More resources for workload balancing and distribution
Virtual workload balancing best practices
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
The resource needs of virtualization and virtual workloads
Things to avoid when load balancing servers
Q. How do individual workloads affect hypervisor performance? Can a single server tackle today’s applications?
A modern server can handle just about anything, but it certainly cannot handle everything. As a result, IT professionals often need to plan workload distribution and consider workload and resource balancing across virtualized servers.
Running multiple simultaneous workloads can strain a server’s resources and lead to performance problems. For example, running too many workloads may consume more memory, CPU cycles or network bandwidth than the system physically has available. Virtualization can mask some of that contention by abstracting workloads from the underlying hardware, but the hypervisor cannot provide more resources than the physical server provides.
A virtual server can handle SQL, Exchange and Web servers, but not necessarily all at the same time on the same system. Determine the resource needs of each workload, and spread them out so that complementary workloads rely on the same system. Furthermore, putting multiple memory-intensive workloads on the same server may result in a memory shortage. By mixing workloads with differing resource needs, you experience less resource contention and better consolidation while preserving performance.
Dig Deeper on Server consolidation and improved resource utilization
Related Q&A from Stephen J. Bigelow
Our enterprise wants to limit the time it spends generating Identity and Access Management policies. What tools are available to automate this task?continue reading
Multifactor authentication helps organizations verify account and user identities in the public cloud. But what do I do when my MFA devices fall out ...continue reading
We have restrictions imposed on in-house IT staff with AWS Identity and Access Management. How do IAM roles protect access to services, applications ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.