How do the alerts and alarms work in VMware thin provisioning?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Prior to the release of vSphere 5 there weren’t any vSphere-level alerts to warn users that a thinly provisioned data store was filling up. Thankfully, this has changed.
In vSphere 5 and above, the vSphere vStorage APIs for Array Integration automatically raise an alarm if a thinly provisioned data store is filled to 75% of its total capacity. When the alarm is triggered, the Storage Distributed Resource Scheduler no longer considers the data store as a potential destination because it is approaching maximum capacity.
Of course, this raises the question of what happens if the data store runs out of space. If that happens, virtual machines (VMs) requiring additional storage space are paused. Other VMs keep running until they require additional storage.
An alarm consists of a trigger and an action. A trigger is the condition that results when an alarm is generated. You can also attach a time value to a trigger. For example, you probably wouldn’t want to generate a low-memory alarm if memory usage spiked for a few seconds. The built-in memory alarm is only triggered if memory usage remains at 75% or higher for more than an hour or if it remains at 90% for longer than a minute.
When an alarm is triggered, an action is performed in response to the alarm. For instance, you might configure VMware to send an email notification.
It's worth noting that while the VMware thin provisioning storage alarm is useful, it's not the only use of alarms within VMware. VCenter Server includes a number of predefined alarms that monitor things such as clustering, hosts, individual VMs and licensing. You can also define your own alarms or modify existing alarms through the vSphere client.
New storage features released with vSphere, Hyper-V
How to reclaim thin-provisioned storage in vSphere
Dig Deeper on Virtualization Strategy
Related Q&A from Brien Posey
A ghost image can be used to copy the contents of one server to another for backup, but the process of creating ghost images may not be as simple as ...continue reading
Backup and recovery trends, such as hybrid cloud data protection, are gaining popularity in the IT industry. Are these three major trends part of ...continue reading
Can disaster recover planning save an organization from a costly IT outage? The British Airways IT disaster of 2017 has many wondering how to prevent...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.