11:18 AM
George Crump
George Crump

Automated Tiering Methods

A few entries ago we opened up the subject of Automated Tiering with an explanation of why the technology is becoming so needed. As this series of entries continues we will review various storage vendors specific approach to automated tiering, but first it is helpful to understand the common methods that are employed.

A few entries ago we opened up the subject of Automated Tiering with an explanation of why the technology is becoming so needed. As this series of entries continues we will review various storage vendors specific approach to automated tiering, but first it is helpful to understand the common methods that are employed.Automated tiering is the dynamic placement of data on different classes of storage based on parameters that define how that data is being used, most often its level of activity that defines where the data goes. These classes of storage typically range from some form of memory based storage (RAM, FLASH SSD or DRAM SSD) to Fibre/SAS mechanical drives to SATA drives. Depending on the vendor they either supply all of these classes of storage or they merely provide the automated tiering intelligence and you provide the classes of storage.

Most of the focus with automated tiering is moving active data to the fastest tier possible. The idea is maximize the benefits of the most expensive and fastest class of storage. If you are paying more per GB for the memory based tier of storage then you want to make sure you buy as little as you have to and that it is almost always near full. Running memory based storage at 50% utilization is a significant waste of resources.

The first method of automated tiering is to treat this faster tier of storage as a large cache, similar to cache technologies that already exist on drives and storage systems today. The main difference is that they are significantly larger. The concept has merit. Cache technology is certainly well vetted yet vendors can still add value by customizing the approach. It can have a safer feel to it as well by using it in a read only mode, meaning that if the automated tiering device fails you have not lost data. Of course that also means in write heavy environments you would see no performance benefits.

Most of the caching systems and all of the second method of automated tiering solutions have the ability to treat this higher speed tier as something more permanent. Data will reside uniquely on a particular tier for a significant time. That time could be a few seconds, in the case of cache based systems, up to a few days on the second method, which I'll call the storage method for lack of a better term. The storage method systems also typically have a tunable setting that allows you to set how long data is uniquely on each tier of storage. While this method should lead to further performance boosts it may also lead to data loss if the automated tiering device fails or the tier which has the data fails. Typically though the storage method systems provide for some HA (highly available) functionality.

Next up we will look at the different protocols that are supported (file and block) as well as the level of granularity (block, file, LUN) that these solutions tend to offer.

Track us on Twitter:

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Oldest First  |  Newest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
IoT Product Safety: If It Appears Too Good to Be True, It Probably Is
Pat Osborne, Principal - Executive Consultant at Outhaul Consulting, LLC, & Cybersecurity Advisor for the Security Innovation Center,  3/12/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.