Home > Articles

This chapter is from the book

Why Virtualize Business Critical Applications?

Now that we’ve reviewed exactly what makes an application business critical, we will explore why organizations are looking to virtualize these applications. Many organizations have widely adopted virtualization in their environment and have virtualized a significant portion of their infrastructure. The business critical applications are likely to be the applications that remain on physical servers for various reasons. Virtualizing business critical applications can be the next step on an organization’s journey to its own private cloud infrastructure.

Although there are many benefits to virtualizing these critical applications, similar to the benefits for virtualizing any application, there are also extra risks and challenges that might make this process difficult. With careful understanding of the risks combined with the benefits an organization can realize, a solid business case can be built for virtualizing business critical applications.

Benefits

The benefits of virtualization that apply to lower-tier or less-critical virtual machines, such as the reduction in cost of servers, power, and cooling, also apply to virtualizing business critical applications. Those benefits, in addition to others that are more specific to business critical applications, are discussed in the upcoming sections.

High Availability

Business critical applications typically require high availability, because downtime to the application can be costly to the business. Some applications have native high-availability features built in, and even those can still achieve better availability when virtualized on the vSphere platform. High availability in this context can be defined as a system or application that is online and available for a high percentage of time, often approaching 100%. Highly available systems often have mechanisms to provide automatic and immediate resiliency to the application when a failure occurs. These systems often operate within the same physical site or location, though newer technologies can provide for high availability of applications across sites.

Both Microsoft Exchange Server and SQL Server serve as good examples of applications that typically require high availability in most organizations. Both applications offer their own native high-availability features, with Exchange utilizing Database Availability Groups and SQL having AlwaysOn Availability Groups (in addition to other high-availability features). These features work at the application level and can offer protection in the event of a server, network, or even storage failure. So does it make sense to virtualize them when they already support their own native high-availability features?

Each of the native high-availability features found in Exchange Server and SQL Server have their own requirements and complexities. For some organizations, these complexities raise the cost of maintaining the environment and are simply not worth it. By virtualizing these applications on vSphere, they can take advantage of vSphere High Availability (HA) to protect their business critical workloads. vSphere HA is used to automatically restart virtual machines if the host on which they are running fails for any reason. The virtual machines are restarted quickly on another host in the cluster, restoring service to the application and end users.

If an Exchange Mailbox server is running on an ESXi host that experiences a failure, that virtual machine will experience a failure and will be restarted on another ESXi host automatically. Organizations get this functionality without having to worry about the complexities of Exchange replication, active and passive database copies, extra storage requirements, and all the other configurations associated with using Database Availability Groups. They might face other challenges using this availability model, such as single points of failure at the operating system and storage level, but for some organizations the availability that vSphere HA provides is enough to meet their availability requirements.

For other organizations with more complex availability requirements, the native high-availability features provided by Exchange or SQL are necessary. To get the best possible availability, those organizations can combine the high-availability features of these applications with vSphere HA to provide better availability than would be easily possible with physical servers.

As an example, consider an organization that has virtualized its Exchange 2013 environment and utilizes Database Availability Groups to maintain three copies of each mailbox database. Let’s now say that the motherboard of an ESXi host running an Exchange 2013 Mailbox server virtual machine experiences a failure and the host powers off unexpectedly. In that scenario, the Database Availability Group will quickly detect the failure and activate database copies on a surviving Mailbox server (likely faster than it would take a Mailbox server virtual machine to restart if an organization were relying on vSphere HA alone). vSphere HA will then restart the failed Mailbox server on another ESXi host, restoring the full availability to the Exchange environment quickly and automatically.

Just how quickly could full availability be restored? VMware conducted a test of this exact scenario using the previous version of Exchange, and found that the failed Mailbox VM booted up and resumed replication in approximately three minutes from the time when the first ESXi host experienced a failure. The full details of the test can be found here: http://www.vmware.com/files/pdf/using-vmware-HA-DRS-and-vmotion-with-exchange-2010-dags.pdf. The quick restoration of email service via native high availability in Exchange combined with the ability of vSphere HA to restart virtual machines greatly enhances the availability of the application.

Now consider that same scenario with physical Mailbox servers. After the physical Mailbox server fails, the surviving Mailbox servers would activate the database copies just as they did in the virtual environment, restoring Exchange services quickly and easily. Unfortunately, the physical server that failed would need a hardware replacement. Most enterprise support contracts have a two- to four-hour service-level agreement (SLA) for replacement parts, extending the period during which the Exchange environment is less protected from another failure. When you compare a two- to four-hour restoration time to a three-minute restoration time, you can start to see why many organizations are looking to virtualize their business critical applications in order to enhance availability for their applications. These support contracts are still critical because a failed ESXi host reduces the overall capacity of the infrastructure, but proper design considerations (discussed for each application in each chapter of the book) can help mitigate the risk.

Not all business critical applications have their own native high-availability features. Take multitier applications that utilize middle-tier servers and back-end SQL Server databases as an example. The SQL environment might have its own native high-availability features but the middle-tier servers commonly do not. In that case, you can provide high availability to those applications that do not natively support it themselves. The capability to provide high availability to applications that do not natively support it is a compelling reason to consider business critical application virtualization.

Availability is one of the key reasons why organizations should strongly consider virtualizing their business critical workloads on VMware vSphere. By providing high availability to applications that do not natively support it, or by combining native high-availability features in vSphere with those found in the application, organizations can guarantee higher levels of availability for their applications. Less downtime for applications means more productive end users, a more agile (and relaxed) administrative staff, and a more successful business.

Disaster Recovery

Disaster recovery is another key consideration for business critical applications. As recent history has shown us, hurricanes, earthquakes, and tsunamis are very real things that can have a significant impact on people and businesses. Protecting an organization’s most critical applications should be an important factor of any design.

We can define disaster recovery as the process of recovering a server or an application in the event of significant failure or negative situations. Disaster recovery is often a manual process involving the relocation of servers or applications from a failed location to a secondary location that is unaffected by the disaster. Information technology (IT) folks often talk about disaster recovery in terms of major disasters like earthquakes, asteroid impacts, or the zombie apocalypse (you know who you are), but the reality is that the disaster does not have to be so catastrophic. In reality, a disaster can be a water pipe bursting above your server room, a fire in the building, an extended loss of power, or even the failure of a critical piece of hardware. Organizations need to be prepared to deal with disaster and recover from it in order to keep the business operating.

At its core, virtualization can provide a means of disaster recovery simply by encapsulating virtual machines into individual files that are portable. Copying critical virtual machines to an external hard drive before a hurricane makes landfall is, while certainly not the best, a simplistic example of how virtualization facilitates easier disaster recovery for all applications.

Copying virtual machine disk files to an external hard drive is likely not going to be an acceptable disaster recovery plan for most businesses. Instead, companies will want to consider a more robust solution that can provide disaster recovery in a simpler, more unified way. By virtualizing business critical applications on vSphere, organizations can take advantage of technologies like VMware Site Recovery Manager to help aid in disaster recovery plans. Site Recovery Manager can be used to create recovery plans for critical virtual machines that are used to control which applications are protected, how they are replicated between sites, and in which order they are restarted in the secondary site. In addition, Site Recovery Manger offers the capability to fully test a disaster recovery failover without actually declaring a disaster. The more workloads that are virtualized on vSphere, the more of an organization’s servers that can be included in the disaster recovery plan.

Similar to the discussion around high availability, what if an application already includes native functionality that can allow for disaster recovery? Both Exchange Server and SQL Server offer native functionality that can replicate data between sites to provide for disaster recovery. As with before, for many organizations the complexity of maintaining multiple replication technologies for multiple applications means higher cost and higher complexity, which could lead to extended outages and longer recovery times. When all recovery plans are unified to a single tool, Site Recovery Manager, a single team is capable of restoring multiple applications in the event of a disaster. That can significantly reduce complexity and speed recovery, because multiple application teams are not required to execute recovery plans for the individual applications.

The features that provide high availability in Exchange Server and SQL Server are the same features that also provide disaster recovery. By combining those features with Site Recovery Manager, you can still utilize tools like SQL Server 2012 AlwaysOn Availability Groups to maintain high availability within the primary site while using Site Recovery Manager for disaster-recovery purposes. The combination of technology can often provide a “best of both worlds” configuration for an organization.

Many applications do not provide any native means for providing disaster recovery. For those applications, virtualizing them on the vSphere platform and leveraging Site Recovery Manager can once again provide functionality that is simply not possible by running the application on a physical server.

The disaster recovery capabilities of the vSphere platform and Site Recovery Manager present a compelling reason for organizations to virtualize their business critical applications. Even if the application already provides native disaster recovery functionality, businesses can still see additional benefits by virtualizing the application on vSphere.

Scalability

With business critical applications, the ability to create an environment that is scalable to meet the demands of the business is of huge importance. Resource needs of an application can grow for various reasons, including differing business cycles, increases in demand, or normal end-of-month processing. An e-commerce company might see increased spikes in demand during the holiday season, when more orders are placed through their systems than during any other time of the year. Similarly, an accounting firm might experience huge increases in customer demand and activity as the deadline to file taxes approaches. For these and many other similar situations, it is important that an organization’s business critical applications are able to scale to meet demand.

If an organization deploys its critical applications on physical servers, scalability becomes much more difficult. Physical servers typically would have to be sized to meet the maximum expected demand despite the fact that this demand might occur only during brief periods every month, every quarter, or even every year. This raises the total cost of the environment and leaves the system largely underutilized for much of the year.

Virtualizing these business critical applications on VMware vSphere can aid in scalability in two key ways. First, vSphere utilizes a technology called Distributed Resource Scheduler (DRS) that can automatically balance workloads among ESXi hosts in a cluster to balance out resource demands. If an ESXi host is becoming overloaded because a SQL Server database is processing many transactions on the same server on which the web server is processing customer requests, causing a large spike in CPU utilization, DRS can automatically perform vMotion migrations to balance out the load on that host and return utilization to normal levels.

The other key scalability benefit that vSphere provides is the ability to add CPU and memory resources to running virtual machines with no downtime. The application and the operating system need to support this functionality in order for the new hardware to be recognized. For example, newer versions of Windows Server, starting with Windows Server 2008 R2, Enterprise Edition (and above) natively support it. In the scenario described previously, in which the CPU utilization on a SQL Server virtual machine is growing out of control due to high demand, a vSphere administrator can add CPU resources to the server and run a simple command to make the application aware of its new resources. By providing a way to scale resources on the fly in the event that demand requires it, vSphere administrators possess a powerful scalability tool that provides a huge advantage over deploying business critical applications on physical servers.

Provisioning

Application owners and developers commonly need new servers to deploy new applications, test application updates, or for a variety of other reasons. Databases in particular are a common request of developers who frequently need new databases or entirely new SQL servers to test their applications. If physical servers are used, these requests can take days or even weeks to complete.

By deploying these business critical resources on the vSphere platform, administrators can deploy new instances much more quickly than if they had to deploy them on physical servers. Administrators can take advantage of vSphere features like templates to create master images of particular applications and then deploy them quickly when needed.

Similarly, the provisioning of new resources to virtual machines is also done quickly and easily. In many cases, resources can be added on the fly without the need to shut down the virtual machine. If a virtual machine needs more space on its virtual hard drive, the drive can be expanded without the need to shut down the virtual machine. In a physical server, adding new local storage to a server typically requires downtime. Other resources, such as virtual network cards, can also be deployed on the fly without any downtime.

Testing

Administrators or application owners often need to test updates or changes to their applications that are live and running in production. If the application is virtualized, they can simply make a clone of the virtual machine and have an identical copy of the server to use as a test server. Clone operations do not cause any downtime to the virtual machine being cloned and, when properly isolated, enable developers or application owners to perform tests against actual data rather than on development or test servers. This is another example of a capability that is simply not easily possible with physical servers.

Another way virtual machines make testing applications much easier is with snapshots. Virtual machine snapshots provide a way to quickly and easily go back to a point-in-time copy of the virtual machine. This can make testing changes in a virtual machine much simpler, because a change that causes harm can be quickly undone by reverting to a clean state at the time the snapshot was taken. After it is verified that the change does not cause any undue harm, the snapshot can be deleted and the changes are committed to the virtual machine. This functionality would be difficult to duplicate with physical servers.

Consolidation

One of the “classic” benefits of virtualization has always been consolidation, or the capability to consolidate multiple physical servers into virtual machines running on fewer physical servers. This can provide an organization with potentially large savings on the cost of the servers, as well as the hard and soft costs for managing and maintaining those servers. There are also cost savings for the power and cooling that would be required to support those physical servers.

Business critical applications can also benefit from consolidation through virtualization. Many of these applications are complex, often broken up into multiple roles within the same application and requiring multiple servers. Or the application could have native clustering or high-availability features that require multiple servers deployed for one application.

Microsoft Exchange Server and SQL Server are both good examples of business critical applications that can benefit from consolidation. In Exchange 2010, the previous version of Exchange, there were five server roles that each served different purposes. If an organization wanted to separate those roles into separate physical servers, it would require a significant investment in hardware to accommodate that requirement. By virtualizing the roles of Exchange, the organization can achieve the same goal of role separation while still consolidating onto fewer physical servers. The new version, Exchange 2013, has reduced the server roles to two, still offering some benefits for consolidation.

SQL Server also has separate components as well as native high-availability features that can require multiple physical servers. By virtualizing SQL Server onto fewer physical servers, organizations can still use dedicated servers for specific components or utilize high-availability features while still reducing the physical footprint. In addition, consolidating SQL Server can have a significant impact on the cost of licensing. This topic is discussed further in Chapter 7, “Virtualizing Microsoft SQL Server 2012.”

Consolidation is typically not the main reason why organizations choose to virtualize a business critical application. That said, organizations can still realize the benefits of consolidation even with business critical applications.

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020