News

11/3/2008
11:59 AM
George Crump
George Crump
Commentary
50%
50%

Primary Storage Data Reduction - A Process

Primary storage data reduction is a series of steps you can take to reduce the amount of capacity dedicated to Tier 1 storage. The most common techniques are archiving, compression, data deduplication, and the use of intelligent storage systems. The question often comes up, what should I do first?

Primary storage data reduction is a series of steps you can take to reduce the amount of capacity dedicated to Tier 1 storage. The most common techniques are archiving, compression, data deduplication, and the use of intelligent storage systems. The question often comes up, what should I do first?The first step should always be to archive existing data to an archive solution. Since this can result in a reduction in as much as 80% of your primary storage, no matter what step follows, archiving clears the way for that step. Consider a disk-based solution such as those from Permabit, Copan Systems, or Nexsan. These allow for easy access and a rapid retrieval, resulting in greater confidence in a more aggressive archive plan.

If you're in the process of selecting a new primary storage system, the next step is to consider a system that has the ability to do thin provisioning and intelligent data movement. Archiving will have driven down the amount of primary storage you will need to purchase; thin provisioning will reduce that even further. Thin provisioning allows you to allocate as much storage as an application may need, but only consume that storage as it is used. According to some studies, this can result in a reduction of 70% in purchased capacity.

Regardless if you decide on a new primary storage system or not, the next step should be an inline real-time data compression device like those provided by Storwize. These devices allow for a 60%-plus reduction of NFS and CIFS mounted data with little to no performance impact. Even databases or VMware images compress well, yet maintain or even improve overall performance. The reason real-time compression is so early in the process is that its simple to implement and shows reduction across all data.

Finally there is deduplication; there are two types and, depending on your environment, they can have a big payoff for you. First is general-purpose deduplication, right now championed primarily by Network Appliance, although Riverbed has announced plans to take its WAN deduplication technology and move it into primary storage. The differences are worth a separate blog entry and one we will get into later. Ideal candidates for general-purpose deduplication are VMware images and to some extent user home directories.

Lastly, there are application-specific deduplicators, represented now by Ocarina Networks. By focusing on a particular application like ECO-System, these solutions can eliminate redundant data that might get past general-purpose deduplication tools.

For example, a photo site might have thousands of images where the pictures suffer from red-eye. They may go in and remove all those red-eyes, each image being stored as another image, and most deduplication solutions would treat this as totally unique files and each would be stored twice. An application-specific solution would identify these as similar files and only store the unique bytes that make up the corrected images. While the use case is smaller than general-purpose deduplication, the payoff can be enormous.

These solutions aren't mutually exclusive and in many cases complement each other. While this is the recommended workflow, the important part is to get started with any of theses steps and then revisit the others as time and need allow.

There is still time. Join us for our Webcast today at noon CST…. Demystifying Primary Storage Data Reduction.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Game Change: Meet the Mach37 Fall Startups
Ericka Chickowski, Contributing Writer, Dark Reading,  10/18/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.