Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

10/22/2010
03:00 PM
George Crump
George Crump
Commentary
50%
50%

How To Get Data To The Cloud: Onramps

As we discussed in our last entry, deciding when to use cloud storage is an important decision that data center mangers are now trying to make. While adding the capabilities to your own software was an early approach most were waiting for an easier way to get to the cloud and it comes in the form of software that allows near seamless access. We call these onramps.

As we discussed in our last entry, deciding when to use cloud storage is an important decision that data center mangers are now trying to make. While adding the capabilities to your own software was an early approach most were waiting for an easier way to get to the cloud and it comes in the form of software that allows near seamless access. We call these onramps.The onramp software do the same basic core functions, translating the storage protocols that you are accustomed to today and converting them to the storage models that the cloud providers are using. Almost all of the onramps use a hybrid model that leverages a local storage capability and then as bandwidth is available copies that data to the cloud. The onramps typically come in two forms today, either a specific piece of hardware that is provided to you or as a software application that you load onto a server or into a virtual infrastructure.

On premise part of the cloud implementation typically acts as a cache. When data is accessed, written or modified it is stored in the cache for faster access. The data is in most cases copied as soon as possible to the cloud for redundancy. Then like any other type of cache as that data ages and becomes unused it is moved solely to the cloud. This allows for the local cache to be relatively small.

The most common use case of these devices or software extensions is as a part of a backup or archive applications where data is written to a local device quickly so the backup job can complete and then replicate through the cloud as bandwidth allows. This provides an automatic off-site vaulting capability that many users need. Most leverage deduplication and compression to optimize bandwidth, the only downside is the initial seeding of the cloud storage target. Providers and backup software developers have worked around this by shuttling an initial seeding unit to build the baseline by which data optimization can work against.

Onramps are not just limited to backup or archive data. Primary storage onramps to the cloud are now available for a variety of primary storage situations including both NAS and SAN. In cloud enabled NAS product, data is typically moved at the file level in and out of the cache. The SAN type of implementations have to take a finer level of granularity and need to move data at a sub-file level, typically a block. They also tend to have much larger cache capacities than the file serving versions but in general tend to respond to demands very quickly, even within databases. In both NAS and SAN there is not an initial seeding option, so these implementations are ideal for new projects or where data can be slowly populated to the device.

Most users are going to dip their toes in first with cloud storage and onramps allow that to happen with relative ease. For example they can be a device that backups are sent to first, then a storage area for blob oriented databases like Sharepoint or Exchange. From there as confidence builds they can move into the role of providing more traditional primary storage services.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11844
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
CVE-2020-6937
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
CVE-2020-7648
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
CVE-2020-7650
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
CVE-2020-7654
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.