News
2/22/2011
12:25 PM
George Crump
George Crump
Commentary
50%
50%

Solving Scale Out Storage's Dark Side

In a recent entry we discussed a concern with scale out storage, making sure the utilization of processing, power and resources remains efficient. The last thing you want is a storage system that, while it can scale to limitless capacity, also requires limitless power and data center floor space? The good news is that some vendors are aware of these concerns and have some solutions for you to consider.

In a recent entry we discussed a concern with scale out storage, making sure the utilization of processing, power and resources remains efficient. The last thing you want is a storage system that, while it can scale to limitless capacity, also requires limitless power and data center floor space? The good news is that some vendors are aware of these concerns and have some solutions for you to consider.Scale out storage gets its name because typically as you add another node to the cluster, processing performance and capacity scale in unison. The advantage being that you don't need to buy all the horsepower upfront in expectation of future storage I/O or capacity needs.The problem is that as the node count continues to grow one of those variables often gets out of balance. Most environments either a heavier need for capacity or a heavier need for performance, not both equally. Typically as the node count increases the average utilization of the processing power of the cluster declines. The problem will continue to get worse as these nodes, which are typically Intel servers with internal storage, increase the processing performance capabilities though standard technology upgrades. The result is an increasing amount of these systems resources may go unused.

For many storage managers though the trade-off of efficiency is worth the gain in cost effective scalability. After all processing performance is relatively cheap today and power is a budget-able item that many can choose to live with. However, when scale out storage systems grow in size or as they try to appeal to small to mid-range data centers, suppliers need to address the challenges of poor resource utilization. The goal should be to increase the efficiency of each node in terms of processing resources, power and foot print.

There are ways to make scale out storage systems more resource, space and power efficient. First, if the scale out storage system is going to be focused on a nonperformance sensitive environments like most file sharing use cases then using a lower power processor might be a good alternative. For example we recently were briefed by a supplier that used Intel's ATOM processors. Using this processor increases the utilization per node while it decreases power utilization. Utilizing smart packaging will allow these cooler (from a temperature perspective) processors to run in tighter spaces which would lead to better floor space efficiency as well.

Another option is to, instead of making all the CPU resources of the physical server a node, subdivide that server into multiple nodes. For example we see increasing popularity to make each processor core a node as we discuss in a recent briefing report. That means for the same investment in server hardware you could end up with four or more nodes, all working much harder and being more efficient in their utilization. We also were recently briefed on another way to accomplish this which would to be able to run the clustered storage software as a virtual machine and allocate one virtual machine on each physical host to assemble your scale out storage. This would mean zero additional footprint.

A final option is to just make the expected workload of the node higher. Typically when you need more performance out of scale-out clustering the answer is to add more nodes so that more drives are available to respond to I/O requests. The individual nodes are not working harder, there are just more nodes to process the I/O. Mechanical storage inside a node will struggle with keeping that node's processor busy. There is too much latency. By comparison, zero latent technology like solid state drives can keep the node's processors very busy. The result is you have less nodes working harder, delivering the same or better I/O rates.

The other option is to provide better scaling within traditional non scale out (often called scale up) architectures. We will cover those options in an upcoming entry.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-5027
Published: 2014-12-26
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2010-2062. Reason: This candidate is a reservation duplicate of CVE-2010-2062. Notes: All CVE users should reference CVE-2010-2062 instead of this candidate. All references and descriptions in this candidate have been removed to pre...

CVE-2010-1441
Published: 2014-12-26
Multiple heap-based buffer overflows in VideoLAN VLC media player before 1.0.6 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) A/52, (2) DTS, or (3) MPEG Audio decoder.

CVE-2010-1442
Published: 2014-12-26
VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted byte stream to the (1) AVI, (2) ASF, or (3) Matroska (aka MKV) demuxer.

CVE-2010-1443
Published: 2014-12-26
The parse_track_node function in modules/demux/playlist/xspf.c in the XSPF playlist parser in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty location element in an XML Shareable Playlist Format...

CVE-2010-1444
Published: 2014-12-26
The ZIP archive decompressor in VideoLAN VLC media player before 1.0.6 allows remote attackers to cause a denial of service (invalid memory access and application crash) or possibly execute arbitrary code via a crafted archive.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.