Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

4/4/2011
02:37 PM
George Crump
George Crump
Commentary
50%
50%

The Passive Primary Storage Tier

Primary storage, especially the storage that supports file based data, is challenging to deal with. In most environments file based data, data created by office productivity and rich media applications can number in the double digit TB's, can bring backup applications to a crawl and cause countless retention issues. The challenge is that 80% or more of this data had an active life span of a month but can't be deleted "just in case". What is needed is to create a passive tier of primary stora

Primary storage, especially the storage that supports file based data, is challenging to deal with. In most environments file based data, data created by office productivity and rich media applications can number in the double digit TB's, can bring backup applications to a crawl and cause countless retention issues. The challenge is that 80% or more of this data had an active life span of a month but can't be deleted "just in case". What is needed is to create a passive tier of primary storage.The ability to automatically move data between tiers of storage is now built into file systems and storage controllers. Moving data to a slower less expensive tier is nothing new. The problem is that even these cheaper, more power efficient tiers of storage are not deserving of data that basically was useful for a month and is only being held on to "just in case" or to meet some legal requirement. This data needs to be identified and moved out of the active primary storage environment so that backup systems and IT budgets have to account for them. The best location for this passive primary tier of storage may actually be tape...Wait, let me explain.

Remember this is data that was active for a short period of time but needs to be retained for one reason or another. Chances are extremely high that most of it will never be accessed again but chances are that some, maybe 1% of it might be, so you just can't delete it and you will need to be able to find some of it. That means that the data does not have to be made available instantly, the moment it is decided that it is needed again, but it does need to be instantly searchable and the retrieval needs to occur within a few minutes.

Modern tape is ideal for this use case. Tape has improved in its reliability, its performance and increased its lead in cost for capacity. Most tape libraries can select a tape cartridge, load it and position it to the right location in less than a minute. With tape we can get the data back and as we indicated in a recent briefing note, tape library vendors are adding off-line verification capabilities. The only missing component then is finding that data. The simplest solution for that is to never lose it or in the case of a file system make it look like it is still online.

Several file systems exist today that can combine disk and tape into a single entity that the users interact with as if it were any other file system. As files are first created and saved they are first stored on high speed storage, then as they age they are migrated off to slower storage, maybe a MAID device and then to a tape tier. With the performance of tape being what it is now, it could be possible to eliminate that middle tier. It depends on your comfort level.

You may be wondering if I just snuck an HSM (hierarchical storage management) or ILM (Integrated lifecycle management) design in on you here. To some extent I did. The difference is the level of integration that these file systems can perform and how seamless the movement back and forth between disk and tape is. The other difference is how early in the process you can move to tape now. In the past tape was the place to put data after it was really, really old. Now given its performance you may want to consider it the moment it becomes inactive.

The tape market is so vibrant that it now has its own event, "The Tape Summit", in which tape leaders will gather to further detail these architectures to advance tape's role in the enterprise. The goal is important not only to the tape suppliers but also to you the users. If the negatives that surround tape can be overcome and the clear economic advantages of tape be widened your capacity acquisition costs will go down and power efficiency will go up.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.