 – What can Virtual Volumes do for you? (EMC)
STO2142 – Hypervisor & Storage QOS; Two Great Tastes that Taste Great Together (SolidFire)
STO3247 – VVol Technical Preview with DELL storage
STO2554 – How Virtual Volumes will provide Shared Storage with X-ray vision (HP)
STO2752 – Deploying VVol with Hitachi Data Systems
VMware HP Netapp Dell EMC IBM HDS Nimble Tintri SolidFire Atlantis Computing SANBlaze
HOL-SPL-1429 VVol Tech Preview
Breakout Sessions Demos at Booth
Participate in Virtual Volumes Beta
Misc
Focused Sessions Engage with VMware
Engage with Vendors
Attend NDA sessions
![Page 45: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/45.jpg)
Q&A
![Page 46: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/46.jpg)
Thank You
![Page 47: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/47.jpg)
Fill out a survey Every completed survey is entered into a
drawing for a $25 VMware company store gift certificate
![Page 48: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/48.jpg)
Virtual Volumes Technical Deep Dive
STO1965
Rawlinson Rivera, VMware, Inc Suzy Visvanathan, VMware, Inc
![Page 49: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/49.jpg)
BACKUP
![Page 50: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/50.jpg)
CONFIDENTIAL 50
Snapshots • Snapshots are a point in time copy on write
image of a Virtual Volume with a different ID from the original
• Virtual Volumes snapshots are useful in the contexts of creating: – a quiesced copy for backup or archival purposes,
creating a test and rollback environment for applications, instantly provisioning application images, and so on
• Two type of snapshots supported: – Managed Snapshot – Managed by ESX
• A maximum of 32 snapshot are supported for fast clones
– Unmanaged Snapshot – Manage by the storage array • Maximum snapshot dictated by the storage array
Managed Snapshot - vSphere
Unmanaged Snapshot - Array
![Page 51: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/51.jpg)
CONFIDENTIAL 51
Fast Clone • Fast‐clones are an out‐of‐band space
efficient cloning operations, performed exclusively on VMDKs – performed on the same storage container using
the storage profile of the original virtual volume, or the profile specified
• ESXi hosts guarantee not to issue any I/O to the source or destination virtual volumes during fast clone operations
• Fast‐clones are similar to the snapshot operation with a few differences: – There are no revert operations – Space-efficient
vasa vendor provider
prepared for snap
progress update 1
progress update N
ready
create
acknowledge
vvol
DATA
Fast clone Snapshot Workflow
Read only to based VVol allowed
![Page 52: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/52.jpg)
CONFIDENTIAL 52
Storage Policy Based Management – Array Capabilities Name Description Sample_Default_Profile for (6090a058-cd.. Default capability profile for storage
container
General Capability sets
Default Profiles Connectivity with Hosts
Protocol Endpoints
Sample Default Profile for (6090a058-cd89-ffe3-87763007db37] - capabilities
Disk Types
Disk Encryption
Dedupe
Replication
vmwareR vSphere Web Client
![Page 53: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/53.jpg)
CONFIDENTIAL 53
clone VM from VVol container to different VVol container
vSphere Admins
vSphere
1
2
offload to array
3
Fully VAAI & VASA APIs Compatible Array
SC-A SC-B
always attempt default operation with VASA API primitives
If default operations fails VAAI API primitives are used
clone VM from VVol container to different VVol container
vSphere Admins
vmkernel data mover uses
VAAI primitives for cloning operation
vSphere
1
2
offload to array
3
Fully VAAI & VASA APIs Compatible Array
SC-A SC-B
default 1 fail back 2
vendor native clone utilized with VASA primitives
cloning operation
VAAI vs VVol
![Page 54: VMworld 2014: Virtual Volumes Technical Deep Dive](https://reader030.vdocuments.us/reader030/viewer/2022032421/55a68df91a28abb97d8b4774/html5/thumbnails/54.jpg)
CONFIDENTIAL 54