11:59 AM
George Crump
George Crump

Primary Storage Data Reduction - A Process

Primary storage data reduction is a series of steps you can take to reduce the amount of capacity dedicated to Tier 1 storage. The most common techniques are archiving, compression, data deduplication, and the use of intelligent storage systems. The question often comes up, what should I do first?

Primary storage data reduction is a series of steps you can take to reduce the amount of capacity dedicated to Tier 1 storage. The most common techniques are archiving, compression, data deduplication, and the use of intelligent storage systems. The question often comes up, what should I do first?The first step should always be to archive existing data to an archive solution. Since this can result in a reduction in as much as 80% of your primary storage, no matter what step follows, archiving clears the way for that step. Consider a disk-based solution such as those from Permabit, Copan Systems, or Nexsan. These allow for easy access and a rapid retrieval, resulting in greater confidence in a more aggressive archive plan.

If you're in the process of selecting a new primary storage system, the next step is to consider a system that has the ability to do thin provisioning and intelligent data movement. Archiving will have driven down the amount of primary storage you will need to purchase; thin provisioning will reduce that even further. Thin provisioning allows you to allocate as much storage as an application may need, but only consume that storage as it is used. According to some studies, this can result in a reduction of 70% in purchased capacity.

Regardless if you decide on a new primary storage system or not, the next step should be an inline real-time data compression device like those provided by Storwize. These devices allow for a 60%-plus reduction of NFS and CIFS mounted data with little to no performance impact. Even databases or VMware images compress well, yet maintain or even improve overall performance. The reason real-time compression is so early in the process is that its simple to implement and shows reduction across all data.

Finally there is deduplication; there are two types and, depending on your environment, they can have a big payoff for you. First is general-purpose deduplication, right now championed primarily by Network Appliance, although Riverbed has announced plans to take its WAN deduplication technology and move it into primary storage. The differences are worth a separate blog entry and one we will get into later. Ideal candidates for general-purpose deduplication are VMware images and to some extent user home directories.

Lastly, there are application-specific deduplicators, represented now by Ocarina Networks. By focusing on a particular application like ECO-System, these solutions can eliminate redundant data that might get past general-purpose deduplication tools.

For example, a photo site might have thousands of images where the pictures suffer from red-eye. They may go in and remove all those red-eyes, each image being stored as another image, and most deduplication solutions would treat this as totally unique files and each would be stored twice. An application-specific solution would identify these as similar files and only store the unique bytes that make up the corrected images. While the use case is smaller than general-purpose deduplication, the payoff can be enormous.

These solutions aren't mutually exclusive and in many cases complement each other. While this is the recommended workflow, the important part is to get started with any of theses steps and then revisit the others as time and need allow.

There is still time. Join us for our Webcast today at noon CST…. Demystifying Primary Storage Data Reduction.

Track us on Twitter:

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-12
vpxd in VMware vCenter Server 5.0 before u3e, 5.1 before u3, and 5.5 before u2 allows remote attackers to cause a denial of service via a long heartbeat message.

Published: 2015-10-12
The JMX RMI service in VMware vCenter Server 5.0 before u3e, 5.1 before u3b, 5.5 before u3, and 6.0 before u1 does not restrict registration of MBeans, which allows remote attackers to execute arbitrary code via the RMI protocol.

Published: 2015-10-12
Cisco Unified Computing System (UCS) B Blade Server Software 2.2.x before 2.2.6 allows local users to cause a denial of service (host OS or BMC hang) by sending crafted packets over the Inter-IC (I2C) bus, aka Bug ID CSCuq77241.

Published: 2015-10-12
The process-management implementation in Cisco TelePresence Video Communication Server (VCS) Expressway X8.5.2 allows local users to gain privileges by terminating a supervised process and then triggering the restart of a process by the root account, aka Bug ID CSCuv12272.

Published: 2015-10-12
HP 3PAR Service Processor SP 4.2.0.GA-29 (GA) SPOCC, SP 4.3.0.GA-17 (GA) SPOCC, and SP 4.3.0-GA-24 (MU1) SPOCC allows remote authenticated users to obtain sensitive information via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.