Cloud
10/22/2010
03:00 PM
George Crump
George Crump
Commentary
50%
50%

How To Get Data To The Cloud: Onramps

As we discussed in our last entry, deciding when to use cloud storage is an important decision that data center mangers are now trying to make. While adding the capabilities to your own software was an early approach most were waiting for an easier way to get to the cloud and it comes in the form of software that allows near seamless access. We call these onramps.

As we discussed in our last entry, deciding when to use cloud storage is an important decision that data center mangers are now trying to make. While adding the capabilities to your own software was an early approach most were waiting for an easier way to get to the cloud and it comes in the form of software that allows near seamless access. We call these onramps.The onramp software do the same basic core functions, translating the storage protocols that you are accustomed to today and converting them to the storage models that the cloud providers are using. Almost all of the onramps use a hybrid model that leverages a local storage capability and then as bandwidth is available copies that data to the cloud. The onramps typically come in two forms today, either a specific piece of hardware that is provided to you or as a software application that you load onto a server or into a virtual infrastructure.

On premise part of the cloud implementation typically acts as a cache. When data is accessed, written or modified it is stored in the cache for faster access. The data is in most cases copied as soon as possible to the cloud for redundancy. Then like any other type of cache as that data ages and becomes unused it is moved solely to the cloud. This allows for the local cache to be relatively small.

The most common use case of these devices or software extensions is as a part of a backup or archive applications where data is written to a local device quickly so the backup job can complete and then replicate through the cloud as bandwidth allows. This provides an automatic off-site vaulting capability that many users need. Most leverage deduplication and compression to optimize bandwidth, the only downside is the initial seeding of the cloud storage target. Providers and backup software developers have worked around this by shuttling an initial seeding unit to build the baseline by which data optimization can work against.

Onramps are not just limited to backup or archive data. Primary storage onramps to the cloud are now available for a variety of primary storage situations including both NAS and SAN. In cloud enabled NAS product, data is typically moved at the file level in and out of the cache. The SAN type of implementations have to take a finer level of granularity and need to move data at a sub-file level, typically a block. They also tend to have much larger cache capacities than the file serving versions but in general tend to respond to demands very quickly, even within databases. In both NAS and SAN there is not an initial seeding option, so these implementations are ideal for new projects or where data can be slowly populated to the device.

Most users are going to dip their toes in first with cloud storage and onramps allow that to happen with relative ease. For example they can be a device that backups are sent to first, then a storage area for blob oriented databases like Sharepoint or Exchange. From there as confidence builds they can move into the role of providing more traditional primary storage services.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

CVE-2014-2716
Published: 2014-12-19
Ekahau B4 staff badge tag 5.7 with firmware 1.4.52, Real-Time Location System (RTLS) Controller 6.0.5-FINAL, and Activator 3 reuses the RC4 cipher stream, which makes it easier for remote attackers to obtain plaintext messages via an XOR operation on two ciphertexts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.