News
1/20/2010
11:18 AM
George Crump
George Crump
Commentary
50%
50%

Automated Tiering Methods

A few entries ago we opened up the subject of Automated Tiering with an explanation of why the technology is becoming so needed. As this series of entries continues we will review various storage vendors specific approach to automated tiering, but first it is helpful to understand the common methods that are employed.

A few entries ago we opened up the subject of Automated Tiering with an explanation of why the technology is becoming so needed. As this series of entries continues we will review various storage vendors specific approach to automated tiering, but first it is helpful to understand the common methods that are employed.Automated tiering is the dynamic placement of data on different classes of storage based on parameters that define how that data is being used, most often its level of activity that defines where the data goes. These classes of storage typically range from some form of memory based storage (RAM, FLASH SSD or DRAM SSD) to Fibre/SAS mechanical drives to SATA drives. Depending on the vendor they either supply all of these classes of storage or they merely provide the automated tiering intelligence and you provide the classes of storage.

Most of the focus with automated tiering is moving active data to the fastest tier possible. The idea is maximize the benefits of the most expensive and fastest class of storage. If you are paying more per GB for the memory based tier of storage then you want to make sure you buy as little as you have to and that it is almost always near full. Running memory based storage at 50% utilization is a significant waste of resources.

The first method of automated tiering is to treat this faster tier of storage as a large cache, similar to cache technologies that already exist on drives and storage systems today. The main difference is that they are significantly larger. The concept has merit. Cache technology is certainly well vetted yet vendors can still add value by customizing the approach. It can have a safer feel to it as well by using it in a read only mode, meaning that if the automated tiering device fails you have not lost data. Of course that also means in write heavy environments you would see no performance benefits.

Most of the caching systems and all of the second method of automated tiering solutions have the ability to treat this higher speed tier as something more permanent. Data will reside uniquely on a particular tier for a significant time. That time could be a few seconds, in the case of cache based systems, up to a few days on the second method, which I'll call the storage method for lack of a better term. The storage method systems also typically have a tunable setting that allows you to set how long data is uniquely on each tier of storage. While this method should lead to further performance boosts it may also lead to data loss if the automated tiering device fails or the tier which has the data fails. Typically though the storage method systems provide for some HA (highly available) functionality.

Next up we will look at the different protocols that are supported (file and block) as well as the level of granularity (block, file, LUN) that these solutions tend to offer.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-4231
Published: 2015-07-03
The Python interpreter in Cisco NX-OS 6.2(8a) on Nexus 7000 devices allows local users to bypass intended access restrictions and delete an arbitrary VDC's files by leveraging administrative privileges in one VDC, aka Bug ID CSCur08416.

CVE-2015-4232
Published: 2015-07-03
Cisco NX-OS 6.2(10) on Nexus and MDS 9000 devices allows local users to execute arbitrary OS commands by entering crafted tar parameters in the CLI, aka Bug ID CSCus44856.

CVE-2015-4234
Published: 2015-07-03
Cisco NX-OS 6.0(2) and 6.2(2) on Nexus devices has an improper OS configuration, which allows local users to obtain root access via unspecified input to the Python interpreter, aka Bug IDs CSCun02887, CSCur00115, and CSCur00127.

CVE-2015-4237
Published: 2015-07-03
The CLI parser in Cisco NX-OS 4.1(2)E1(1), 6.2(11b), 6.2(12), 7.2(0)ZZ(99.1), 7.2(0)ZZ(99.3), and 9.1(1)SV1(3.1.8) on Nexus devices allows local users to execute arbitrary OS commands via crafted characters in a filename, aka Bug IDs CSCuv08491, CSCuv08443, CSCuv08480, CSCuv08448, CSCuu99291, CSCuv0...

CVE-2015-4239
Published: 2015-07-03
Cisco Adaptive Security Appliance (ASA) Software 9.3(2.243) and 100.13(0.21) allows remote attackers to cause a denial of service (device reload) by sending crafted OSPFv2 packets on the local network, aka Bug ID CSCus84220.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report