News
2/22/2011
12:25 PM
George Crump
George Crump
Commentary
50%
50%

Solving Scale Out Storage's Dark Side

In a recent entry we discussed a concern with scale out storage, making sure the utilization of processing, power and resources remains efficient. The last thing you want is a storage system that, while it can scale to limitless capacity, also requires limitless power and data center floor space? The good news is that some vendors are aware of these concerns and have some solutions for you to consider.

In a recent entry we discussed a concern with scale out storage, making sure the utilization of processing, power and resources remains efficient. The last thing you want is a storage system that, while it can scale to limitless capacity, also requires limitless power and data center floor space? The good news is that some vendors are aware of these concerns and have some solutions for you to consider.Scale out storage gets its name because typically as you add another node to the cluster, processing performance and capacity scale in unison. The advantage being that you don't need to buy all the horsepower upfront in expectation of future storage I/O or capacity needs.The problem is that as the node count continues to grow one of those variables often gets out of balance. Most environments either a heavier need for capacity or a heavier need for performance, not both equally. Typically as the node count increases the average utilization of the processing power of the cluster declines. The problem will continue to get worse as these nodes, which are typically Intel servers with internal storage, increase the processing performance capabilities though standard technology upgrades. The result is an increasing amount of these systems resources may go unused.

For many storage managers though the trade-off of efficiency is worth the gain in cost effective scalability. After all processing performance is relatively cheap today and power is a budget-able item that many can choose to live with. However, when scale out storage systems grow in size or as they try to appeal to small to mid-range data centers, suppliers need to address the challenges of poor resource utilization. The goal should be to increase the efficiency of each node in terms of processing resources, power and foot print.

There are ways to make scale out storage systems more resource, space and power efficient. First, if the scale out storage system is going to be focused on a nonperformance sensitive environments like most file sharing use cases then using a lower power processor might be a good alternative. For example we recently were briefed by a supplier that used Intel's ATOM processors. Using this processor increases the utilization per node while it decreases power utilization. Utilizing smart packaging will allow these cooler (from a temperature perspective) processors to run in tighter spaces which would lead to better floor space efficiency as well.

Another option is to, instead of making all the CPU resources of the physical server a node, subdivide that server into multiple nodes. For example we see increasing popularity to make each processor core a node as we discuss in a recent briefing report. That means for the same investment in server hardware you could end up with four or more nodes, all working much harder and being more efficient in their utilization. We also were recently briefed on another way to accomplish this which would to be able to run the clustered storage software as a virtual machine and allocate one virtual machine on each physical host to assemble your scale out storage. This would mean zero additional footprint.

A final option is to just make the expected workload of the node higher. Typically when you need more performance out of scale-out clustering the answer is to add more nodes so that more drives are available to respond to I/O requests. The individual nodes are not working harder, there are just more nodes to process the I/O. Mechanical storage inside a node will struggle with keeping that node's processor busy. There is too much latency. By comparison, zero latent technology like solid state drives can keep the node's processors very busy. The result is you have less nodes working harder, delivering the same or better I/O rates.

The other option is to provide better scaling within traditional non scale out (often called scale up) architectures. We will cover those options in an upcoming entry.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-2184
Published: 2015-03-27
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.

CVE-2014-3619
Published: 2015-03-27
The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.

CVE-2014-8121
Published: 2015-03-27
DB_LOOKUP in nss_files/files-XXX.c in the Name Service Switch (NSS) in GNU C Library (aka glibc or libc6) 2.21 and earlier does not properly check if a file is open, which allows remote attackers to cause a denial of service (infinite loop) by performing a look-up while the database is iterated over...

CVE-2014-9712
Published: 2015-03-27
Websense TRITON V-Series appliances before 7.8.3 Hotfix 03 and 7.8.4 before Hotfix 01 allows remote administrators to read arbitrary files and obtain passwords via a crafted path.

CVE-2015-2157
Published: 2015-03-27
The (1) ssh2_load_userkey and (2) ssh2_save_userkey functions in PuTTY 0.51 through 0.63 do not properly wipe SSH-2 private keys from memory, which allows local users to obtain sensitive information by reading the memory.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.